Publication Cover
Automatika
Journal for Control, Measurement, Electronics, Computing and Communications
Volume 64, 2023 - Issue 3
2,145
Views
0
CrossRef citations to date
0
Altmetric
Regular Papers

Zero watermarking scheme for privacy protection in e-Health care

ORCID Icon &
Pages 453-466 | Received 16 Oct 2019, Accepted 17 Nov 2022, Published online: 18 Mar 2023

Figures & data

Table 1. Full form of the abbreviations used in the paper.

Table 2. Data hiding techniques and their goals in the research.

Figure 1. Traditional watermarking scheme: (a) watermark embedding and (b) watermark extraction.

Figure 1. Traditional watermarking scheme: (a) watermark embedding and (b) watermark extraction.

Figure 2. Zero-watermarking scheme: (a) zero-watermark construction and (b) zero-watermark extraction.

Figure 2. Zero-watermarking scheme: (a) zero-watermark construction and (b) zero-watermark extraction.

Figure 3. Reversible data hiding scheme: (a) watermark embedding and (b) watermark extraction.

Figure 3. Reversible data hiding scheme: (a) watermark embedding and (b) watermark extraction.

Figure 4. The proposed zero-watermark generating scheme for privacy protection for general images.

Figure 4. The proposed zero-watermark generating scheme for privacy protection for general images.

Figure 5. The proposed zero watermark extracting scheme for privacy protection for general images.

Figure 5. The proposed zero watermark extracting scheme for privacy protection for general images.

Figure 6. Segmented image with region size 10 (left) and region size 20 (right).

Figure 6. Segmented image with region size 10 (left) and region size 20 (right).

Figure 7. The proposed zero-watermark generating scheme for privacy protection for MIs.

Figure 7. The proposed zero-watermark generating scheme for privacy protection for MIs.

Figure 8. The proposed zero watermark extracting scheme for privacy protection for MIs.

Figure 8. The proposed zero watermark extracting scheme for privacy protection for MIs.

Figure 9. MRI brain images: (a) MR1, (b) MR2, (c) MR3 and (d) MR4.

Figure 9. MRI brain images: (a) MR1, (b) MR2, (c) MR3 and (d) MR4.

Figure 10. CT brain images: (a) CT1, (b) CT2, (c) CT3 and (d) CT4.

Figure 10. CT brain images: (a) CT1, (b) CT2, (c) CT3 and (d) CT4.

Figure 11. SIPI test images: (a) S1, (b) S2, (c) S3 and (d) S4.

Figure 11. SIPI test images: (a) S1, (b) S2, (c) S3 and (d) S4.

Figure 12. BOWS test images: (a) B1, (b) B2, (c) B3, (d) B4, (e) B5 and (f) B6.

Figure 12. BOWS test images: (a) B1, (b) B2, (c) B3, (d) B4, (e) B5 and (f) B6.

Table 3. Correlation and BER values between the generated and received watermark against listed attacks for the proposed method and the existing method for general images.

Table 4. Correlation and BER values between the generated and received watermark against listed attacks for the proposed method and the existing method.

Table 5. Extracted watermarks against listed attacks for the proposed method and the existing method for general images.

Table 6. Correlation and BER values between the generated and received watermark against MF attack for different window sizes for MRI images, where Lo = 0, Hi = 1.

Table 7. Correlation and BER values between the generated and received watermark against MF attack for different window sizes for CT images, where Lo = 0, Hi = 1.

Table 8. Correlation and BER values between the generated and received watermark against AF attack for different window sizes for MRI images, where Lo = 0, Hi = 1.

Table 9. Correlation and BER values between the generated and received watermark against AF attack for different window sizes for CT images, where Lo = 0, Hi = 1.

Table 10. Correlation and BER values between the generated and received watermark against SPN attack for CT images, where Lo = 0, Hi = 1.

Table 11. Correlation and BER values between the generated and received watermark against SPN attack for CT images, where Lo = 0, Hi = 1.

Table 12. Correlation and BER values between the generated and received watermark against GN attack for MRI images, where Lo = 0, Hi = 1.

Table 13. Correlation and BER values between the generated and received watermark against GN attack for CT images, where Lo = 0, Hi = 1.

Table 14. Processing time for sample images.

Table 15. Correlation and BER values between the generated and received watermark against CE, quantization and JPEG compression attack for MRI and CT images, where Lo = 0, Hi = 1.