Table of Contents Author Guidelines Submit a Manuscript
BioMed Research International
Volume 2014 (2014), Article ID 313078, 15 pages
http://dx.doi.org/10.1155/2014/313078
Research Article

Combining Haar Wavelet and Karhunen Loeve Transforms for Medical Images Watermarking

1LE2I Laboratory, Burgundy University, Dijon, France
2Electronics and Microelectronics Laboratory, University of Monastir, Tunisia

Received 9 November 2013; Accepted 19 February 2014; Published 7 April 2014

Academic Editor: Achim Langenbucher

Copyright © 2014 Mohamed Ali Hajjaji et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Z. Brahimi, H. Bessalah, A. Tarabet, and M. K. Kholladi, “Selective encryption techniques of JPEG2000 codestream for medical images transmission,” WSEAS Transactions on Circuits and Systems, vol. 7, no. 7, pp. 718–727, 2008. View at Google Scholar · View at Scopus
  2. C. Chemak, J. C. Lapayre, and M. S. Bouhlel, “A new scheme of image watermarking based on 5/3 wavelet decomposition and turbo-code,” WSEAS Transactions on Biology and Biomedicine, vol. 4, no. 4, pp. 45–52, 2007. View at Google Scholar
  3. Y. I. Khamlichi, M. Machkour, K. Afdel, and A. Moudden, “Medical image watermarked by simultaneous moment invariants and content-based for privacy and tamper detection,” in Proceedings of the 6th WSEAS International Conference on Multimedia Systems & Signal Processing, pp. 109–113, Hangzhou, China, April 2006.
  4. T. Duy Hien, Z. Nakao, and Y.-W. Chen, “Robust multi-logo watermarking by RDWT and ICA,” Signal Processing, vol. 86, no. 10, pp. 2981–2993, 2006. View at Publisher · View at Google Scholar · View at Scopus
  5. C. E. Moucary and B. E. Hassan, “A novel blind digital watermarking technique for stegano-encrypting information using nine-AC-coefficient prediction algorithm with an innovative security strategy,” WSEAS Transactions on Signal Processing, vol. 5, no. 11, pp. 359–368, 2009. View at Google Scholar · View at Scopus
  6. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Zhang, “Blind watermark algorithm based on HVS and RBF neural network in DWT domain,” WSEAS Transactions on Computers, vol. 8, no. 1, pp. 174–183, 2009. View at Google Scholar · View at Scopus
  8. R. O. Preda and D. N. Vizireanu, “A robust digital watermarking scheme for video copyright protection in the wavelet domain,” Measurement, vol. 43, no. 10, pp. 1720–1726, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. W.-B. Lee and T.-H. Chen, “A public verifiable copy protection technique for still images,” The Journal of Systems and Software, vol. 62, no. 3, pp. 195–204, 2002. View at Publisher · View at Google Scholar · View at Scopus
  10. Anuradha and R. P. Singh, “DWT based watermarking algorithm using Haar wavelet,” Journal of Electronics and Computer Science Engineering, vol. 1, no. 1, pp. 1–6, 2012. View at Google Scholar
  11. N. Kashyap, “Image watermarking using 3-level discrete wavelet transform (DWT),” International Journal of Modern Education and Computer Science, vol. 4, no. 3, pp. 50–56, 2012. View at Google Scholar
  12. P. Cika, “Watermarking method based on discrete wavelet transform and singular value decomposition,” Elektrorevue, vol. 3, no. 1, pp. 45–49, 2012. View at Google Scholar
  13. A. Kannammal and S. Subha Rani, “Authentication of medical images using integer wavelet transforms,” International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 9, pp. 104–108, 2012. View at Google Scholar
  14. S. Rawat and B. Raman, “Best tree wavelet packet transform based copyright protection scheme for digital images,” Optics Communications, vol. 285, no. 10-11, pp. 2563–2574, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. C.-Y. Yang, C.-H. Lin, and W.-C. Hu, “Reversible data hiding for high-quality images based on integer wavelet transform,” Journal of Information Hiding and Multimedia Signal Processing, vol. 3, no. 2, pp. 142–150, 2012. View at Google Scholar
  16. N. M. Makbol and B. E. Khoo, “Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” International Journal of Electronics and Communications (AEÜ), vol. 67, no. 2, pp. 102–112, 2013. View at Google Scholar
  17. A. Latif, “An adaptive digital image watermarking scheme using fuzzy logic and tabu search,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 4, pp. 250–271, 2013. View at Google Scholar
  18. K. I. Al-Saif, S. K. Ebraheem, and G. T. Yuonis, “Copyright authentication by using Karhunen-Loeve transform,” Journal of University of Anbar for Pure Science, vol. 6, no. 2, pp. 1–8, 2012. View at Google Scholar
  19. L. Li, H.-H. Xu, C.-C. Chang, and Y.-Y. Ma, “A novel image watermarking in redistributed invariant wavelet domain,” Journal of Systems and Software, vol. 84, no. 6, pp. 923–929, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. Federal Information Processing Standards Publication, “Secure Hash Standard,” 180-2, 2002.
  21. S. Gastan, Codage de canal pour les communications optiques [M.S. thesis], 2009.
  22. K. R. Castleman, Digital Image Processing, Prentice Hall, Upper Saddle River, NJ, USA, 1996.
  23. M. J. Mateo, D. J. O'Callaghan, and C. P. O'Donnell, “Comparison between red-green-blue imaging and visible-near infrared reflectance as potential process analytical tools for monitoring syneresis,” Journal of Dairy Science, vol. 93, no. 5, pp. 1882–1889, 2010. View at Publisher · View at Google Scholar · View at Scopus
  24. S. Oueslati, A. Cherif, and B. Solaiman, “A fuzzy watermarking approach based on the human visual system,” International Journal of Image Processing, vol. 4, no. 3, pp. 218–231, 2010. View at Google Scholar
  25. K. Amal and S. Hamad, “A robust non-blind algorithm for watermarking color images using multi-resolution wavelet decomposition,” International Journal of Computer Applications, vol. 37, no. 8, pp. 33–39, 2012. View at Google Scholar
  26. P. Bas, Méthode de tatouage d’images fondée sur le contenu [Ph.D. thesis], Institut Polytechnique de Grenoble, 2000.