skip to main content
10.1145/3474124.3474147acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesic3Conference Proceedingsconference-collections
research-article

FABEMD based Innovative Watermarking Method

Published:04 November 2021Publication History

ABSTRACT

Telemedicine is overcoming obsession and is now a thriving research area. Commuting therapeutic images between distant locations is a common occurrence in telemedicine, as therapeutic images are often used by remote specialists to make inferences about diagnosis. The majority of therapeutic photographs are sent through the internet. When commuting over the internet, therapeutic photos can be attacked by various types of noise. The use of noise-affected therapeutic images may result in a misdiagnosis. As a result, the remote authority must vouch for the validity of the significant component (ROI) in the therapeutic picture and retrieve the ROI if it has been harmed by noise. This paper introduces a ground breaking watermarking method that uses Fast and Adaptive Bi-dimensional Empirical Mode Decomposition (FABEMD) to recover the ROI in a therapeutic picture when it is attacked by noise. Experiments with this novel technique have shown that the ROI in therapeutic images can be returned to its original state.

References

  1. W. Pan, G. Coatrieux, N. Cuppens-Boulahia, F. Cuppens and C. Roux. 2010. Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking. In Proceedings of International Conference on Data Privacy Management and Autonomous Spontaneous Security, 153-162.Google ScholarGoogle Scholar
  2. American Hospital Association. 2015. The Promise of Tele-health for Hospitals, Health Systems and their Communities, Trend Watch.Google ScholarGoogle Scholar
  3. Elek Dinya and Tamás Tóth. 2013. Health Informatics e-HEALTH and TELEMEDICINE, Institute of Health Informatics, Semmelweis University.Google ScholarGoogle Scholar
  4. G Coatrieux, L Lecornu, B Sankur and Ch, Roux. 2006. A Review of Image Watermarking Applications in Healthcare. In Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 4691- 4694.Google ScholarGoogle ScholarCross RefCross Ref
  5. H M Chao, C M Hsu and A G Miaou. 2002. A Data Hiding Technique with Authentication, Integration and Confidentiality for Electronic Patient Records, IEEE Transactions on Information Technology in Biomedicine, 46-53.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ali Al-Haj and Alaa Amer. 2014. Secured Telemedicine using Region-Based Watermarking with Tamper Localization, Journal of Digital Imaging, 737–750.Google ScholarGoogle ScholarCross RefCross Ref
  7. Ali Al-Haj, Ahmad Mohammad and Alaa’ Amer. 2016. Crypto-Watermarking of Transmitted Medical Images, Journal of Digital Imaging, 26-38.Google ScholarGoogle Scholar
  8. Gran Badshah, Siau-Chuin Liew, Jasni Mohd Zain and Mushtaq Ali. 2016. Watermark Compression in Medical Image Watermarking Using Lempel-Ziv-Welch (LZW) Lossless Compression Technique, Journal of Digital Imaging, 216–225.Google ScholarGoogle ScholarCross RefCross Ref
  9. Hui Liang Khor, Siau-Chuin Liew and Jasni Mohd. Zain. 2017. Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images, Journal of Digital Imaging, 328–349.Google ScholarGoogle ScholarCross RefCross Ref
  10. Rasha Thabit and Bee Ee Khoo. 2017. Medical Image Authentication using SLT and IWT Schemes, Multimedia Tools and Applications, 309–332.Google ScholarGoogle Scholar
  11. Jessie Ooi, Hui-Liang Khor and Siau-Chuin Liew. 2020. Region of Interest-based Tamper Detection and Lossless Recovery Watermarking Scheme on MRI and X-ray Medical Images, IOP Conf. Ser.: Mater. Sci. Eng. 769 012068.Google ScholarGoogle ScholarCross RefCross Ref
  12. Guo-Dong Su, Chin-Chen Chang and Chia-Chen Lin. 2020. Effective Self-Recovery and Tampering Localization Fragile Watermarking for Medical Images, IEEE Access.Google ScholarGoogle Scholar
  13. Noura Aherrahrou and Hamid Tairi. 2012. An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT, 307–315.Google ScholarGoogle Scholar
  14. Nidaa Hasan Abbas, Sharifah Mumtazah Syed Ahmad, Sajida Parveen, Wan Azizun Wan and Abd. Rahman Bin Ramli. 2018. Design of high performance copyright protection watermarking based on lifting wavelet transform and bi empirical mode decomposition, Multimed Tools Applications.Google ScholarGoogle Scholar
  15. N E Huang, Z Shen and S R Long 1998. The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis, Proceeding of Royal Society London, 903–995.Google ScholarGoogle Scholar
  16. J C Nunes, Y Bouaoune, E Delechelle, O Niang and P Bunel. 2003. Image analysis by bi-dimensional empirical mode decomposition, Image and Vision Computing, 1019–1026.Google ScholarGoogle Scholar
  17. J C Nunes, S Guyot, and E Delechelle. 2005. Texture analysis based on local analysis of the bi-dimensional empirical mode decomposition, Machine Vision and Applications, 177–188.Google ScholarGoogle Scholar
  18. Bhuiyan S M A, Adhami R R, and Khan J F. 2008. Fast and adaptive bi-dimensional empirical mode decomposition using order-statistics filter based envelope estimation, EURASIP J. Adv. Signal Process, 1–18.Google ScholarGoogle Scholar
  19. Bhuiyan S M A, Adhami R R, and Khan J F. 2008. A novel approach of fast and adaptive bi-dimensional empirical mode decomposition, In. Proceedings of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, 1313–1316.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    IC3-2021: Proceedings of the 2021 Thirteenth International Conference on Contemporary Computing
    August 2021
    483 pages
    ISBN:9781450389204
    DOI:10.1145/3474124

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 4 November 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format