Secure Medical Image Retrieval Using Dynamic Binary Encoded Watermark

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


Technical advancement has increased the availability of medical images, which made the retrieval process for a query hectic.  Therefore, an efficient and secure retrieval technique is required along. To address this requirement, this paper has proposed a new technique named Secure and Efficient Image Retrieval (SEIR) technique. Here, to avoid the copyright violation as well as unauthorized user access SEIR uses the watermarking technique to provide authentication to the medical images.  Watermarking technique is carried out by embedding the watermark into the query image using the Dynamic Binary Encoding (DBE) technique.  Thereby, the proposed technique allows only the authenticated people to access the images presented in a database. In order to make the retrieval process efficient, SEIR uses the kNN classifier, which classifies the images in the database depending on the feature characteristic. This classification process consumes less time to retrieve the pertinent document. Therefore, the SEIR technique is secured as well as it is efficient. The experimental results show how SEIR is efficient as well as secure.
Copyright © 2013 Praise Worthy Prize - All rights reserved.


Authentication; Copyright Protection; Image Retrieval; Watermarking

Full Text:



Koch E, Zhao J,(1999), Towards robust and hidden image copyright labeling, In Workshop on Nonlinear Signal and Image Processing, pp. 452-455

Kutter M, Jordan F, Bossen F,(1997), Digital signature of color images using amplitude modulation, In the Proceedings of SPIE storage and retrieval for image and video databases , Vol. 3022, pp. 518-526

Nyeem, H, Boles W, Boyd C,(2011), Developing a digital image watermarking model, In the International Conference on Digital Image Computing Techniques and Applications (DICTA), pp. 468-473

Bors AG, Pitas I (1996), Image watermarking using DCT domain constraints, In the Proceedings of International Conference on Image Processing, Vol.3, pp.231-234

Piva A, Barni M, Bartolini F, Cappellini V (1997), DCT-based watermark recovering without resorting to the uncorrupted original image. In the Proceedings of International Conference on Image Processing, Vol. 1, pp. 520-523

Chaudhry SH,(2009), Digital Image Watermarking.

Lu W, Lu H, Chung FL, (2006), Robust digital image watermarking based on sub sampling, Applied Mathematics and Computation, Vol. 181, issue. 2, pp. 886-893

Saxena V, Gupta JP, (2008), Digital Image Watermarking

Aslantas V (2009), An optimal robust digital image watermarking based on SVD using differential evolution algorithm, Optics Communications, vol. 282, issue. 5, 769-777

Chang CC, Tsai P, Lin CC, (2005) SVD-based digital image watermarking scheme, Pattern Recognition Letters, Vol. 26, issue. 10, 1577-1586

Lai CC, Tsai CC, (2010), Digital image watermarking using discrete wavelet transform and singular value decomposition, In the IEEE Transactions on Instrumentation and Measurement, 59(11), pp. 3060-3063

Dian HW, Dong L, Jun Y, Fen-xiong C,(2007) ,An Improved Chirp Typed Blind Watermarking Algorithm Based on Wavelet and Fractional Fourier Transform, In the proceedings of Fourth International Conference on Image and Graphics, pp. 291-296

Feng Z, Xiaomin M, and Shouyi Y,(2005),Multiple-chirp typed blind watermarking algorithm based on fractional Fourier transform, In the Proceedings of International Symposium on Intelligent Signal Processing and Communication Systems, pp. 141-144

Hameed K, Mumtaz A, Gilani SAM,(2006), Digital image watermarking in the wavelet transform domain, World Academy Of Science, Engineering & Technology

Gupta P, (2012), Cryptography based digital image watermarking algorithm to increase security of watermark data, In International Journal of Scientific & Engineering Research, Vol. 3, pp. 1-4

Pitas I,(1996),A method for signature casting on digital images, In the Proceedings on International Conference on Image Processing, Vol. 3, pp. 215-218

Zeng W, Liu B,(1999), A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images, IEEE Transactions on Image Processing , Vol. 8, issue. 11, pp. 1534-1548.

Puate J, Jordan F,(1996) , Using fractal compression scheme to embed a digital signature into an image, In Proceedings of SPIE Photonics East, Vol. 96, pp. 108-118

Wang Z, Lv S, Feng J, Sheng Y, (2012), A Digital Image Watermarking Algorithm Based on Chaos and Fresnel Transform, In the proceedings of4th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Vol. 2, pp. 144-148

Podilchuk CI, Zeng W,(1998), Image-adaptive watermarking using visual models, IEEE Journal on Selected Areas in Communications, Vol. 16, issue. 4, pp. 525-539

Kamble S, Agarwal S.Srivatsava V.K, Maheshkar V,DCT based texture watermarking using GLCM, IEEE 2nd International Conference on Advanced Computing,185-189,2010

Wolfgang RB, Delp EJ, (1999), Fragile watermarking using the VW2D watermark, In the proceedings of Electronic Imaging'99, International Society for Optics and Photonics, pp. 204-213

Umaamaheshvari A and Thanushkodi .K ,A robust digital watermarking technique based on feature and transform method,in Scientific research and Essays, Vol 8(32) .pp.1584-1593, August 2013.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2023 Praise Worthy Prize