DUAL ADAPTIVE WATERMARKING SCHEMES FORDICOM IMAGES A PROJECT REPORT s ubm itt e d byMANJARI TYAGI(091237) PALLAVI JAIN(091310) TAPAS TRIVEDI(091324) UNDER THE SUPERVISION OF DR.SHISHIR KUMAR (HOD CSE) May-2013 s ubmi tte d in par tial fu lf il lm e nt f or th e awar d of the de gree of Bachelor of Technology IN Department of Computer Science & Engineering Department of Computer Science & Engineering JAYPEE UNIVERSITY OF ENGINEERING & TECHNOLOGY, AB ROAD, RAGHOGARH, DT. GUNA-473226 MP, INDIA
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
This is to certify that the work titled ―Dual Adaptive Watermarking for DICOM
images” submitted by ―Manjari Tyagi (091237) ” , ―Pallavi Jain (091310) ‖, and―Tapas Trivedi(091324) ‖ in partial fulfillment for the award of degree of Bachelor of
Technology in Computer Science of Jaypee University of Engineering & Technology,
Guna has been carried out under my supervision. This work has not been submitted
partially or wholly to any other University or Institute for the award of this or any other
degree or diploma.
Signature of Supervisor
(Dr. Shishir Kumar )
Sr. Lecturer
Date:
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
In ―Dual Adaptive Watermarking for Biomedical Images‖ we mainly deal with the
watermarking procedures currently being carried out in the field of biomedical images,and also try to improve upon the same by proposing an improved scheme.
The digital form of medical images have a lot of advantages over its analog form such as
ease in storage and transmission. Medical images in digital form must be stored in a
secured environment to preserve patient privacy. It is also important to detect
modifications on the image. These objectives are obtained by watermarking in medical
images.
In this project we will mainly deal with the DWT(Discrete Wavelet Transform) for
watermarking of biomedical images. It is a method for decomposing an image into 4
subbands of varying frequencies, that aids in localization of values in an image, energy
compaction and also decorrelation of values, leading to greater security than normal
spatial domain based transforms.
We firstly employ a conventional DWT based watermarking scheme on a set of
biomedical images, and then apply attacks on them to ascertain their quality of
robustness and imperceptibility. We also employ a proposed scheme under which we
highlight the regions of interest and non-interest in an image, and apply separate
watermarks based on their desired requirements. This composite image, is tested by
applying several image processing and geometrical distortion attacks.
We will then compare the results of both, the original scheme and the proposed scheme
by comparing the state of the images after applying the attacks stated.
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
In the recent years, medical images are produced from a wide variety of digital imaging equipments, such as computed
tomography (CT), magnetic resonance imaging (MRI), computed radiography (CR) and so forth. With the increasing use of
internet and appearance of new system such as picture archiving and communication systems (PACS), the usability of digital form of medical images has been increased . Images in digital imaging equipments can be printed on films or papers.
Moreover, in these equipments images with patient data in DICOM format can be stored on different types of storage media
such as CD or DVD. Insurance companies, hospitals and patients may want to change this data for various reasons.
Therefore, protecting medical images against this threat is necessary. Watermarking can be used as a solution.
1.2. DIGITAL IMAGES
A digital image is composed of a number of elements, each having a particular location and value. These elements are
referred as picture elements, image elements and pixels. Pixels is term used to denote elements of a digital image. A image
can be defined as a two- dimensional function f(x,y) where ‗x‘ and ‗y‘ are spatial coordinates and the amplitude of ‗f‘ at any
pair of coordinate s is called the intensity or the gray level of the image at that point. When ‗x‘, ‗y‘ a nd the amplitude values
of ‗f‘ are all finite and discrete, the image is known a Digital Image. A digital image can be represented naturally as a
matrix.
1.2.1 Types of Images
1. Bi-level Image : This is the black and white image having only two values. Each pixel in such type of image
requires only one bit for representation i.e. either 0 (for black) or 1(for white).
2. Gray-Scale Image : In Gray Scale Image, any pixel can have any of n values between 0 to n-1 where n is the
maximum number of bits required to represent any pixel value. There can be 2n shades of Gray.
3. Continuous- Tone Image : In continuous- tone images, the adjacent pixel values differ just by one or few units.
For eyes, it is very hard to distinguish the difference between the adjacent pixel values. Any pixel in such images
can be represented by either a single large image (Gray-scale) or by three components (in the case of a colour
image). Continuous tone images are generally natural images which are not having any sharp edges.
4. Discrete – Tone Image : These are generally graphical or synthetic images. These types of images have sharp
edges and no blurring effect. Artificial objects, lines, text have sharp and well-defined edges and therefore vary in
contrast from the rest of the background. These images are called artificial images.
5. Cartoon- like Image : These types of images consist of uniform areas, having uniform colors. The adjacent areas
have different colours.
6. DICOM Image : DICOM (Digital Imaging and Communications in Medicine )
is a standard for handling, storing, printing, and transmitting information in medical imaging. It includes a file
format definition and a network communications protocol. It is the international standard for medical images and
related information (ISO 12052). It defines the formats for medical images that can be exchanged with the data and
quality necessary for clinical use. DICOM is implemented in almost every radiology, cardiology imaging, and
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
radiotherapy device (X-ray, CT, MRI, ultrasound, etc.), and increasingly in devices in other medical domains such
as ophthalmology and dentistry. With tens of thousands of imaging devices in use, DICOM is one of the most
widely deployed healthcare messaging standards in the world. There are literally billions of DICOM images
currently in use for clinical care. Since its first publication in 1993, DICOM has revolutionized the practice of
radiology, allowing the replacement of X-ray film with a fully digital workflow. Much as the Internet has become
the platform for new consumer information applications, DICOM has enabled advanced medical imagingapplications that have ―changed the face of clinical medicine‖. From the emergency department, to cardiac stress
testing, to breast cancer detection, DICOM is the standard that makes medical imaging work — for doctors and for
patients.
1.2.2 Formats of images
1.2.2.1 TIFF is a very flexible format that can be lossless or lossy. In practice, TIFF is used almost exclusively as
a lossless image storage format that uses no compression at all. Most graphics programs that use TIFF do not
compression. Consequently, file sizes are quite big. And TIF is the most versatile, except that web pages don'tshow TIF files.
1.2.2.2 PNG is also lossless storage format. However, in contrast with common TIFF usage, it looks for patterns
in the image that it can use to compress file size. The compression is exactly reversible, so the image is recovered
exactly. Feature of PNG is transparency for 24 bit RGB images. PNG is slightly slower to read or write.
1.2.2.3 GIF creates a table of up to 256 colors from a pool of 16 million. If the image has a fewer than 256
colors, GIF can render the image exactly. When the image contains many colors, software that creates the GIF uses
any of several algorithms to approximate the colors in the image with the limited palette of 256 colors available.Better algorithms search the image to find an optimum set of 256 colors. Sometimes the GIF uses the nearest color
to represent each pixel, and sometimes it uses ―error diffusion‖ to ad just the color of nearby pixels to correct for
the error in each pixel. Thus, GIF is ―lossless‖ only for images with 256 colors or less. For a rich, true color image,
GIF may ―lose‖ 99.998% of the colors. It is very good for web graphics.
1.2.2.4 JPEG is optimized for photographs and similar continuous tone images that contain many colors. It can
achieve astounding compression ratios even while maintaining very high image quality. JPG works by analyzing
images and discarding kinds of information that the eye is least likely to notice. It stores information as 24 bit
color.
1.2.2.5 RAW is an image output option available on some digital cameras. Though lossless, it is a factor of three
of four smaller than TIFF files of the same image. The disadvantage is that there is a different RAW format for
each manufacturer, and so you have to use the manufacturer‘s software to view thw images.
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
Digital watermarking is the process of inserting a digital signal or pattern (indicative of the owner of the content) into digitalcontent. The signal, known as a watermark, can be used later to identify the owner of the work, to authenticate the content,
and to trace illegal copies of the work. The concept of digital watermarking is driven by the need to caption, and control
copyrights for digital media including images and video. Early work in the same identified redundant properties of an image
or its encoding that can be modified to encode watermarking information. The early emphasis was on hiding data, since the
envisioned applications were not concerned with signal distortions or intentional tampering that might remove a watermark.
However as watermarks are increasingly used for purposes of copyright control, robustness to common signal
transformations and resistance to tampering have become important considerations. Researchers have recently recognized
the importance of perceptual modeling and the need to embed a signal in perceptually significant regions of an image,
especially if the watermark is to survive lossy compression. However this requirement conflicts with the need for the
watermark to be imperceptible. There are several approaches that address these issues.
Recently there has been significant interest in watermarking. This is primarily motivated by a need to provide copyright
protection to digital content such as audio, images and video. Digital representations of copyrighted material such as movies
offer many advantages. However the fact that an unlimited number of perfect copies can be illegally produced is a serious
threat to the rights of content owners. Watermarking can be used for owner identification, to identify the content owner,
fingerprinting, to identify the buyer of the content, for broadcast monitoring to determine royalty payments, and
authentication, to determine whether the data has been altered in any manner from its original form. The latter purpose is
somewhat different from those of copyright control and the characteristics thereof may be different.
A number of technologies are being developed to provide protection from illegal copying. Two complimentary techniques
are encryption and watermarking. Encryption protects content during the transmission of the data. Watermarking
compliments encryption by embedding a signal directly into the data. Thus the goal of a watermark is to always remain
present in the data.
There are several properties that a watermark must exhibit. These include that it must be difficult to notice, robust to
common distortions of the signal, resistant to malicious attempts to remove the watermark, support a sufficient data rate
commensurate with the application, allow multiple watermarks to be added and that the decoder be scalable.
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
The structure of a digital watermark is shown in the following figures.
Fig.1.2 Watrmark Embedding
The material that contains a digital watermark is called a carrier. A digital watermark is not provided as a separate file or a
link. It is information that is directly embedded in the carrier file. Therefore, the digital watermark cannot be identified bysimply viewing the carrier image containing it. Special software is needed to embed and detect such digital watermarks.
Kowa‘s SteganoSign is one of these software packages. Both images and audio data can carry watermarks. A digital
watermark can be detected as shown in the following illustration.
Fig.1.3 Watermark Extraction
1.3.3 Principle of Watermarking
In general, any watermarking algorithm consists of three parts:
• The watermark (payload)
• The encoder (marking insertion/embedding algorithm )
• The decoder and comparator (verification or extraction or detection algorithm)
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
Watermark insertion involves watermark generation and encoding process
Fig.1.5 Watermark Embedder (Encoder)
1.3.3.2 Watermark Generation:
Each owner has a unique watermark or an owner can also put different watermarks in different objects the marking
algorithm incorporates the watermark into the object. The verification algorithm authenticates the object determining boththe owner and the integrity of the object. The watermark can be a logo picture, sometimes a binary picture , sometimes a
ternary picture ; it can be a bit stream or also an encrypted bit stream etc. The encryption may be in the form of a hash
function or encryption using a secret key . The watermark generation process varies with the owner.
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
In the encoding process both the original data and the payload data are passed through the encoding function. The payload
signal and the original host signal now together occupy space, which was previously occupied only by the host signal. For
this purpose either the original data is compressed or redundancy in digital content is explored to make space for the
payload.
1.3.3.4 Watermark Extraction:Extraction is achieved in two steps.
First the watermark or payload is extracted in the decoding process and then the authenticity is established in the comparing
process.
1.3.3.5 Decoding Process:
The decoding process can be itself performed in two different ways. In one process the presence of the original
unwatermarked data is required and other where blind decoding is possible. Fig.1.6 and Fig.1.7 show the two processes. A
decoder function takes the test data (the test data can be a watermarked or un-watermarked and possibly corrupted) whose
ownership is to be determined and recovers the payload.
Fig1.6 Simple Decoding Process
1.3.3.6 Comparison Process:
The extracted payload is compared with the original payload (i.e. the payload that was initially embedded) by a comparator function and a binary output decision is generated. The comparator is basically a correlator. Depending on the comparator
output it can be determined if the data is authentic or not. If the comparator output is greater than equal to a threshold then
the data is authentic else it is not authentic. fig.1.8 illustrates the comparing function. In this process the extracted payload
and the original payload are passed through a comparator. The comparator output C is the compared with a threshold and a
binary output decision generated. It is 1 if there is a match i.e. C >= δ and 0 otherwise. A watermark is detectable or
extractable to be useful . Depending on the way the watermark is inserted and depending on the nature of the watermarking
algorithm, the method used can involve very distinct approaches. In some watermarking schemes, a watermark can be
extracted in its exact form, a procedure we call watermark extraction . In other cases, we can detect only whether a
specific given watermarking signal is present in an image, a procedure we call watermark detection . It should be noted
that watermark extraction can prove ownership whereas watermark detection can only verify ownership .
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
the host signal. Such a loss of information may be global, i.e. no part of watermarking can be recovered, or local i.e. only
part of the watermark is damaged. The main application of fragile watermarking is data authentication, where watermark
loss or alteration is taken as evidence that the data has been tampered with. The recovery of the information content within
the data demonstrates authentic un-tampered data. Robustness against signal distortion is better achieved if the watermark is
placed in perceptually significant parts of the signal. This is particularly evident in the case of lossy compression
algorithms, which operate by discarding perceptually insignificant data. Watermarks hidden within perceptuallyinsignificant data are likely not to survive compression. Achieving watermark robustness, and, to a major extent, watermark
security is one of the main challenges watermarking researches are facing with.
iii. Semi-fragile Watermarks
Watermark is semi-fragile if it survives a limited well specified, set of manipulations, leaving the quality of the host
document virtually intact. In some applications robustness is not a major requirement, mainly because the host signal is not
intended to undergo any manipulations, but a very limited number of minor modifications such as moderate lossy
compressions, or quality enhancement. This is the case of data labeling for improved actual retrieval, in which the hidden
data is only needed to retrieve the host data from archive, and thereby it can be discarded once the data has been correctly
assessed. Usually data is archived in compressed format, and that the watermark is embedded prior to compression. In this
case the watermark needs to be robust against lossy coding.
On the basis of method of extraction of watermark, watermarking algorithms can be classified as:
Non-Blind (Private)
Use the original signal/image to extract the embedded Watermark.
Semi-Blind (Semi Private)
Don‘t use the original signal, use side information and/or original watermark for extraction of watermark.
Blind (Public or oblivious)
Don‘t use original signal or side information for extraction of watermark.
1.3.8 Watermark embedding Techniques
a. Spatial Domain
b. Frequency Domain (Transform Domain)
c. Contourlet Domain
1.3.8.1 Spatial Domain techniques
These methods based on direct modification of the values of the image pixels, so the watermark has to be embedded in
this way. Such methods are simple and computationally efficient, because they modify the color, luminance or brightness
values of a digital image pixels, therefore their application is done very easily, and requires minimal computational
power. Spatial domain processes are expressed as
G ( x , y ) = T [ F ( x , y ) ]
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
Medical tradition is very strict with the quality of biomedical images, in that it is often not allowed to alter in any way the
bit field representing the image. Thus the watermark must be reversible, in that the original pixel values must be exactly
recovered. This limits significantly the capacity and the number of possible methods. It also constrains to have dedicated
routines to automatically suppress and introduce the mark in order to prevent the transmission of unprotected documents.
2.5.2 Defining Regions of Interest and Regions of Insertion
The watermark protects the regions of interest while being inserted in the rest of the image plane. One could be more
tolerant in the regions of non interest as they do not contribute to the diagnosis. For example to increase capacity and
robustness, one can allow the watermarking signal to be somewhat perceptible, provided its level does not disturb the
radiologist.
It has been shown that judicious alterations such as those occurring in image compression do not interfere with the
diagnosis ability. Therefore in time, the attitude demanding strict preservation of the images as a number field will be
relaxed. Thus watermark insertion methods that use the whole image, while bringing out imperceptible alterations in the
pixels will creep into the medical field as well.
2.5.3 Integrity Control
There is a need to prove that the images, on which the diagnoses or any insurance claims are based, have preserved their
integrity. One must define the ―start point‖ of integ rity, as the original captured image often must undergo certain
processing, like enhancement and contrast stretching, to be more useful to the radiologist. Thus it must be decided whichversion of the image, whether the pristine sensor output or the processed and standardized image at a certain stage by the
radiologist, is taken as the reference for integrity control. The integrity control based on the exact preservation of all the bit
planes of the image may be unnecessarily strict. Thus alternatives, specifically content-based integrity control are still open
to discussion.
2.5.4 Authentication
A critical requirement in patient records is to authenticate the different parts of the EPR, in particular the images. More
often the image is identified by an attached file or a header that carries all the needed information (e.g. the DICOM solution
to radiology images). However keeping the meta-data of the image in a separate header file is prone to forgeries or clumsy practices. An alternative would be to embed all such information into the image data itself. Another possible scheme is to
have both the DICOM header in a separate file and embed the digest of the same information in the image. An important
issue here is that how much information can be embedded. Medical data is more demanding in quality but less prone to
degradations, as compared to multimedia content. Hence tens of bits per Megabits of data is achievable within the medical
constraints.
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
Another variant application is MRI where the watermarking must satisfy the critical requirement that any arbitrary 2-D slice
extracted from this volume, even with the unknown slicing angle must provide sufficient authentication evidence on the
patient.
2.5.5 Dual Watermarking Scheme
We use a dual watermarking scheme to enhance confidentiality and authentication. We focus on two types of watermark hiding. In caption watermarking , by hiding patient‘s information in ROI, both authentication and confidentiality are
achieved and gives a permanent link between the patient and medical data. In signature watermarking , we hide the
patient‘s digital signature or identification code in RONI for the purpose of origin authentication.
2.5.6 Adaptive watermarking
To achieve better performance in terms of perceptually, invisibility and robustness, we use adaptive quantization parameters
for data hiding. Because the energy distribution is an important characteristic for digital image processing, we use a model
that employs this parameter for determining the adaptive quantization parameter. The embedding strength is more or less
proportional to the value of energy to have better robustness and transparency in this method.
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
The DCT makes a spectral analysis of the signal and orders the spectral regions from high to low energy. It can be applied
globally or in blocks. When applied globally, the transform is applied to all parts of the image, separating the spectral
regions according to their energy. When applied in blocks, the process is analogous, only the transform is applied to each
block separately.
The typical algorithm steps are:
1) Segment the image into non-overlapping blocks of 8x8;
2) Apply forward DCT to each of these blocks;
3) Apply some block selection criteria;
4) Apply coefficient selection criteria;
5) Embed watermark by modifying the selected coefficients
6) Apply inverse DCT transform on each block.The formulae for DCT transform and inverse DCT transform are given as follows:
The human eyes are more sensitive to noise in lower-frequency band than higher frequency. The energy of natural image isconcentrated in the lower frequency range. The watermark hidden in the higher frequency band might be discarded after a
lossy compression. Therefore, the watermark is always embedded in the lower-band range of the host image that
transformed by DCT is perfect selection.
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
The DWT technique provides better imperceptibility and higher robustness against attacks, at the cost of the DWT
compared to DCT schemes. Each watermark bit is embedded in various frequency bands and the information of the
watermark bit is spread throughout large spatial regions. As a result, the watermarking technique is robust to attacks in both
frequency and time domains. . However, improvements in its performance can still be obtained by viewing the image
watermarking problem as an optimization problem.
The DWT technique provides better imperceptibility and higher robustness against attacks, at the cost of the DWT
compared to DCT schemes. Each watermark bit is embedded in various frequency bands and the information of the
watermark bit is spread throughout large spatial regions. As a result, the watermarking technique is robust to attacks in both
frequency and time domains. . However, improvements in its performance can still be obtained by viewing the image
watermarking problem as an optimization problem.
3.3.3 SINGULAR VALUE DECOMPOSITION (SVD)
SVD is one of a number of effective numerical analysis tools used to analyze matrices. In SVD transformation, a matrix can be decomposed into three matrices that are the same size as the original matrix. Given a real n · n matrix A, this matrix can
be transformed into three components, U, D and V, respectively, such that
where the U and V components are n x n real unitary matrices with small singular values, and the D component is an n x n
diagonal matrix with larger singular value entries.
A‘ is the reconstructed matrix after the inverse SVD transformation.
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
The contourlet transform, is a relatively new image decomposition scheme, which provides a flexible multiresolution
representation for 2D signals. It makes use of the Laplacian pyramid decomposition (LPD) for the multiresolution
representation of the image. In the contourlet transform, the Laplacian pyramid decomposes an image into a low frequency
subband into a high frequency subband. After this, a directional decomposition is performed on every band-pass image
using directional filter banks (DFB). The contourlet transform is unequaled since the number of directional bands could be
indicated by the user at any resolution. Finally, the image is represented as a set of directional subbands at multiple scales.
Discrete contourlet transform is able to capture the directional edges and contours superior to DWT. Even though other
transform domains only conform to grayscale images, this domain can conform to DICOM images as well, which is our
area of work.
Before the embedding process the following preprocessing steps are carried out:
1. For each row of the image, the left and right edges of the image are recorded, similarly for each column of the image,
the top and bottom edges of the image are recorded too. For an image of dimensions MxN, the left and right edges of the image form two vectors L and R of size M, and the upper and lower edge of the image construct two vectors T and
B of size N. For each vector we select l = min(L), r = max(R), t = min(T) and b = max(B), and then we define a
rectangle of which the left corner has coordinates (t,l) and the bottom right one is (b,r).
2. Watermark is reshaped to binary vector (W={w 1,w2,w 3,….,w k },w k E [0,1]).
3. In view of the robustness, we choose I L, lowpass subband of decomposed IO, for embedding and W is embedded into I L
in contourlet domain. For more invisibility the embed process can be done in the detail subbands.
EMBEDDING PROCESS
IL is divided into non-overlapping blocks A i of size b x b, i=1,2,….,M, where M is the number of the blocks. The energy
value of each block Ai is computer according to:
For each block Ai, the adaptive quantization step value δi is computed as follows.
Where δo is the basic quantization step tha t is different in ROI and RONI and served as a secret key, and the function floor
represents the round off operation. Using singular value decomposition (SVD), the singular value vectors of each block A
are computed.
By the singular values of each block Ai, N si= ||S|| + 1 is computed (where ||·|| represents the Euclidean norm) and quantized
by adaptive quantization step di that represents the quantization level as follows:
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
The most used image compression is definitely JPEG. In MATLAB, for compressing an image to different quality factors,the image should be created from a matrix and be reread:
We can add a variety of noises into an image using the imnoise command in MATLAB.
A = imread('Watermarked_DWT.tif');A = imnoise(A,'salt & pepper',0.02);imshow(A);
A3: MOTION BLURRING
Motion blurring can be achieved through the following code that is inbuilt into MATLAB:
h = fspecial('motion', len, theta)
It returns a filter to approximate, once convolved with an image, the linear motion of a camera by len pixels, with an angle
of theta degrees in a counterclockwise direction. The default value of len is 9 and theta is 0, meaning a horizontal motion of
9 pixels.
H = fspecial('motion',20,45);
MotionBlur = imfilter(wc_image,H,'replicate');
imwrite(MotionBlur,’MotionBlur_DWT.tif’,’tif’);
imshow(MotionBlur)
A4: STANDARD BLURRING
h = fspecial('disk', radius) It returns a circular averaging filter (pillbox) within the square matrix of side 2*radius+1. The default radius is 5.H = fspecial('disk',10);
It returns a 3-by-3 unsharp contrast enhancement filter. alpha controls the shape of the Laplacian and must be in the range
0.0 to 1.0. The default value for alpha is 0.2.
Code:
H = fspecial('unsharp',0.5);sharpened = imfilter(wc_image,H,'replicate');imwrite(sharpened,’sharpened_DWT.tif’,’tif’); imshow(sharpened)
5.2.2 APPENDIX B : EXTRACTING REGION OF INTEREST AND NON-INTEREST
The following MATLAB code demonstrates how to select a region of interest from an image.
clc; clear all ; close all ; a=im2double(imread( '11.tif' )); imshow(a); [r,c]=ginput(4); BW=roipoly(a,r,c); [R C]=size(BW); %......Extracting ROI....................% for i= 1 : R
for j = 1 : C if BW(i,j)==1
out1(i,j)=a(i,j); else
out1(i,j)=0; end end
end %............Extracting RONI..............% for i= 1 : R
for j = 1 : C if BW(i,j)==1
out2(i,j)=0; else
out2(i,j)=a(i,j); end
end end %......Printing original image, ROI and RONI......% subplot(1,3,1), image(a), title( 'Original image' ); subplot(1,3,2), image(im2uint8(out1)), title( 'ROI' ); subplot(1,3,3), image(im2uint8(out2)), title( 'RONI' );
7/22/2019 Dual Adaptive Watermarking for Biomedical Images
Hao-Kuan Tso Department of Electrical Engineering, Chung Cheng Institute of Technology, National Defense
University, Tahsi, Taoyuan 33509, Taiwan Received 7 April 2005; received in revised form 1 July 2005; accepted 1
July 2005 Available online 25 July 200512. Watermarking Techniques Spatial Domain Digital Rights Seminar Mahmoud El-Gayyar Instructor Prof. Dr. Joachim
von zur Gathen Media Informatics University of Bonn Germany May 06
13. STUDY OF THE EFFECTED GENETIC WATERMARKING ROBUSTNESS UNDER DCT AND DWT DOMAINS
International Journal on New Computer Architectures and Their Applications (IJNCAA) 2(2): 353-360 The Society of
Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085)
7/22/2019 Dual Adaptive Watermarking for Biomedical Images