Online ISSN: 2515-8260

Keywords : watermarking


M.Bommy, Paritala Jhansi Rani, Thomas Abraham J V, Gunjan Chhabra,Suresh Kumar Sharma, MK Jayanthi Kannan

European Journal of Molecular & Clinical Medicine, 2022, Volume 9, Issue 7, Pages 8546-8555

With the growth of the Internet, cyberattacks are evolving quickly, and the state of cyber security is not promising. Cyber security is often an extension of traditional information technology (IT) security that aims to safeguard systems, applications, and data that are vulnerable to various online assaults, such as data theft and espionage as well as data manipulation and denial of service attacks. Due to the losses incurred by countries, companies, and people as a result of numerous cybercrime assaults, there is a need for an increase in cyber security research. This study examines deep learning (DL), watermarking techniques for cyber security applications and illustrates how deep learning and water making is used in cybersecurity and how state-of-the-art solutions may be outperformed by deep learning ones. We advise professionals to think about integrating deep learning into security systems.

Medical Image Security Analysis and Enhancement for Telemedicine Applications

Vijay Krishna Pallaw; Kamred Udham Singh

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 2229-2242

With the remarkable development of digital medical images and high-speed transmission networks and computer technologies in current year, authenticity and security of the medical images have been big issues for E-health application. In order to this many different remarkable watermarking strategies and concepts have been introduced by researchers. In this paper we concentrate on the possibilities for assurance of medical images using the principle of digital watermarking. There are many methods it looks from their basic perspective. One of them perspective is security to ensure authenticity and copyrights. Other we discuss watermarking methods classification which are based on different parameters such as: insertion domain (spatial and frequency domains)..

An Analysis of Different Watermarking Schemes for Medical Image Authentication

Lalan Kumar; Kamred Udham Singh

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 2250-2259

These days enormous amounts of information are at almost everyone’s disposal with a single click of a button, and that too on a hand-held device. Data can be present in various forms like still images and slides of pictures like a video or GIF, over various websites present on the Internet. Because of the excessive use of this data, it also becomes important to secure it as it can be duplicated, transformed, stolen, tampered or misused pretty easily. Recently, there has been a spike increase in the use of medical images in various E-health applications. In order to counter these potential threats, a number of watermarking techniques are being developed. A watermark is embedded in an image in the form of some pattern that can be used to authenticate the integrity of the image. This paper deals with the various algorithms that have been developed, proposed and utilized in recent years to solve the highly complex problems that have been faced while trying to secure the medical images from different kinds of threats. Alongside the survey of the techniques, this paper also goes through the concept of watermarking, properties of watermarking, various challenges faced by watermarking for medical images and the summary of different techniques for watermarking.

Data Coloring in Trusted and Ambiguous Cloud Computing using Sheltered Possessions Machine Learning Technique

Ellappan Venugopal; Dr Rajesh Thumma; Dr. R. Sreeparimala; Dr.Anusha K; Dr. T. Thulasimani

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 2, Pages 3270-3276

Confidence and security prevent businesses from fully embracing cloud platforms. To protect the
clouds, providers must first secure virtualized data-center resources, uphold user privacy, and protect data
integrity. The authors suggest that the trust overlay network be used through multiple data centers to implement
a reputation system to build trust between service providers and data owners. Data coloring and software
watermarking methods protect shared data objects and highly distributed software modules. These strategies
protect multi-path authentication, enable a single sign-on in the cloud, and tighten access control for sensitive
data in the public and private clouds. Protection against tampering is tamper proofing, so unauthorized changes
to the software (for example, removing a watermark) can lead to passive code. We will briefly examine the
technology available for each type of protection. P2P technology opens our work to low cost copyrighted
content delivery. The advantages are mainly delivery cost, high content availability and copyright compliance in
exploring P2P network resources.

Secure Hybrid Watermarking Technique In Medical Imaging

G. Nagaraju; P. Pardhasaradhi; V. S. Ghali; G.R.K Prasad

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 5, Pages 160-176

Medical imaging organizations currently face a significant problem with stealing of medical data. Watermarking is a powerful tool that can be used to authorize the hidden information in cover image. The unique features associated with watermarking are authorization and copyright protection. Because of its unique characteristics, watermarking associated with medical data hiding gives more robustness in medical imaging. In spite of this adding security to watermarking in medical imaging, gives more protection for medical information. This paper explored two main fields that, the encryption of medical images using DNA Encoding and Spatiotemporal Chaos Algorithm and the embedding of medical images in cover image using hybrid transformation of NSCT, RDWT and SVD. The goal of this study was to develop a methodology to improve the robustness, imperceptibility and security for medical information without implementing a physical model, thus saving time, money and reducing the risks associated with hacking partners. For this paper, I used patient health document as one watermark and his medical image as another watermark. The theoretical model has demonstrated that it is possible to use this type of technique and apply it to a complex digital image transmission. The correlation observed before and after encryption and embedding procedures. Experimental results show how robustness and imperceptibility and security of medical images are improved.