By Topic

A novel approach for spatial domain authentication system design in telemedicines

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Mohanty, A. ; Dept. of Electron. & Telecommun. Eng., Silicon Inst. of Technol., Bhubaneswar, India ; Kar, A.

Digital watermarking is the process of embedding information into a digital signal which may be used to verify its authenticity or the identity of its owners. It is a technique to embed identification codes called watermarks, into cover media or host media. Watermarking is used for data integrity, protection of intellectual property, and data authentication. Watermarking does not restrict access to the data while encryption has the aim of making messages unintelligible to any unauthorized persons who might intercept them. Once encrypted data is decrypted, the media is no longer protected. A watermark is designed to permanently reside in the host data. If the ownership of a digital work is in question, the information can be extracted to completely develop an Authentication system to be used in telemedicines. In this paper the aim is to implement the watermarking techniques in spatial and frequency domain in telemedicines and then obtaining lossless image back for its analysis. The extracted image which is obtained should have a high peak signal to noise ratio (PSNR) or else it's discarded. At the receiver end the patient digest is cross verified to obtain back the watermarked medical image for further analysis. Results of the computer simulations are provided to observe the analysis in this proposed algorithm.

Published in:

Computer Communication and Informatics (ICCCI), 2012 International Conference on

Date of Conference:

10-12 Jan. 2012