{"title":"Biomedical image watermarking for content protection using multiple copies of information and bit majority algorithm in wavelet domain","authors":"K. Pal, G. Ghosh, M. Bhattacharya","doi":"10.1109/SCEECS.2012.6184764","DOIUrl":null,"url":null,"abstract":"Current paper presents a novel scheme for biomedical image watermarking by hiding multiple copies of the same data in the cover image using bit replacement in horizontal (HL) and vertical (LH) resolution approximation image components of wavelet domain. The proposed scheme use an approach for recovering the hidden information from the damaged copies due to unauthorized alteration of data under attack by applying an algorithm to find the closest twin of the embedded information by bit majority algorithm. Experimental results show much enhancement in the visual and statistical invisibility of hidden information that support the improvement in performance.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCEECS.2012.6184764","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Current paper presents a novel scheme for biomedical image watermarking by hiding multiple copies of the same data in the cover image using bit replacement in horizontal (HL) and vertical (LH) resolution approximation image components of wavelet domain. The proposed scheme use an approach for recovering the hidden information from the damaged copies due to unauthorized alteration of data under attack by applying an algorithm to find the closest twin of the embedded information by bit majority algorithm. Experimental results show much enhancement in the visual and statistical invisibility of hidden information that support the improvement in performance.