You are on page 1of 9

International Journal of Computational Intelligence and Information Security, Jan-Feb 2013 Vol. 4, No.

1-2 ISSN: 1837-7823

Twin Image Watermarking Technique for Medical Images


A.Umaamaheshvari * K.Prabhakaran** *Assistant Professor,SSEC,Tamilnadu **P.G Student , KSOU,Karnataka Abstract
Searching for new techniques from past values or experiment finds very interesting results nowadays. Watermarking is the process of embedding information into a image which may be used to verify its authenticity or the identity of its owners. Image watermarking has become an important tool for intellectual property protection and authentication. In the image processing medical images play an important role for clinical purposes and medical science. Medical image can be modified easily with existing image processing tools available today. The usage of security measures such as watermarking can protect the integrity of the images. In this paper a watermarking technique is suggested that incorporates two watermarks in a host medical image for improved protection and robustness. Here we use DWT based dual image watermark with host medical images. We are embedding two watermarking images into host medical image. Here the DWT coefficients of the primary watermark are modified using another smaller secondary binary image. Since the watermark has some features of host medical image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. Finally our experimental results evaluate the three different medical images with dual image watermarking process and the effectiveness of the proposed watermarking scheme is demonstrated with the aid of experimental results. Keywords: Discrete Wavelet Transform (DWT), dual watermark , Watermarking, Medical images

1.Introduction
With the rapid development of CDROM and internet, more and more digital media such as images, videos, audios are widely distributed. However, unrestricted copying and malicious tampering cause huge financial losses and problems for intellectual property rights. Therefore, information hiding has become an important research area.Watermarking schemes can be categorized into visible and invisible ones. The latter are more popular and are further categorized into robust and fragile watermarks. Robust watermarking schemes must be able to extract the watermark after one or more of a variety of attacks. After an attack and when the watermark has been extracted, the watermark should be as correlated as highly as possible with the original watermark. Contrary to a robust watermark, fragile watermarks become totally deformed after even the slightest modification of the media, and are used mainly for authentication purposes. In a modern health care, system such as HIS (Hospital Information System) and PACS (Picture Archiving and Communications System) forms the information technology infrastructure for a hospital. Advancement of medical information system had changed the way patient records are stored, accessed and distributed. The integrity of the records such as medical images needs to be protected from unauthorized modification or destruction of information on the medical images. Current security measures used to protect the integrity of the patient records are such as VPN (Virtual Private Network), data encryption and data embedding [1]. Data encryption is being used on the Internet to protect sensitive data during its transmission. It is also being used to protect medical images in the form of digital signature. The problem with digital signature is that it needs to be transmitted together with the image in a separate file or in the image header. There is a risk of losing the signature in transmission. The signature will also be lost if there is no space in the header as the image file is converted to another format. Data embedding is where related information such as digital signature can be inserted into the medical images as a watermark. Watermark provides three objectives in medical images [2]: Data hiding, for embedding information to make the image useful or easier to use; Integrity control, to verify that the image has not been modified without authorization; Authenticity that is to verify that the image is really what the user supposes it is. Various watermarking schemes have been developed in spatial or in the transform domain [3]-[4]. In the concept of dual watermarking, two watermarks are embedded instead of one for increased protection and security that has been proposed earlier in both spatial and transform domains [5]-[6], [7]-[8]. In this paper, Discrete Wavelet Transform (DWT) domain is used for our medical image and the watermark is embedded in the mid-frequency region of the image, to achieve perceptual invisibility as well as robustness to attacks [9].

International Journal of Computational Intelligence and Information Security, Jan-Feb 2013 Vol. 4, No. 1-2 ISSN: 1837-7823 In paper a watermarking technique is suggested that incorporates two watermarks in a medical image for improved protection and robustness. We use DWT based dual image watermark with host medical images. Here a new approach for embedding is proposed, wherein, the watermark pixels are chosen pseudo randomly, besides pseudo-randomly selecting the Locations for embedding the watermark in the mid-frequency region of the medical images. This increases the security. The highlight of the process is that we incorporate both extraction and embedding methods into one watermarking scheme i.e. the sign is embedded into the logo to create a signed-logo which is then embedded into the cover image. Thus we achieve a two-level security by actually using only one watermark. In any watermarking scheme, the watermark is also an official property of the embedding authority. The concept of signing the watermark rules includes any possibility of malicious use of the watermark. The original logo is available only to the authentic receivers. The standard deviation of the second level and first level mid-frequency coefficients of the cover image are used in both blind and non-blind methods respectively [10]-[11]. The rest of the paper is organized as follows. Section 2 focuses on survey of existing image watermarking algorithms and also medical image watermarking algorithms. Section 3 describes the watermarking in medical images and Section 4 describes our proposed system with embedding algorithm. In Section 5 we explain the watermark extraction operation. In Section 6 we present the experimental results and conclude in Section 7.

2. Literature survey
Recently, many watermarking algorithms have been proposed for medical image authentication. Because of the importance of the security issues in the management of medical information, we suggest to use watermarking techniques to complete the existing measures for protecting medical images. A watermarking algorithm consists of the watermark structure, an embedding algorithm, and an extraction, or a detection algorithm [12]. LSB based watermarking in spatial domain is the straightforward method, But LSB based watermarking as well as LSB based watermarking with pseudo random generator are not secured methods. [13]. In CWT, Calculating wavelet coefficients at every possible scale is huge amount of work, and it generates a lot of data. There is highly redundant information as per as the reconstruction of the signal is concerned. Due to the attractive features of Discrete Wavelet Transform, researches have been focused on DWT [15]. Wang Hongjun, Li Na have proposed a DWT based method [14] in which watermark was embedded in middle frequency coefficient using as flexing factor with = |m| ,where m is mean value of all coefficients watermarking embedded. But this method doesnt provide enough security. The method proposed in [14] using DWT was extended in [15] to enhance security of algorithm by using Arnolds Transform pretreatment for watermark. But this method can be extended to improve PSNR and security levels. An Integer Wavelet Transform with Bit Plane complexity Segmentation is used with more data hiding capacity, for color images [16]. But this method needs separate processing for R, G and B components of color image and technique is time consuming. The algorithm published in [17] performs twolevel decomposition using the Haar wavelet filters. Pseudo Random Noise codes are only added to the large coefficients of the high and middle frequency bands of the DWT transformed image. Although the watermark was invisible, it proved to be fragile against low pass and median filtering. In [18], on the other hand, independent component analysis (ICA) is combined with DWT and DCT. The approximation of the DWT transformed host image is then DCT transformed where the watermark is added. The invisible watermark was easy to detect through ICA however it was not robust enough to survive high pass filtering.As given in [19], Harsh Varma et. Al tested CDMA based watermarking scheme with spatial domain and frequency domain with DCT as well as DWT. But these algorithms have low information hiding capacity. Watermarking is also used for other purposes other than to ensure authenticity and integrity. Medical image functionality is enhanced by using watermarking as proposed by [20]. In [21], dual watermarking was proposed by combining robust and fragile watermarking techniques. Robust watermarking are resistant to possible attacks such as image processing. Fragile watermarking can be easily destroyed or undetectable after modification is done on the image. But fragility is an advantage, where it can be used for authentication. The scheme is done by embedding fragile watermark into the result of robust watermarking. The former is executed in the spatial domain and the latter is executed in the DWT. The results of proposed method is compared with the existing method [22].But the dual watermarking process has some security risks in medical images. Through our literature survey on current image watermarking algorithms are working in the image processing scenario, we can find that heterogeneity, dynamism, computation ,Embedding and data separation are the primary challenges concerned by current research on this topic.

2. 1Watermarking in medical images


A watermarking algorithm embeds a visible or invisible watermark in a given multimedia object. The embedding process is guided by use of a secret key which decided the locations within the multimedia object (image) where the watermark would be embedded. Once the watermark is embedded it can experience several attacks because the multimedia object can be digitally processed. The attacks can be unintentional (in case of images, low pass filtering or gamma correction 5

International Journal of Computational Intelligence and Information Security, Jan-Feb 2013 Vol. 4, No. 1-2 ISSN: 1837-7823 or compression) or intentional (like cropping). Hence the watermark has to be very robust against all these possible attacks. Example of simple Watermark embedding & detection is shown in Fig.1

Figure 1: Watermark embedding and detection process

After proceeding to the watermarking schemes and methods, the foundation of watermarking, requirements in medical images, types of domain and performance measurement methods will be discussed in this section. As a basic, watermarking system in medical image is shown in Fig 2

Figure 2: Image watermarking

The encoder, E embeds the watermark, W inside original image I by using embedding function, E as shown in equation (1). E (I, W) = IW-------------------- (1) The output from this process is IW, the watermarked image. The decoder, D will detect or extract the watermark, W from the original image as in equation (2). D (I, IW) = W -------------------- (2) There are three requirements for medical image watermarking as mentioned by [2]. Imperceptible/reversible Medical images often not allowed to be modified in any way. Watermark scheme being used needs to be reversible and the exact pixel value needs to be recovered. The capacity and the number of possible methods had been limited significantly because of this requirement. Another method would be using the whole image for watermarking where imperceptible modification of the pixels is done. Integrity control There is a need to decide when integrity control will take place. Medical images will often go through enhancements before it can be used. It is also necessary to decide the version of the image to be taken as the reference for integrity control.

International Journal of Computational Intelligence and Information Security, Jan-Feb 2013 Vol. 4, No. 1-2 ISSN: 1837-7823

Authentication It is a critical requirement that the different part of the patient records can be authenticated such as the images. Usually, an attachment file or a header is used which consist of information to identify an image. This method does have it setback where separate file header is exposed to forgery and clumsy practices.
2.2 Our proposed system

Dual image watermarking with medical image: In this paper, we aim to provide a dual image watermarking schemes used in medical imaging for authentication. We use DWT for dual image watermarking concept. The DWT (Discrete Wavelet Transform) separates an image into four components, a lower resolution approximation image (LL) a horizontal (HL), a vertical (LH) and a diagonal (HH) detail component. The process can then be repeated to computes multiple scale wavelet decompositions. One of the many advantages of the wavelet transform is that that it is believed to more accurately model aspects of the HVS (Human Visual System) as compared to the FFT or DCT. This allows us to use higher energy watermarks in regions that the HVS is known to be less sensitive to, such as the high resolution detail bands {LH, HL, and HH). It shows below in the Fig 3. Embedding watermarks in these regions allow us to increase the robustness of our watermark.

Fig 3: Single Level Decomposition using DWT

Advantages of DWT: i. No need to divide the input coding into non-overlapping 2-D blocks, it has higher compression ratios avoid blocking artifacts. ii. Allows good localization both in time and spatial frequency domain. iii. Transformation of the whole image introduces inherent scaling The concept of embedding two watermarks into the cover medical image by actually embedding only one is introduced here, wherein features from the host image as well as the secondary watermark are used. This is carried out by modifying the DWT coefficients of the primary watermark (a grayscale logo/image) based on another meaningful secondary binary image (the sign) and some statistical features of the cover image, prior to embedding into the cover image. The sign is virtually embedded into the cover image through the logo i.e. the signed-logo is embedded into the cover image. A new approach for embedding is proposed, wherein, the watermark pixels are chosen randomly, besides randomly selecting the locations for embedding the watermark in the mid-frequency region of the source image. This increases the security of the cover image. The highlight of the process is that the sign is embedded into the logo to create a signed-logo which is then embedded into the cover image. Thus we achieve a two-level security by actually using only one watermark. Moreover in any watermarking scheme, the watermark is also an official property of the embedding authority. The concept of signing the watermark rules out any possibility of malicious use of the watermark. The original logo is available only to the authentic receivers. The standard deviation of the second level and first level mid-frequency coefficients of the cover image are used. Now we explain the embedding and extracting process. Here embedding the dual secret data and the extract the same process in medical image is enhancing the security and watermark protection. Watermark Embedding Process: As we discussed above the dual watermark embedding process is done by DWT using single value decomposition. We take the original medical image as input and give to DWT process. After performing the single level decomposition we get the medical images into sub blocks with mid frequency like HL and LH. Here we are embedding two watermarked image with original cover medical image. For improving the security we will select the pixel values of the watermark which are to 7

International Journal of Computational Intelligence and Information Security, Jan-Feb 2013 Vol. 4, No. 1-2 ISSN: 1837-7823 be embedded/extracted. The keys values are selected by randomness which is helpful to improve the authentication of the process. The embedding process is shown in fig 4 In the embedding process, first the sign (p x q binary image) is embedded into the logo (m x n grayscale image) It will produced the signed logo of (pq *1) which is also a watermark image. This dual image watermark is encoding with sub blocks In HL and LH of original medical image (n*n). Encoding is done using the keys K3, K4 to determine the embedding location (EM, a 2D array) within each of the selected sub blocks. For any ith sub block,

Where the index i varies from 1 to pq and indicates the sub block number; M is the total size of each sub block; Si refers to ith sub block; Ci(x,y) is the DWT coefficient of the location (x,y) within the i th sub block. For ith sub block, the mean and standard deviation (std) are calculated using only (M-1) locations (i.e. excluding the embedding location EM i (x,y)). For finding the different threshold levels the following formula has been defined: Th(j) = A*std(i)+B*j Where j is the running index which decides the 256 unique threshold values and A, B are secret keys. Based on the value of Lw(i), a value is assigned to EMi (x,y) depending on the value of the corresponding threshold Th(i). A parameter Q is used for quantization as shown: EMi (x,y) = EM i (x,y)/Q Where EMi (x,y) is the new value assigned to EMi(x,y). By following the above procedure Wm can be uniformly embedded into the LH and HL sub bands. Finally, the IDWT is taken which results in the watermarked image.
2.3Watermark

Extraction Algorithm

The extracting process consists of two stages that show in Fig 4. We discuss the extraction procedure of the signed logo in stage 1 followed by the sign in stage 2. In stage 1 we extract the signed logo from original medical image. In some cases, the extracted coefficient may not equal to any of the original co efficient value calculated. This might be due to any intentional/unintentional attack on the watermarked image. In such cases the lost watermark pixels can be reconstructed with the help of the recovered neighboring pixel values. Thus if a smooth grayscale watermark is chosen, it improves the efficiency of the watermark extraction even during attacks. In stage 2 from the signed logo which is obtained from stage 1 the sign is extracted using the original logo. The original logo and the extracted logo are divided into sub blocks and transformation is taken as explained in the embedding procedure. The sum of the mid-frequency coefficients of each corresponding sub block is then compared and based on their difference the sign bit is determined. Based on the signed bit we extract the watermark image. But it is impossible to extract the watermark without the secret keys. In watermark extracting process the secret keys are together with the watermark images and these keys are used in embedding and extracting process. The encoding and decoding process are used same secret keys. These keys are indicted only the authenticated person should be extract the original cover and medical image. Furthermore the original logo can be made available only to authorized receivers who will be able to extract the sign.

International Journal of Computational Intelligence and Information Security, Jan-Feb 2013 Vol. 4, No. 1-2 ISSN: 1837-7823

Figure 4: Block diagram to embed and extract the water image

3. Experimental results
This section compares the image quality of three medical images that were embedded with a dual image watermarks. First, the three test images are presented. This is followed by a discussion on the watermarks that have been hidden in the images. The quantitative image quality results of each experiment are shown next. In the proposed twin image in watermarking scheme with medical image, the watermark extraction compared with the original image for calculating PSNR, MSE and SSIM. Finally, the values of these for each medical image data is calculated and discussed. Three medical images were used in the watermarking experiment. The first image is from a Computed Tomography (CT) modality. The second image is from a Magnetic Resonance Imaging (MRI) modality. The third image was ULTRA images. Performance measures The performance of the watermarking is crucial to ensure the fidelity and quality of the watermarked images. Watermarking performance can be measured in terms of perceptibility. Below are three methods that can be used. Structural Similarity Index Measure This SSIM is defined as:

MSE (Mean Square Error) MSE is one of the simplest functions to measure the perceptual distance between watermarked and un watermarked images. This is defined as:

Where pq is the size of two images f and f*. Which is average term by term difference between the original image, f and the watermarked image, f* PSNR (Peak Signal to Noise Ratio) The metric used for evaluating the quality of extracted watermark and watermarked image is PSNR (Peak Signal to Noise Ratio).It is used to measure the similarity between images before or after watermarking. This is defined as:

PSNR is to be determined by MSE and n is taken to be 256. 9

International Journal of Computational Intelligence and Information Security, Jan-Feb 2013 Vol. 4, No. 1-2 ISSN: 1837-7823 Normalized Correlation Factor formula(NC) NC = mnI(m,n)*I(m,n) _______________ mnI(m,n)*I(m,n) Comparison:
Table 1: Showing the PSNR value for three medical images

CT images 58.0635 58.789 57.0281 54.1545 59.2029

MRI images 58.2338 62.6708 57.7416 56.1926 54.2893

ULTRA images 56.4154 58.5959 65.2235 55.7787 55.9807

Figure 5: Comparison of three medical images using PSNR value

Table 2: Showing the MSE value for three medical images ULTRA images 0.1484 0.0898 0.0195 0.1719 0.1641

CT images 0.1016 0.0859 0.1289 0.25 0.0781

MRI images 0.0977 0.0352 0.1094 0.1562 0.2422

Table 3: Showing the SSIM value for three medical images ULTRA images 0.8899 0.8807 0.8898 0.8066 0.857

CT images 0.8422 0.8431 0.8422 0.9446 0.8583

MRI images 0.8446 0.8811 0.8698 0.8955 0.8858

10

International Journal of Computational Intelligence and Information Security, Jan-Feb 2013 Vol. 4, No. 1-2 ISSN: 1837-7823

Table 4: Showing the comparison of PSNR value of proposed method with existing method Type of Images Proposed system MSE CT image MRI image ULTRA sound image 0.0781 0.0352 0.0195 PSNR 59.2029 62.6708 65.2235 SSIM 0.8583 0.8811 0.8898 Reference paper(22) PSNR 30.9 They have calculated the PSNR using median filter

Table 5 : Showing the Different attacks of the proposed method Normalized correlation Factor values Computer Magnetic Ultrasou tomography Resonance nd image Image Image 1 1 1 1 0.9573 1 1 0.9362 0.9682 1 0.8290 0.8467 0.8014 0.6876 0.5014 0.7012 0.4632 0.4910 0.5807 0.5323 0.3230 0.7269 0.6501 0.6878 1 0.9857 0.9506 1 1 0.9810 1 1 1 0.8280 0.9302 0.9302 0.8786 0.8510 0.7210 0.7994 0.7000 0.6622 1 1 1 1 1 1 0.9390 0.8970 0.8762 1 0.9830 0.9030 0.9661 0.9125 0.9390 0.8777 0.8667 0.8352

Type of Attack No Attack R(1) R(10) R(30) R(60) R(75) S(0.2) S(0.5) S(0.9) S(1.1) S(1.3) S(1.5) S(1.7) S(1.9) T(5) T(10) R(5)+S(0.8) R(10)+S(0.8) R(15)+S(0.8) R(30)+S(0.8)

X-ray

1 0.9573 1 0.8150 0.5011 0.4861 0.5311 0.6878 1 1 1 0.9763 0.7516 0.7100 1 1 0.9660 0.7587 0.9628 0.7801

Conclusion
Watermarking in medical images provides promising alternative to current security tool used to protect the integrity of medical images. There are various types of watermarking scheme that uses different types of domains to ensure protection of medical images and perform recovery of a tampered image. A dual watermarking technique in the DWT domain is suggested and implemented using the MATLAB software. The measured performance of the technique proves its robustness against several kinds of attacks. The highlight of the algorithm is that besides protecting the copyright of the host medical image it also protects the watermark from any misuse. Since the embedding process uses data from the source image as well, the extraction of watermark by an unauthorized person is not possible. In previous paper [24] we discussed about the PSNR and SSIM values. Then we extended our paper for calculating the normalized correlation factor for various types of attack.It thus serves the purpose of providing copyright protection to the watermark and increasing the security of the whole process. The proposed watermarking scheme has been experimented with different CT images, ULTRA images and MRI images and the experimental results revealed the efficiency of the proposed watermarking scheme.

11

International Journal of Computational Intelligence and Information Security, Jan-Feb 2013 Vol. 4, No. 1-2 ISSN: 1837-7823

References
[1] Cao F., Huang H. K., and Zhou X.Q., ,( 2003 ),Medical image security in a HIPAA mandated PACS environment t,Computerized Medical Imaging and Graphics, vol 27,pp.185-196. [2] Coatrieux, G., Main, H., Sankur, B., Rolland, Y. and Collorec, R.,( 2000), Relevance of watermarking in medical imaging, in Proceedings of IEEE-EMBS Information Technology Applications in Biomedicine, pp. 250-255. [3] Darko Kirovski, Henrique S. Malvar and Yacov Yacobi,( 2002), Multimedia Content Screening using a Dual Watermarking and Fingerprinting System, Proceedings of the tenth ACM international conference on Multimedia, pp.372 381. [4] .Mingyi Jiang. Giiopiiig Xo and Dongfeiig Yuan, (2004), A Novel Blind Watermarking Algorithm Based on Multiband Wavelet Transform, Proceedings of ICSP, pp. 857-860. [5] Saraju P.Mohanty, K.R. Ramakrishnan and Mohan Kankanhalli,(1999) A Dual Watermarking Technique for Images, Proceedings of the 7th ACM International Multimedia Conference, pp. 49-51. [6] .R.Dhanalakshmi, K.Thaiyalnayaki, (2010) Dual Watermarking Scheme with Encryption, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1, pp. 248-253. [7] Peining Tao, Ahmet M. Eskicioglu, (2004) A Robust Multiple Watermarking scheme in Discrete Wavelet Transform domain, Optics East. [8] Hung-H. Tsai, Chi-C. Liu, Kuo-C. Wang, (2007) Blind Wavelet-based Image Watermarking based on HVS and Neural Networks. [9] A. Miyazaki, A. Okamoto. (2002) Analysis of watermarking systems in the frequency domain and its application to design of robust watermarking systems, IEICE Trans., Vol E85, No 1, pp.117- 124. [10] Umaamaheshvari.A and Thanushkodi.K,(2012), Survey of Watermarking Algorithms for medical images pp.401410,IJETT. [11] Zhang Guannan, Wang Shuxun and Nian Guijun, (2004) A Blind Watermarking Algorithm Based on DWT Color Image, Intl. Symposium on Multi-Dimensional Mobile Communications, Vol. 2,pp. 634- 638. [12] Saraju P mohanty ,N Ranganathan,(2007),VLSI architecture and chip for combined invisible robust and fragile watermarking, in proceedings of the IEEE workshop on signal processing system. [13] .Wei-Min Y., (2009 ) , A Watermarking Algorithm Based on Wavelet and Cosine Transform for Color Image, First International Workshop on Education Technology and Computer Science, pages: 899- 903. [14] Wang Hongjun, Li Na,(2005), An algorithm of digital image watermark based on multiresolution wavelet analysis, International Workshop on VLSI Design and Video Technology, Proceedings, pp: 272- 275. [15] Na Li; Xiaoshi Zheng; Yanling Zhao; Huimin Wu; Shifeng Li ,(2008)Robust Algorithm of Digital Image Watermarking Based on Discrete Wavelet Transform, Electronic Commerce and Security, International Symposium ,Volume, Issue , Page(s):942 945. [16] Cheng-qun Y.,(2007), Color Image Watermarking Algorithm Based on DWT-SVD, Proceeding of the IEEE International Conference on Automation and Logistiocs ,China, PP: 2607-2611 [17] X. Xia, C. Boncelet, and G. Arce,(1997), "A multiresolution watermark for digital images," in Proc. IEEE Int. Conf. Image Processing , vol.1, Santa Barbara, CA, pp. 548-551. [18] Ju Liu, Xiangang Zhang, Jiande Sun and Miguel Angel Lagaunas,(2003), "A Digital Watermarking Scheme Based on ICA detection", Proceedings of the 4th International Symposium on Independent Component Analysis and Blind Signal Separation, Japan. [19] Harsh Varma, Abhishek Singh, Raman Kumar ,(2009)Robustness of Digital Image Watermarking Techniques against brightness and rotation attacks, (IJCSIS) International Journal of Computer Science and Information Security, Vol No:1. [20] Coatrieux, G, Le Guillou, C., Cauvin, J.-M., Roux,(2009), Reversible watermarking for knowledge digest embedding and reliability control in medical images, IEEE Transactions on Information Technology in Biomedicine, vol 13, issue 2, pp.158 165. [21] Sung Jin Lim, Hae Min Moon, Seung-Hoon Chae, Sung Bum Pan, Yongwha Chung, Min Hyuk Chang, (2008),Dual watermarking method for integrity of medical images, in Proceedings of Second International Conference on Future Generation Communication and Networking, vol. 2, pp.70-73. [22]A.Umaamaheshvari, K.Thanushkodi, (2012),A DWT based Dual Image Watermarking Technique with Medical Image for Authenticity and Security, International Journal of Systems , Algorithms & Applications Vol.2 Issue 6.

12

You might also like