A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality
- 840 Downloads
Hiding watermark information in medical image data files is one method of enhancing security and protecting patient privacy. However the research area of medical image watermarking has not been particularly active, partly due to concerns that any distortion could affect the diagnostic value of the medical image. These concerns can be addressed by ensuring that any image changes are kept below visual perception thresholds. In this paper the effects of image watermarking and common image manipulations are measured using the Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Measure (SSIM) and Steerable Visual Difference Predictor (SVDP) numerical metrics. Two methods of block based watermarking are compared: the Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). To ensure a fair comparison a 128-pixel block size is used which allows an identical amount of information to be embedded for each method (3072 bits multiplied by embedding strength). The results suggest that although the two methods are similar, the DCT method is preferable if localization of changes is required. If localization is not required the DWT method is supported.
Keywordsdigital image watermarking information hiding perceptual factors human observers medical image modalities
Unable to display preview. Download preview PDF.
- 1.Adams, M.D., Kossentini, F.: JasPer: a software-based JPEG-2000 codec implementation. In: International Conference on Image Processing, vol. 2, pp. 53–56 (2000)Google Scholar
- 2.Coatrieux, G., Main, H., Sankur, B., Rolland, Y., Collorec, R.: Relevance of Watermarking in Medical Imaging. IEEE-EMBS Information Technology Applications in Biomedicine, 250-255 (2000)Google Scholar
- 3.Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)Google Scholar
- 4.Dowling, J., Planitz, B., Maeder, A., Du, J., Pham, B., Boyd, C., Chen, S., Bradley, A., Crozier, S.: In: SPIE Conference on Medical Imaging, San Diego, vol. 6515, pp. 65151L1–12 (2007)Google Scholar
- 5.Madsen, M.T., Berbaum, K.S., Ellingson, A., Thompson, B.H., Mullan, B.F.: Lesion removal and lesion addition algorithms in lung volumetric data sets for perception studies. In: SPIE Conference on Medical Imaging, San Diego, vol. 6146, pp. 61460T-1–10 (2006)Google Scholar
- 7.Planitz, B., Maeder, A.: In: Perceptually-limited modality-adaptive medical image watermarking SPIE Conference on Medical Imaging, San Diego, vol. 6146, pp. 61460V-1 - 10 (2006)Google Scholar
- 8.Stallings, W.: Cryptography and Network Security, 4th edn. Prentice Hall, New Jersey (2006)Google Scholar