Comparison of PSNR of DCT, DWT and DTT using Telenuclear Medical Image

N. Harathi*, V. Meenakshi**, C.H. Suneetha***
*-** Assistant Professor, Department of EIE, Sree Vidyanikethan Engineering College, Tirupati.
*** Associate Professor, Department of ECE, Vignana Bharathi Institute of Technology, Aushapur.
Periodicity:July - September'2014
DOI : https://doi.org/10.26634/jip.1.3.2961

Abstract

The proliferation of digitized media due to the rapid growth of networked multimedia systems has created an urgent need for copyright enforcement technologies that can protect copyright. In this paper implementation of three different watermarking algorithms in the frequency domain is presented. The first algorithm is based on the Discrete Cosine Transform (DCT), the second one is based on the Discrete Wavelet Transform (DWT) and the third algorithm is based on the Discrete Tchebichef Transform (DTT).Embedding the watermark is done by modifying the coefficients of the middle frequency band so that the visibility of the image and diagnosis capability will not be affected. All schemes are tested using images and the simulation results are compared and the comparison shows the best scheme.

Keywords

Keywords: DCT, DWT, DTT, PSNR, Image watermarking.

How to Cite this Article?

Harathi, N., Meenakshi, V., and Suneetha, C.H. (2014). Comparison of PSNR of DCT, DWT and DTT using Telenuclear Medical Image. i-manager’s Journal on Image Processing, 1(3), 23-32. https://doi.org/10.26634/jip.1.3.2961

References

[1]. Suzuki and M. Nakamura, (1997). "Internet in Nuclear Medicine", Annals of Nuclear Medicine.
[ 2 ] . General Nuclear Medicine (http://www radiologyinfo.org)
[3]. R. Schyndel, A. Tirkel and C. Osborne, (1994). "A Digital Watermark", Proceeding of IEEE International Conference on Image, Vol.2.
[4]. C. Wang, S. Tai and C. Shou, (2000). "Repeating Image Watermarking Technique by the Visual Cryptography", IEICE Trans. Fundamentals, Vol.E83.
[5]. I. Cox, M. Miller and J. Bloom, (2001). "Digital Watermarking". New York: Morgan Kaufmann.
[6]. A. Sakova, (2004). "DCT versus WHT for Fragile Image Watermarking", Journal of Electrical Engineering, Vol. 55.
[7]. S. Maity and M. Kundu, (2009). "DHT Domain Digital Watermarking With Low Loss In Image Information", Science Direct, AEU - International Journal of Electronics and Communications.
[8]. V. Licks and R. Jordan, (2000). "On Digital Image Watermarking Robust To Geometric Transformation", Proc. IEEE Int. Conf. Image Processing, Vol.3.
[9]. A. Wakatani, (2002). “Digital Watermarking for ROI Medical Images by using Compressed Signature Image” Proceedings of the 35th International Conference, 2043 – 2048
[10]. Yusuk Lim, Changsheng Xu, and David Dagan Feng, (2001). “ Web based Image Authentication using Invisible Fragile Watermarking” Pan-Sydney Area Workshop on Visual Information Processing.
[11]. Hemin Golpira and Habibollah Danvali (2009). “Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting”, IEEE, 31-36
[12]. C.-T. Hsu, J.-L. Wu, (1999). "Hidden Digital Watermarks in Images", IEEE Transactions on Image Processing, Vol. 8, pp. 58-68.
[13]. Jingbing Li, Huaiqiang Zhang, Yen-wei Chen, (2012). “Robust Zero-Watermarking for Medical Image Based on DCT” Photonics and Optoelectronics (SOPO), Symposium, 21-23 May 2012, 1-4.
[14]. E. Ganic and A. M. Eskicioglu, (2004). “Secure DWTSVD Domain Image Watermarking: Embedding Data in All Frequencies,” ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, September 20-21.
[15]. Akshya Kumar Gupta, Mehul S Raval, “A Robust and Secure Watermarking scheme based on Singular Value Decomposition” Sadhana, Volume 37, Issue 4 , pp 425- 440.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.