QR Codes Application for Reversible Watermarking Algorithm in Biomedical Images

被引:0
作者
Panyindee, C. [1 ]
Pintavirooj, C. [1 ]
机构
[1] Rajamangala Univ Technol, Dept Comp Engn, Fac Engn, Rattanakosin 73120, Nakhon Pathom, Thailand
来源
6TH BIOMEDICAL ENGINEERING INTERNATIONAL CONFERENCE (BMEICON 2013) | 2013年
关键词
Biomedical images; prediction-error expansion; reversible watermarking; QR codes; DIFFERENCE EXPANSION; PREDICTION;
D O I
暂无
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
This paper presents an algorithm in reversible watermarking or lossless data hiding, the application associated with the quick response codes (or call QR codes) and the biomedical images. QR code is random patterns, looks like random noise which can be commonly found on the webpages. We can use the smartphone camera to capture the QR code at the webpage, and then the hyperlink corresponding to the QR code can be accessed instantly. The biomedical imaging plays a significant role in diagnosing at the present time. The diagnose information given by biomedical images is important for designing the proper treatment for each patient, this information is personal and cannot be disclosed according to ethics. We have applied the QR code with data embedding in biomedical image in order to retain the confidential information. Our algorithm uses prediction errors to embed the QR codes into different biomedical images models which are diverse in the nature structure. A sorting technique is used to record the prediction errors based on magnitude of its local variance. Using sorted prediction errors reduce location map size and allow us to embed more data into the biomedical image with low distortion. Experimental results also demonstrate the applicability of the proposed algorithm.
引用
收藏
页数:4
相关论文
共 50 条
[41]   A Reversible and Imperceptible Watermarking Scheme for MR Images Authentication [J].
Qasim, Asaad F. ;
Meziane, Farid ;
Aspin, Rob .
2018 24TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC' 18), 2018, :95-100
[42]   Ownership protection of plenoptic images by robust and reversible watermarking [J].
Ansari, A. ;
Hong, S. ;
Saavedra, G. ;
Javidi, B. ;
Martinez-Corral, M. .
OPTICS AND LASERS IN ENGINEERING, 2018, 107 :325-334
[43]   Low distortion reversible database watermarking based on hybrid intelligent algorithm [J].
Cai, Chuanda ;
Peng, Changgen ;
Niu, Jin ;
Tan, Weijie ;
Tang, Hanlin .
MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 20 (12) :21315-21336
[44]   Genetic algorithm and difference expansion based reversible watermarking for relational databases [J].
Jawad, Khurram ;
Khan, Asifullah .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (11) :2742-2753
[45]   An Adaptive Feedback Based Reversible Watermarking Algorithm using Difference Expansion [J].
Ghosh, Sudip ;
Das, Nachiketa ;
Das, Subhajit ;
Maity, Santi Prasad ;
Rahaman, Hafizur .
2015 IEEE 2ND INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION SYSTEMS (RETIS), 2015, :207-212
[46]   Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques [J].
Abdullah, Shahidan M. ;
Manaf, Azizah A. .
NETWORKED DIGITAL TECHNOLOGIES, PT 1, 2010, 87 :333-342
[47]   FPGA implementation of reversible watermarking in digital images using reversible contrast mapping [J].
Maity, Hirak Kumar ;
Maity, Santi P. .
JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 96 :93-104
[48]   A simplified table lookup decoding algorithm for binary QR codes [J].
Bao X.-M. ;
Qu Y.-Y. ;
Wu D.-J. ;
Yuan Z.-H. ;
Liu X. ;
Li M. .
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2016, 45 (05) :791-795
[49]   A Survey of Reversible Watermarking Techniques, Application and Attacks [J].
Thilagavathi, N. ;
Saravanan, D. ;
Kumarakrishnan, S. ;
Punniakodi, Sakthivel ;
Amudhavel, J. ;
Prabu, U. .
ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
[50]   Reversible and Robust Watermarking using Residue Number System and Product Codes [J].
Atta-ur-Rahman ;
Naseem, Muhammad Tahir ;
Muzaffar, Muhammad Zeeshan .
JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (03) :156-163