Analysis and Estimation of Noise in Embedded Medical Images

Full Text (PDF, 359KB), PP.45-50

Views: 0 Downloads: 0

Author(s)

C Nagaraju 1,* S S ParthaSarathy 2

1. Department of Electronics and communication Engineering, BGSIT, Mandya

2. Department of Electrical and Electronics Engineering, PESCE, Mandya

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2015.03.07

Received: 26 Sep. 2014 / Revised: 6 Nov. 2014 / Accepted: 18 Dec. 2014 / Published: 8 Feb. 2015

Index Terms

Embedding, Healthcare, Medical Image, Noise, Patient Information, Robustness

Abstract

Patient information is embedded inside the medical images for the storage or transmission, or healthcare applications. In medical image processing, various types of noises corrupt the image quality. There is a need of measure specific noise for a particular image is required for the evaluation of robustness for embedding techniques used for hiding patient information in medical images. It is very important to obtain precise images to facilitate accurate analysis and estimation of noise in embedded medical image. The current work is focused towards studying the effect of specific noise which affect particular medical image. The strength of the medical image is tested by introducing several attacks to the embedded medical images. The statistical quantity measures like peak signal-to-noise ratio (PSNR), signal-to-noise ratio (SNR) and normalized root mean square error (NRMSE) are employed to measure the quality of the output medical image.

Cite This Paper

C Nagaraju, S S ParthaSarathy,"Analysis and Estimation of Noise in Embedded Medical Images", IJIGSP, vol.7, no.3, pp.45-50, 2015. DOI: 10.5815/ijigsp.2015.03.07

Reference

[1]Y. Wang, J. F. Doherty and R. E. Van Dyck, "A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images", IEEE Transactions on Image Processing, Vol. 11, Issue 2, pp. 77-88, 2002.

[2]Chun Shien Lu, H.Y.M.Liao, "Multipurpose watermarking for image authentication and protection",IEEE Transactions on Image Processing., Vol.10, Issue 10, pp.1579-1592, 2001.

[3]V. Licks and R. Jordan, "Digital Image Watermarking Robust to Geometric Transformations", Proceedings of 2000 International Conference Image Processing (ICIP 2000), Vol. 3, pp. 690-693, 2000.

[4]Dipti Prasad Mukherjee, Subhamoy Maitra, Scott T. Acton, "Spatial domain Digital Watermarking of Multimedia Object for Buyer Authentication", IEEE Transactions on Multimedia, Vol. 6, No.1,pp. 1- 15, 2004.

[5]Ran-Zan Wang, Chi- Fang Lib, and Ja- Chen Lin, "Image hiding by optimal LSB substitution and Genetic algorithm", 2001 Pattern Recognition Society. Published by Elsevier Science Ltd.\

[6]Ghoshal N., Mandal, J. K. "A Bit Level Image Authentication/Secrete Message Transmission Technique(BLIA/SMTT)", Association for the Advancement of Modelling & Simulation Technique in Enterprises (AMSE), AMSE journal of Signal Processing and Pattern Recognition, Vol. 51, No. 4, pp. 1-13,France, 2008.

[7]Ghoshal N., Mandal, J. K. et al., "Masking based Data Hiding and Image Authentication Technique (MDHIAT)", proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM-2008, ISBN: 978-1-4244-2962-2,December 14-17th, Anna University.

[8]Ghoshal N., Mandal, J. K. et al., "Image Authentication by Hiding Large Volume of Data and Secure Message Transmission Technique using Mask (IAHLVDSMTTM)", Proceedings of IEEE international Advanced Computing Conference IACC, 2009, ISBN:978-981-08-2465-5, March 6-7th, Thapar University,Patiala, India.

[9]L. Gagnon and A. Jouan, Speckle filtering of SAR images – "A comparative study between complex-wavelet-based and stan dard filters", SPIE Proc. 3169, 80 (1997).

[10]B. Aiazzi, L. Alparone, and S. Baronti, IEEE Trans. on "Geoscience and Remote Sensing" 36 (5), 1466 (1998). DOI:10.1109/36.718850.

[11]Nopporon Chotikakamthorn and Natapon Pantuwong,"Attacks on Feature–based Affine-invariant watermarking method", the fifth international conference on computer information technology (CIT'05) 2005.

[12]Aaron S. Cohen and Amos Lapidoth, "The Gaussian Watermarking Game", IEEE transactions on Information Theory, Vol. 48, No. 6, June 2002.

[13]D.T. Kuan and A.A. Sawchuk, "Adaptive noise smoothing filter for images with signal dependent noise," IEEE Trans. Pattern Anal. Mach. Intell., vol. PAMI-7, no. 2, pp. 165–177, 1985.

[14]P.Subbuthai, K.Kavithabharathi S.Muruganand "Reduction of types of Noises in dental Images" International Journal of Computer Applications Technology and Research Volume 2– Issue 4, 436 - 442, 2013.

[15]S.Sudha, G.R.Suresh and R.Sukanesh, "Speckle Noise Reduction in Ultrasound Images by Wavelet Thresholding based on Weighted Variance", International Journal of Computer Theory an Engineering, Vol. 1, No. 1, April 2009. pp. 1793-8201.

[16]Schneier, M. and Abdel-Mottaleb, M. (1996) "Exploiting the JPEG compression scheme for image retrieval", IEEE Trans. Pattern Anal. Mach. Intell., Vol.18, No. 8, Pp. 849–853.

[17]Zhang, Y. (1998) "Space-Filling Curve Ordered Dither", Elsevier, Computer & Graphics Journal, Vol. 22, No. 4, Pp. 559-563.