Table of Contents Author Guidelines Submit a Manuscript
International Journal of Telemedicine and Applications
Volume 2015, Article ID 123790, 8 pages
http://dx.doi.org/10.1155/2015/123790
Research Article

Application of Fractional Wave Packet Transform for Robust Watermarking of Mammograms

1Research Scholar, Jain University and Department of Electronics and Communication Engineering, Sambhram Institute of Technology, Bangalore 560097, Karnataka, India
2Department of Electronic Instrumentation, JSS Academy of Technical Education, Bangalore 560060, Karnataka, India

Received 21 June 2015; Revised 8 October 2015; Accepted 15 October 2015

Academic Editor: Fei Hu

Copyright © 2015 Pushpa Mala Siddaraju et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. A. Berry, “Benefits and risks of screening mammography for women in their forties: a statistical appraisal,” Journal of the National Cancer Institute, vol. 90, no. 19, pp. 1431–1439, 1998. View at Publisher · View at Google Scholar · View at Scopus
  2. C. D. Schou, J. Frost, and W. V. Maconachy, “Information assurance in biomedical informatics systems,” IEEE Engineering in Medicine and Biology Magazine, vol. 23, no. 1, pp. 110–118, 2004. View at Publisher · View at Google Scholar · View at Scopus
  3. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997. View at Publisher · View at Google Scholar · View at Scopus
  4. C. I. Podilchuk and W. Zeng, “Image-adaptive watermarking using visual models,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 525–539, 1998. View at Publisher · View at Google Scholar · View at Scopus
  5. C.-S. Lu and H.-Y. M. Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579–1592, 2001. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  6. R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121–128, 2002. View at Publisher · View at Google Scholar · View at Scopus
  7. N. K. Kalantari, S. M. Ahadi, and M. Vafadust, “A robust image watermarking in the ridgelet domain using universally optimum decoder,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 20, no. 3, pp. 396–406, 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Jayalakshmi, S. N. Merchant, and U. B. Desai, “Digital watermarking in contourlet domain,” in Proceedings of the 18th International Conference on Pattern Recognition (ICPR '06), vol. 3, pp. 861–864, Hong Kong, August 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. Y. Lim, C. Xu, and D. D. Feng, “Web based image authentication using invisible fragile watermark,” in Proceedings of the Pan-Sydney Area Workshop on Visual Information Processing (VIP '01), vol. 11, pp. 31–34, Sydney, Australia, 2001.
  10. R.-C. Raúl, F.-U. Claudia, and G. J. Trinidad-Blas, “Data hiding scheme for medical images,” in Proceedings of the IEEE 17th International Conference on Electronics, Communications and Computers (CONIELECOMP '07), Cholula, Puebla, Mexico, February 2007. View at Publisher · View at Google Scholar
  11. G. Coatrieux, H. Maître, B. Sankur, Y. Rolland, and R. Collorec, “Relevance of watermarking in medical imaging,” in Proceedings of the IEEE EMBS International Conference on Information Technology Applications in Biomedicine (ITAB '00), pp. 250–255, Arlington, Va, USA, 2000. View at Publisher · View at Google Scholar
  12. G. Coatrieux, H. Maître, and B. Sankur, “Strict integrity control of biomedical images,” in Security and Watermarking of Multimedia Contents III, vol. 4314 of Proceedings of SPIE, pp. 229–240, San Jose, Calif, USA, January 2001.
  13. C. De Vleeschouwer, J.-F. Delaigle, and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for media asset management,” IEEE Transactions on Multimedia, vol. 5, no. 1, pp. 97–105, 2003. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Piva, M. Barni, F. Bartolini, and A. De Rosa, “Data hiding technologies for digital radiography,” IEE Proceedings—Vision, Image and Signal Processing, vol. 152, no. 5, pp. 604–610, 2005. View at Publisher · View at Google Scholar
  15. A. Wakatani, “Digital watermarking for ROI medical images by using compressed signature image,” in Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 2043–2048, Big Island, Hawaii, USA, January 2002. View at Publisher · View at Google Scholar
  16. A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, “Multiple image watermarking applied to health information management,” IEEE Transactions on Information Technology in Biomedicine, vol. 10, no. 4, pp. 722–732, 2006. View at Publisher · View at Google Scholar · View at Scopus
  17. N. A. Memon, S. A. M. Gilani, and S. Qayoom, “Multiple watermarking of medical images for content authentication and recovery,” in Proceedings of the IEEE 13th International Multitopic Conference (INMIC '09), pp. 1–6, IEEE, Islamabad, Pakistan, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Huang and B. Suter, “The fractional wave packet transform,” Multidimensional Systems and Signal Processing, vol. 9, no. 4, pp. 399–402, 1998. View at Publisher · View at Google Scholar · View at Scopus