Medical Image Security Using Watermarking In Back Propagation Neural Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 9
Abstract
In modern world, medical data became more sensitive where the need of privacy became most prominent. In order to provide the privacy and authentication to the medical data which includes the medical records of a patient digital water marking technique is chosen. The aim of the paper is to authenticate the medical data by digital watermarking technique using neural networks. The host data is processed through 4 level DWT then applied to a back propagation neural network where the secret image is embedded along with different noise attacks. The obtained image is processed through IDWT which is either stored or transmitted. At viewer or receiver side the reverse process is done to extract the secret image from the watermarked image. Compared to existing neural network algorithms back propagation algorithm yields better PSNR values.
Authors and Affiliations
A. N. S. Anusha, Dr. Y. Ratna Kumar
Synthesis of High Solid Content Acrylic Resin by Emulsion Polymerization used as a Binder in Surface Coating
The achievement of high solid content acrylic latex at a low viscosity obtained by copolymerization of methylmethacrylate (MMA) and butylacrylate (BA) via emulsion polymerization method. It was found that, for the semi...
Formation and Detection of Holes in Wireless Sensor Networks
Monitoring the desired Region of interest (RoI) is one amongst the most services provided by Wireless Sensor Network. In Region of interest (RoI) the emergence of holes is inevitable because of random preparation and en...
Combined Effects of Radiation, Chemical Reaction and Porosity of the Medium on MHD Flow Past Over Plate with Heat and Mass Transfer in the Presence of Hall Current
In the present paper, we study the effects of radiation, chemical reaction and porosity of the medium on unsteady flow of a viscous, incompressible and electrically conducting fluid past an impulsively started plate wit...
Improved Data Integrity Public Auditing for Regenerating-Code-Based Cloud Storage
Cloud Computing is very important vision of computing as a utility. Using cloud storage, users can store their data into cloud. So they can enjoy high quality applications and services. Users can outsource data without...
Highly Secured Quantum Genetic Based Encryption Method with Low Complexity
The security of digital images attracts attention recently, especially when these digital images are stored in some forms of memory or send through the communication systems like wireless sensor networks. Many different...