• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Robust Watermarking Scheme for NIfTI Medical Images

    2022-08-24 03:28:54AbhishekKumarKamredUdhamSinghVisvamDevadossAmbethKumarTapanKantAbdulKhaderJilaniSaudagarAbdullahAlTameemMohammedAlKhathamiMuhammadBadruddinKhanMozaherulHoqueAbulHasanatandKhalidMahmoodMalik
    Computers Materials&Continua 2022年5期

    Abhishek Kumar,Kamred Udham Singh,Visvam Devadoss Ambeth Kumar,Tapan Kant,Abdul Khader Jilani Saudagar,Abdullah Al Tameem,Mohammed Al Khathami,Muhammad Badruddin Khan,Mozaherul Hoque Abul Hasanat and Khalid Mahmood Malik

    1School of Computer Science and IT,JAIN(Deemed to be University),Bangalore,560069,India

    2Department of Computer Science and Information Engineering,National Cheng Kung University,Tainan,701,Taiwan

    3Department of Computer Science&Engineering,Panimalar Engineering College,Anna University,Chennai,600123,India

    4Patna Women’s College,Patna,800001,India

    5Information Systems Department,College of Computer and Information Sciences,Imam Mohammad Ibn Saud Islamic University(IMSIU),Riyadh,11432,Saudi Arabia

    6Department of Computer Science and Engineering,Oakland University,Rochester,48309,USA

    Abstract:Computed Tomography(CT)scan and Magnetic Resonance Imaging(MRI)technologies are widely used in medical field.Within the last few months, due to the increased use of CT scans, millions of patients have had their CT scans done.So, as a result, images showing the Corona Virus for diagnostic purposes were digitally transmitted over the internet.The major problem for the world health care system is a multitude of attacks that affect copyright protection and other ethical issues as images are transmitted over the internet.As a result, it is important to apply a robust and secure watermarking technique to these images.Notably,watermarking schemes have been developed for various image formats,including.jpg,.bmp,and.png,but their impact on NIfTI (Neuroimaging Informatics Technology Initiative) images is not noteworthy.A watermarking scheme based on the Lifting Wavelet Transform(LWT)and QR factorization is presented in this paper.When LWT and QR are combined, the NIfTI image maintains its inherent sensitivity and mitigates the watermarking scheme’s robustness.Multiple watermarks are added to the host image in this approach.Measuring the performance of the graphics card is done by using PSNR, SSIM, Q (a formula which measures image quality),SNR,and Normalized correlation.The watermarking scheme withstands a variety of noise attacks and conversions,including image compression and decompression.

    Keywords: Watermarking;NIfTI;LWT;QR;image security

    1 Introductio n

    Today, the role of computers in a wide range of occupations is critical to success, because computer-assisted technologies provide rapid and accurate results in every industry.In addition to medical science and healthcare systems, these technologies were used to quickly transmit digital medical images around the world to aid in diagnosis.CT-scan, MRI, and Color Doppler Imaging have transformed modern medicine.As a result, doctors can acquire and interpret imaging results much faster and more accurately than with previous imaging methods such as x-rays.There are two major issues with film-based imaging.One is that print costs are high,and the other is that filmless imaging techniques must be used to solve this problem.Because multiple radiologists can view the same image at the same time,film-less imaging provides greater access and broader diagnostics than film-based imaging.Thus, a doctor who is too far away from the patient may provide a solution by using a film-less imaging system, which is beneficial to both the patient and the doctor.COVID-19 has recently spread throughout the world,and it is now a major concern for doctors.Researchers are working to find a cure for the corona pandemic,which is affecting billions of people,by using digital imaging technology to detect and assess COVID-19 [1].However, it is critical to safeguard private electronic data from malicious intruders.

    Hospitals now hold the majority of COVID-19 patient data due to the increased use of medical imaging (medical imaging of the patient) with patient personal information, diagnosis history, and other reports delivered over the network.It has become common practise to expose yourself to new risks in order to benefit from them for specific reasons such as diagnosis, treatment, medical consultation, distance learning, and training.Healthcare providers (doctors and imaging providers)have a difficult time taking security threats seriously.Images may be intentionally or unintentionally distorted during medical image generation and communication,which can have serious consequences for patient diagnosis[2].For the researcher,this is the moment of truth:It is a difficult task to maintain the delicate medical image’s integrity and authenticity in an unprotected network.Watermarking can ensure the image’s integrity and authenticity.Digital watermarking is a process that embeds a digital watermark(a meaningful image)into an image carrier(an image that has not been altered in any way,such as size,format,or information)without changing anything else,including the image’s characteristics(image size,format,and content).To verify the image’s legitimacy,you must extract the watermark that has been embedded in the host image [3].When a watermarking procedure affects a medical image in a clinical setting, trust in the image is undermined.Misdiagnosis caused by minor changes in the image could result in dangerous consequences and legal issues.Watermarking techniques that use transformation domains and spatial domains can be considered.To convert an image to the frequency domain,a transform domain strategy employs various wavelet transforms such as DCT,DFT,DWT,and watermark insertion.In contrast to spatial watermarking techniques,which embed the watermark’s bits in the host image,image watermarking strategies embed the watermark’s bits in a different location.Transformation domain schemes outperform spatial domain systems in terms of robustness[4].The robustness of all digital watermarking techniques is a major issue.Many researchers have proposed watermarking proposals for.bmp and jpg medical photos.As of now,three DICOM watermarking systems have been proposed:The increasing use of advanced imaging technologies such as X-ray, ultrasound, MRI, and CAT scans necessitated the development of the NIfTI imaging technology rather than Windows-style BMP, JPEG, and DICOM-based CT scans.There is highly sensitive medical data in NIfTI photographs.To prevent counterfeiting,it is critical to use a strong watermarking method in the NIfTI images to provide the necessary medical diagnosis in the healthcare system[5].

    A safe watermarking approach for NIfTI images is based on LWT and QR factorization,which we call NIfTI QR LWT.The image watermarking and grayscale watermarks that are used in this approach try to provide better robustness and reduced complexity for CT-Scan image watermarking(.nii format).start by applying the LWT on the image, which breaks the image down into four subbands LL(low-low),HL(high-low),LH(low-high)and HH(high-high).It permits every one of these steps to take place;then apply QR factorization on the watermark.As you can see,LL uses more of the image’s energy in their factorized watermark,and so would be the best choice for that application.

    This proposed system is extremely resilient to noise attacks and various formatting changes.Related work has been discussed in Section 2.Sections 3 and 4 go over the LWT and QR.Section 4 also introduces the proposed watermarking strategy.Section 5 includes experimental results as well as an examination of some proposed medical imaging work.Section 6 examines the results of the robustness analysis,and Section 7 provides the analysis’conclusions.

    2 Related Work

    The fact that telemedicine applications have advanced significantly[6]indicates that researchers are now interested in the application of digital medical imaging.The majority of medical images are classified as colour or grayscale.Furthermore,most medical equipment,such as CT scans,X-rays,and ultrasounds,generate images with varying shades of grey,such as bmp,jpg,DICOM,and so on.As a result,researchers are more aware of medical imaging,which has far-reaching applications beyond medical imaging.Several image watermarking techniques are reported in the literature, all of which are based on matrix decompositions.

    The watermarking scheme created by Wang et al.[7] was first used by the image’s creator.HL and LH were chosen for watermark insertion, so LU factorization is also applied to those two subbands.To incorporate a watermark,it has first altered with the Arnold transformation and then the transformed watermark is applied to the bands that have been selected.Multiple image processing attacks,such as contrast adjustment,noise assault,JPEG compression,cropping,and Gaussian noise,are resistant to this methodology.Lin et al.[8]introduced a watermarking methodology in which the initially DWT is applied to the LL band,and the QR decomposition is subsequently employed on the R matrix to incorporate the encrypted watermark in the initial row.According to Su et al.[9],a blind watermarking method for QR decomposition is proposed.When the image was first divided into 4 X 4 blocks, QR decomposition was applied to each block and watermark is inserted in the initial row of R matrix of each blocks.While cropping,blurring,rotation,scaling,adding noise,and sharpening have no effect on the image, the technique is well protected against each of these effects.Ni et al.[10] suggested LWT-based watermarking technique.The watermark is added in LL sub bands after LWT has been applied to the host image.A chaotic sequence is used to estimate the location of spatial tempering.In this study,Gao et al.[11]proposed a reversible watermarking scheme using the LWT and chaotic system.To divide the host image into non-overlapping blocks,the author first applied LWT on every non-overlapping block.The subsequent LL band is used to insert the watermark on every block.To make shuffling of blocks even more chaotic,use the chaotic system.This is specifically meant to counter crop hacking,and it is very secure.Lizong et al.[12]suggested a watermarking approach based on LWT and a chaotic system.The black-and-white image is the watermark,while the color image is the host image.This approach survives image processing attacks such as cropping, sharpening, and JPEG compression.A new method devised by Zairi et al.[13]uses DWT,DCT,and QR decomposition in combination.Entropy values have been used to determine watermark embedding in this method,according to the images’entropy.Researchers Ghaderi et al.[14]developed a method that utilized LWT and SVD.An author performs a 4-level LWT on the HL and LH sub bands before applying the SVD to the HL and LH sub bands.The watermark image has been transformed into a binary image,and afterwards the watermark is added by changing the values of the binary image’s bands.It has built-in contrast and rotation, scaling, and cropping resistance for the JPEG compression and cropping.In a study done by Chamlawi et al.[15], a novel LWT semi-fragile watermarking approach is created.The first watermark is used for authentication, while the second watermark for image recovery and authenticity was implemented.Determines that the JPEG compression attack scheme is both efficient and secure.In a paper published in the Computational Molecular Biology journal,Mehta et al.[16]described a scheme that combines the Lagrangian Weibull(LWT),QR,and SVR models(LSVR).For the cover image,the author started with the LWT.After that,he broke the low-frequency sub bands into 4x4 blocks.Once QR decomposition has been applied to these blocks,watermarking is done to the first row of R matrix.This approach is completely resistant to cropping,scaling,noise,and JPEG compression attacks.Su et al.[17]devised a watermarking strategy that makes use of LWT and state coding.The LWT was first applied to the colour space YCrCb.A watermark is also added to the Y,Cr,and Cb frequencies in low-frequency bands.Sleit et al.[18]developed semi-blind hybrid watermarking in grayscale images by first using SVD and DWT and then adding a binary watermark.Golshan et al.[19]proposed a hybrid watermarking technique that incorporates SVD,DCT,and DWT.The image was first decomposed using the DCT, followed by the DWT, which was used to divide it into four sub-bands.Finally, a watermark is inserted into the singular values of each sub.S.introduced the technique of using LWT and SVD to create robust watermarking.K.and Sarkar.The transformation in this scheme was performed using Sarkar et al.[20],LWT.The image is divided into 2x2 blocks using LWT.The author then applied the SVD to these blocks,inserting a watermark in each individual value.According to Verma et al.[21],a recent LWT-based design scheme is planned in which three levels of LWT are used,after which LH bands are separated into blocks that are then randomly shuffled before being encoded using binary watermarking.One major disadvantage of this strategy is that it cannot withstand noise or rotation attacks.

    3 Preliminaries

    Using image security enhancement, LWT (Lifting Wavelet Transform) is the most common watermarking method.The Wim Sweldens created it[22]The main feature of the lifting method is that all construction is done in the spatial domain.It cuts down the time and space complexity better than traditional wavelet transforms.There are fewer calculations to perform with the traditional wavelet transform, but with the lifting wavelet transform, fewer calculations are required, which means it is better as far as time and space complexity.Therefore, the quickest and most efficient approach to calculating the wavelet transform is to use the DWT.Neither the Fourier transform nor the lifting transform is required for lifting operations.After the wavelet transformation, the digital signal’s sequence of integers becomes a sequence of floating-point numbers.The digital signal cannot be completely restructured,as a result of this.In order to have a reasonably reversible implementation,we need a transform algorithm that preserves the domain of signal after the transform.when converted to LWT,the scope of the transform stays the same This ensures that integer to integer transformations will always be applied.LWT always outperforms traditional wavelet transforms,as this explains why it is broadly utilized in image processing.

    Now,we’ll talk about LWT in image processing.LWT divides an image into four sub-bands:LL,LH,HL,and HH.The LL sub-band has low-frequency components that contain the majority of the image’s energy, while the other sub-bands have high-frequency components that contain less of the image’s energy.Because the LL band contains the majority of the energy in the raw image,the LWT can be applied several times on it to decompose it into sub-bands.The 2-level LWT is depicted in Fig.1.

    Figure 1:2-Level LWT

    QR Factorization Theorem:In QR decomposition[23],a non-singular matrix of sizem×n.

    where Q is an orthogonal matrix with sizeS×Sand R represents the upper-triangular matrix.The row of Q matrix is generated by applying the Gram-Schmidt.Aand Q is denoted as

    A= [z1,z2,........,zn] andQ= [w1,w2,........,wn].The upper-triangular matrix R can be computed as:

    4 Proposed Algorithm

    First, the information needed for watermarking is securely stored, and then the information contained in the image data is processed to include watermarks.Grayscale is used for both the watermark and the background image.After selecting the first slice of the NIfTI image,perform LWT on it,resulting in the division of the image into four different frequency sub-bands as shown in Fig.2.This sub-band transmits the information required for image processing.During the QR factorization process,the primary components of the watermark are transformed into a new vector,which is then transformed into a new vector through the QR factorization process.

    Figure 2:Block diagram of hybrid method for digital watermarking process

    Embedded in the first slice of the NIfTI image’s LL frequency sub-band,the new watermark vector can be seen as an LL frequency sub-band watermark.It is necessary to control the augmentation of the host watermark by using a scaling factor (alpha).LL frequency sub-bands are overlaid on the composite image, which is then inverse transformed to achieve this result.After that, the patient’s EPR metadata(which includes their medical image information)is added to the original dataset,which results in the generation of the watermarked NIfTI image.A representation of the algorithm is shown in Fig.2,which can be found further down on this page.

    Input:CT-Scan NIfTI image Size(630×630)

    Grayscale Watermark Size(32×32)

    Output:Watermarked NIfTI image

    Step 1Extract patient metadata from the image.

    Step 2Apply the QR Factorization using Eq.(1)on the watermark.

    Step 3Perform two level LWT on first slice of the NIfTI image which decompose the slice into LH,HL,LL,and HH sub bands.

    Step 4The factorized watermark components are embedded into transformed components of the host slice by selecting the LL band.Watermark is embedded in the slice as shown in Eq.(2).

    where

    The transformed component of the watermark slice is denoted by x’.

    The factorized watermark component is denoted by y.

    x is the host slice’s transform slice.

    And,αis the embedding strength.

    Step 5Apply the final watermarked slice to an Inverse Lifting Wavelet Transformation.

    Step 6Embedded the patient’s metadata in watermarked image.

    After performing the watermark embedding process as shown in Fig.2,the watermark extraction process is the next critical step.The proposed watermark extraction process is depicted in Fig.3.The original NIfTI image is required to extract the watermark from the watermarked NIfTI image,as can be seen.EPR is initially separated from both the actual and watermarked NIfTI image and select the first slice of the NIfTI image.Next, we apply the LWT to both the actual and watermarked slice, decomposing them into four different frequency sub-bands, namely LL, LH, HL, and HH.Furthermore,we isolated the noisy components from the watermarked slice using the LL sub-bands of both slices,and then used the Inverse QR factorization on these noisy components to generate the watermarks.The proposed method’s extraction process is depicted in Fig.3 and explained below.

    Figure 3:Block diagram of hybrid method for watermark extraction

    Input:M x N NIfTI image I;and M x N NIfTI watermarked image I+.

    Output:Watermark W

    Step 1:Extract patient information from both the NIfTI images i.e.,I and I+.

    Step 2:Select the first slice of both images I and I+.

    Step 3:Perform single level LWT on both slice S and S+to obtain LL,LH,HL and HH sub bands.

    Step 4:By reversing the embedding steps;Eq.(3)extract the watermark from the watermarked image

    where

    The watermarked slice isS+

    The factorized watermark component is denoted byy.

    The original slice isS.

    and,αis the embedding strength.

    Step 5:Perform inverse QR factorization on extracted components to get the extracted watermark.

    5 Result and Discussion

    The proposed watermarking method is tested over NIfTI images generated by the CT-Scan of COVID patient taken from https://zenodo.org/record/3757476#.X0pwCnkzZPZ [24] under ethical medical practices,without revealing the patient’s identity and only for the experimental purpose.On the MATLAB platform,the proposed watermarking method was tested on an Intel core TM i7-5500U CPU 2.5 GHz Windows10 machine with 8 GB RAM.Various NIfTI images with a resolution of 630×630 pixels and a png watermark with a resolution of 32×32 pixels and a bit depth of 8 bits.

    5.1 Performance Measures

    The proposed watermarking method’s imperceptibility is evaluated using six different NIfTI images.As described in Eqs.(4)–(9) respectively with MSE, PSNR, SNR, NC, Q and SSIM are the image quality measurements that are examined.PSNR,NC,and SSIM are used to assess perceptual imperceptibility.For the watermark perceptibility estimation,PSNR is employed,which is outlined as follows[25].

    To assess the quality of the watermarking method, NC are calculated as the difference between the actual slice and the watermarked slice as defined below[26].

    Universal IQI(image quality index)Q[27]is defined as follows.

    where,

    and

    The original and test image signals are represented by w and z,respectively.

    Index of universal image quality Q can be defined as the product of three components:

    SSIM(Structural Similarity Index Measure),It is used to determine how similar the actual slice and the watermarked slice.The SSIM value ranges from-1 to+1;if SSIM=1,the actual image and watermark image are identical as described in Eq.(9).

    where Δp:the average of actual image and Δq:the average of watermarked image.

    σ2p:the variance of original cover andσ2q:the variance of watermarked image with covarianceσpq.Where,k1and k2are free parameters.

    5.2 Analysis of Proposed Method

    The proposed method has been tested on six different NIfTI images which are Img1,Img2,Img3,Img4,Img5 and Img6 to determine the imperceptibility and robustness.The test results are depicted in Figs.4 and 5.The metadata containing COVID-19 affected person’s information is also preserved within the watermarked NIfTI image.

    Figure 4:First slice of NIfTI images used for experiment and watermark image in BMP format

    Figure 5:Extracted watermarks from six medical images

    Tab.1 shows the performance metrics for watermarked images ranging from Img1 to Img6.Fig.7 shows a graphical representation of the MSE between the original slice of NIfTI image and the watermarked slice of image.Fig.6 shows the difference in Q and NC between the original NIfTI image and the watermarked image.Fig.8 depicts the graphical interpretation of the method’s PSNR and SNR metrics.Fig.9 depicts the proposed SSIM,which is closer to one.

    Table 1:Qualitative analysis of watermarked slice of the images

    Figure 6:NC and Q of all six images

    Figure 7:MSE of all six images

    Figure 8:PSNR and SNR matrices of all six images

    Figure 9:SSIM of all six images

    Image quality parameters NC, SSIM and Q are having values approximately close to one;indicating virtually excellent correlation between the initial and watermarked images.PSNR of the watermarked image is over 41.5 db,which suggests that the watermarked image quality is extremely considerable.

    5.3 Analysis of Proposed Method for Different Number of Watermarks Insertion

    Proposed watermarking method inserted the multiple number of watermarks across the image.The maximum watermark insertions in the NIfTI image without hampering the diagnosis of watermarked NIfTI image, demonstrated in Tab.1.These images contain sensitive patient’s medical information too.Thus, it is much essential that the quality of these image must not be degraded after the watermarking.Tab.2 shows that the image quality metrics are directly proportional to the number of watermarks inserted,with no discernible change.Figs.10–13 show the PSNR,NC,Q,and SNR,respectively.In Fig.10,we can see that decreasing the number of inserted watermarks raises the PSNR value.If we evaluate the PSNR and SNR of img1 at 24 watermark insertions and 2 watermark insertions,we find that there is a significant variation in PSNR from 44.9879 DB to 55.86161 DB and SNR from 35.71489 DB to 46.58859 DB, but no significant variation in NC and Q.In Tab.3, the proposed method’s results are compared to those of the other existing methods,and it is discovered that the proposed method’s results are more significant[2–3,28].

    Table 2:Performance evaluation of the proposed method for various numbers of watermark insertions with a watermark image size of 32×32

    Figure 10:PSNR comparison at different number of inserted watermarks

    Figure 11:Normalized correlation comparison at different number of watermark insertion

    Figure 12:Image quality comparison at different number of watermark insertion

    Figure 13:SNR comparison at different number of watermark insertion

    Table 3:Performance comparison of NC an PSNR values comparison proposed and existing method

    6 Robust Analysis

    This method is tested with various number of watermark insertion and found that the results are promising.Watermarked images are subjected to various image processing attacks such as Salt&Pepper,Gaussian noise,Poisson,Speckle,which may result in the removal of watermarks.Sustenance of method against these attacks is a critical requirement of any significant watermarking method.The quality of the watermarked image and the robustness of the method are inversely proportional to each other, but a trade-off must be considered if necessary.As a result, this method is tested with the maximum number of watermarks insertion, which increases robustness, and the minimum number of watermarks insertion,which increases image watermark image quality.To test the method’s robustness,attacks were performed on the watermarked image with the fewest number of watermark inclusions.The proposed watermarking method is for CT-Scan medical images;after watermarking,a watermarked NIfTI image is generated, and then diagnosis is framed on this watermarked NIFTI image.As a result, any significant degradation in the watermarked image quality is unacceptable because it may result in the patient’s death.As a result,the method is tested with various noise attacks and parameters until the quality metrics indicate that the attacked watermarked image is of high quality.

    6.1 Salt&Pepper Noise Attack

    The salt and pepper noise attack are used on the watermarked NIfTI image with noise densities of 0.001 and 0.003 and the watermark is successfully extracted using the suggested watermarking method.Tab.4 shows that this attack for NIfTI healthcare images is tabulated,and the results show that the efficiency of the suggested technique for NIfTI images is promising.

    Table 4:Parameters values of watermarked image after Salt&pepper noise attack with variance from 0.001 to 0.004 and extracted watermarks

    6.2 Speckle Noise Attack

    The watermark is successfully extracted by the proposed watermarking method after a speckle noise attack with a variance of 0.001 to 0.003 is applied to the watermarked NIfTI image.Tab.5 shows the results of the evaluation of the NIfTI medical image attack,and the findings show that the proposed technique for NIfTI image is effective.

    Table 5:Parameters values of watermarked image after Speckle noise attack with variance from 0.001 to 0.003 and extracted watermarks

    6.3 Poisson Noise Attack

    The Poisson noise attack is applied to the watermarked NIfTI image, and the watermark is successfully extracted using the proposed watermarking method.Tab.6 tabulates the attack analysis for NIfTI medical images,and the results show that the proposed method for NIfTI images performs well for watermark extraction.

    6.4 Gaussian Noise Attack

    The proposed watermarking method successfully extracts the watermark from the watermarked NIfTI image using a Gaussian noise attack with variance 0.001 and varying it from 0.001 to 0.004.The results of the analysis of the attack for the NIfTI medical images are tabulated in Tab.7,and the results show that the proposed method for NIfTI images performs well.

    Table 6:Parameters values of watermarked image after poisson noise attack and extracted watermarks

    Table 7:Parameters values of watermarked image after Gaussian noise attack with variance from 0.001 to 0.003 and extracted watermarks

    7 Conclusions

    The digital image watermarking commonly used in the medical imaging in the field of teleradiology for the medical image authentication purpose while also preserving the integrity of the medical data.Indeed, in this Covid situation it may play an importance in remote diagnosis of the medical images, proposed watermarking scheme can contribute to the security of medical images which are transmitted over the Internet.These images are very sensitive so extreme precautions must be must needed.A seemingly minor image degradation is frequently not tolerated in this discipline since it could result in an inaccurate diagnosis.In this paper we have proposed a watermarking scheme for NIfTI images which ensure the integrity of the medical image while maintaining efficient imperceptibility and robustness.

    The proposed watermarking method combines LWT and QR factorization to watermark NIfTI images that contain sensitive medical image data as well as patient information.The proposed method has been tested on various NIfTI images (630 x 630) sourced from CT-Scan and watermarked with grayscale watermarks (32 x 32).The parameters NC, Q, SNR, PSNR, and SSIM serve as the foundation for analyzing watermarked image quality.The tradeoff between image quality and watermark insertion ensures that significant results are obtained.The proposed watermarking method is resistant to image processing attacks such as Salt&Pepper,Poisson,Speckle,and Gaussian noise.After image processing attacks the watermarks are extracted successfully from the watermarked slice of the NIFTI image.The method’s results are compared to other existing methods,which shows that the proposed method’s results are extremely significant.In the future,the embedded watermark logo can be encrypted using the best encryption algorithm before embedding that provides the maximum efficiency.Furthermore,to increase the robustness of the watermarking scheme,chaotic systems with matrix factorizations can be used.

    Acknowledgement:The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number 959.

    Funding Statement:This work was supported by Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number 959.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久国内精品自在自线图片| 日韩不卡一区二区三区视频在线| 精品一区在线观看国产| 水蜜桃什么品种好| 80岁老熟妇乱子伦牲交| 欧美xxⅹ黑人| 色吧在线观看| 国产成人a∨麻豆精品| 国产乱来视频区| 在线观看人妻少妇| 久久精品国产亚洲av涩爱| 国产有黄有色有爽视频| 色婷婷av一区二区三区视频| 亚洲自偷自拍三级| 天堂中文最新版在线下载| 久久99精品国语久久久| 国产极品天堂在线| av免费在线看不卡| 午夜福利视频精品| 少妇人妻精品综合一区二区| 午夜免费观看性视频| 丝袜喷水一区| 亚洲久久久国产精品| 美女脱内裤让男人舔精品视频| 免费av不卡在线播放| 欧美日韩视频精品一区| 久久青草综合色| 51国产日韩欧美| 久久久久久久亚洲中文字幕| 成年美女黄网站色视频大全免费 | 青春草视频在线免费观看| 五月开心婷婷网| 另类亚洲欧美激情| 新久久久久国产一级毛片| 国产精品一区www在线观看| 我要看黄色一级片免费的| 久久久久久久大尺度免费视频| av女优亚洲男人天堂| 黄色毛片三级朝国网站 | 成年人免费黄色播放视频 | 91精品国产国语对白视频| 国产中年淑女户外野战色| 日韩欧美一区视频在线观看 | 亚洲欧美日韩卡通动漫| 欧美精品亚洲一区二区| 欧美3d第一页| 国产欧美日韩精品一区二区| 汤姆久久久久久久影院中文字幕| 成人18禁高潮啪啪吃奶动态图 | 日产精品乱码卡一卡2卡三| 午夜av观看不卡| 搡女人真爽免费视频火全软件| 国产男女内射视频| 丝袜脚勾引网站| 亚洲不卡免费看| 女人久久www免费人成看片| 少妇人妻一区二区三区视频| 毛片一级片免费看久久久久| 久久精品国产a三级三级三级| 欧美变态另类bdsm刘玥| av.在线天堂| 国产一区二区在线观看av| 我要看日韩黄色一级片| 欧美3d第一页| 高清视频免费观看一区二区| 最黄视频免费看| 国产国拍精品亚洲av在线观看| 91精品国产国语对白视频| 国产爽快片一区二区三区| 看十八女毛片水多多多| 国产av码专区亚洲av| 深夜a级毛片| 国产欧美另类精品又又久久亚洲欧美| 国产精品一区www在线观看| 久久这里有精品视频免费| 日本黄大片高清| 日韩大片免费观看网站| 五月天丁香电影| 国产色婷婷99| 亚洲精品自拍成人| 一本色道久久久久久精品综合| av卡一久久| 最近2019中文字幕mv第一页| 亚洲欧美成人精品一区二区| 观看av在线不卡| 黄色毛片三级朝国网站 | 91精品一卡2卡3卡4卡| 男女免费视频国产| 少妇的逼好多水| 插逼视频在线观看| 精品国产一区二区久久| 久久 成人 亚洲| 99热这里只有精品一区| 高清午夜精品一区二区三区| 我的女老师完整版在线观看| 精品国产国语对白av| 亚洲美女搞黄在线观看| 久久久久久久久久人人人人人人| 黄色配什么色好看| 日日撸夜夜添| 99久久精品国产国产毛片| 久久精品国产a三级三级三级| 日韩熟女老妇一区二区性免费视频| 国产熟女午夜一区二区三区 | 国产一区二区三区av在线| 9色porny在线观看| 特大巨黑吊av在线直播| 十八禁网站网址无遮挡 | av国产久精品久网站免费入址| videossex国产| 99热6这里只有精品| 久久亚洲国产成人精品v| 街头女战士在线观看网站| 搡老乐熟女国产| 99热6这里只有精品| a级片在线免费高清观看视频| 自拍偷自拍亚洲精品老妇| 在线观看美女被高潮喷水网站| 亚洲精品456在线播放app| 免费大片黄手机在线观看| 国产精品久久久久久久电影| 又大又黄又爽视频免费| av国产久精品久网站免费入址| 特大巨黑吊av在线直播| 日本黄大片高清| 97在线视频观看| 校园人妻丝袜中文字幕| 久久6这里有精品| 亚洲国产色片| av天堂久久9| 亚洲四区av| 国产精品麻豆人妻色哟哟久久| 精品酒店卫生间| 2022亚洲国产成人精品| 午夜久久久在线观看| 国产精品一区二区在线不卡| 日本欧美国产在线视频| 特大巨黑吊av在线直播| 亚洲电影在线观看av| 精品国产一区二区久久| 亚洲av免费高清在线观看| 亚洲成人手机| 国产精品一区www在线观看| 两个人免费观看高清视频 | 免费观看a级毛片全部| 2022亚洲国产成人精品| 搡老乐熟女国产| 高清av免费在线| 成人无遮挡网站| 香蕉精品网在线| .国产精品久久| 少妇人妻久久综合中文| 国产精品99久久99久久久不卡 | 免费久久久久久久精品成人欧美视频 | 免费少妇av软件| 亚洲国产av新网站| 色视频在线一区二区三区| 久久精品夜色国产| 人人妻人人爽人人添夜夜欢视频 | 久久鲁丝午夜福利片| 亚洲精品自拍成人| 91在线精品国自产拍蜜月| 国产在线一区二区三区精| 国产探花极品一区二区| 精品久久久久久久久亚洲| 一级a做视频免费观看| 日本黄色片子视频| 国产日韩欧美亚洲二区| 日韩熟女老妇一区二区性免费视频| 欧美日韩视频精品一区| 夜夜骑夜夜射夜夜干| 久久狼人影院| 久久99一区二区三区| 日韩制服骚丝袜av| 欧美国产精品一级二级三级 | 亚洲成人av在线免费| 日韩三级伦理在线观看| 少妇人妻精品综合一区二区| 国产精品一区二区三区四区免费观看| 国产亚洲欧美精品永久| 黄色视频在线播放观看不卡| 亚洲久久久国产精品| 精品酒店卫生间| 男人舔奶头视频| 久久综合国产亚洲精品| 精品人妻一区二区三区麻豆| 亚洲精品日韩在线中文字幕| 日韩强制内射视频| 日韩欧美精品免费久久| 日本欧美视频一区| 精华霜和精华液先用哪个| 国产成人a∨麻豆精品| 丝瓜视频免费看黄片| 国产黄片美女视频| 国产精品免费大片| 国产精品久久久久久久久免| 国产毛片在线视频| 寂寞人妻少妇视频99o| xxx大片免费视频| 热re99久久精品国产66热6| 国产av精品麻豆| 男女边吃奶边做爰视频| 极品少妇高潮喷水抽搐| 亚洲欧美精品专区久久| 免费观看的影片在线观看| 免费看不卡的av| 亚洲伊人久久精品综合| 丰满饥渴人妻一区二区三| 99视频精品全部免费 在线| 国产亚洲最大av| 18禁动态无遮挡网站| 亚洲在久久综合| www.色视频.com| 最近2019中文字幕mv第一页| 成年人免费黄色播放视频 | 亚洲综合色惰| 99热全是精品| 最近中文字幕2019免费版| 国产欧美日韩综合在线一区二区 | 国产片特级美女逼逼视频| 两个人免费观看高清视频 | 成人免费观看视频高清| 国产熟女欧美一区二区| 亚洲情色 制服丝袜| 又黄又爽又刺激的免费视频.| 久久99蜜桃精品久久| 高清欧美精品videossex| 熟女av电影| 亚洲av二区三区四区| xxx大片免费视频| 丝袜在线中文字幕| 人妻夜夜爽99麻豆av| 有码 亚洲区| 国产精品久久久久久av不卡| 久久久久久人妻| 大香蕉久久网| 日本猛色少妇xxxxx猛交久久| 少妇 在线观看| 高清毛片免费看| 看十八女毛片水多多多| 成人国产麻豆网| 国产 精品1| 国产成人精品福利久久| 一级a做视频免费观看| 久久精品国产亚洲av天美| 亚洲精品日韩在线中文字幕| 中文乱码字字幕精品一区二区三区| 岛国毛片在线播放| 日韩不卡一区二区三区视频在线| 高清不卡的av网站| 久久精品熟女亚洲av麻豆精品| 视频区图区小说| 黄色视频在线播放观看不卡| 中文字幕制服av| 少妇的逼水好多| 五月开心婷婷网| 男人舔奶头视频| xxx大片免费视频| av卡一久久| 国产深夜福利视频在线观看| 欧美激情国产日韩精品一区| 69精品国产乱码久久久| 国产亚洲欧美精品永久| 精品卡一卡二卡四卡免费| 人妻系列 视频| 国产一区有黄有色的免费视频| 欧美变态另类bdsm刘玥| 色5月婷婷丁香| 大陆偷拍与自拍| 日产精品乱码卡一卡2卡三| 国产精品成人在线| 国产精品三级大全| 一本—道久久a久久精品蜜桃钙片| 精品久久国产蜜桃| 日本av免费视频播放| 久久人人爽av亚洲精品天堂| 狂野欧美白嫩少妇大欣赏| 国产乱来视频区| 丁香六月天网| 插逼视频在线观看| 亚洲熟女精品中文字幕| 99九九线精品视频在线观看视频| 最近中文字幕高清免费大全6| 国产精品久久久久久精品古装| 成年女人在线观看亚洲视频| 寂寞人妻少妇视频99o| 男的添女的下面高潮视频| 国产精品成人在线| 国产日韩一区二区三区精品不卡 | 成人国产av品久久久| 少妇被粗大的猛进出69影院 | 99久久精品国产国产毛片| 美女视频免费永久观看网站| 人妻 亚洲 视频| 免费人妻精品一区二区三区视频| 国产男人的电影天堂91| 一本一本综合久久| 涩涩av久久男人的天堂| 在线精品无人区一区二区三| 欧美精品一区二区免费开放| 国内揄拍国产精品人妻在线| 在线观看免费高清a一片| 人妻系列 视频| 99热这里只有是精品50| 人妻夜夜爽99麻豆av| 七月丁香在线播放| 欧美日韩视频高清一区二区三区二| 一二三四中文在线观看免费高清| 黑人巨大精品欧美一区二区蜜桃 | 日韩伦理黄色片| 久久久精品94久久精品| 久久久久精品性色| 在线亚洲精品国产二区图片欧美 | 91aial.com中文字幕在线观看| 久久6这里有精品| 99九九在线精品视频 | 一个人免费看片子| 午夜福利网站1000一区二区三区| 欧美精品国产亚洲| 久久国产亚洲av麻豆专区| 男人狂女人下面高潮的视频| 岛国毛片在线播放| 蜜臀久久99精品久久宅男| 26uuu在线亚洲综合色| av国产精品久久久久影院| 精品久久久精品久久久| 久久国产精品男人的天堂亚洲 | 乱人伦中国视频| 国产免费福利视频在线观看| 国产精品福利在线免费观看| 欧美精品人与动牲交sv欧美| 免费大片18禁| 六月丁香七月| 精品久久久精品久久久| 亚洲国产毛片av蜜桃av| 亚洲精品视频女| 亚洲欧美日韩卡通动漫| 十八禁高潮呻吟视频 | 91久久精品国产一区二区三区| 国产亚洲一区二区精品| 精品国产露脸久久av麻豆| 成人影院久久| 久久精品国产a三级三级三级| 久久99一区二区三区| 国产综合精华液| 久久久久久久亚洲中文字幕| 久久免费观看电影| 99久久综合免费| 欧美一级a爱片免费观看看| 高清黄色对白视频在线免费看 | 日韩大片免费观看网站| 男人和女人高潮做爰伦理| 日韩精品免费视频一区二区三区 | 亚洲色图综合在线观看| 国产91av在线免费观看| 国产高清不卡午夜福利| 日韩强制内射视频| 午夜精品国产一区二区电影| 国产免费一级a男人的天堂| 在线观看免费高清a一片| 精品久久久噜噜| 一区在线观看完整版| 一本一本综合久久| 人妻制服诱惑在线中文字幕| xxx大片免费视频| 王馨瑶露胸无遮挡在线观看| 99热这里只有是精品50| 国产黄色免费在线视频| 最后的刺客免费高清国语| 久久精品熟女亚洲av麻豆精品| 成人国产麻豆网| 久久久久精品性色| 伦理电影大哥的女人| 又粗又硬又长又爽又黄的视频| 国产亚洲一区二区精品| 夜夜看夜夜爽夜夜摸| 美女xxoo啪啪120秒动态图| 精品亚洲成a人片在线观看| av网站免费在线观看视频| 人人妻人人添人人爽欧美一区卜| 国产深夜福利视频在线观看| 亚洲av日韩在线播放| 国产日韩一区二区三区精品不卡 | 在线观看免费高清a一片| 夜夜爽夜夜爽视频| 日本与韩国留学比较| 王馨瑶露胸无遮挡在线观看| 亚洲av成人精品一区久久| 91aial.com中文字幕在线观看| 国语对白做爰xxxⅹ性视频网站| 欧美变态另类bdsm刘玥| 精品国产一区二区久久| 欧美日韩av久久| www.av在线官网国产| 啦啦啦在线观看免费高清www| 男人狂女人下面高潮的视频| 中文字幕人妻丝袜制服| 久久午夜综合久久蜜桃| 久久久久久久国产电影| 国产av码专区亚洲av| 午夜免费鲁丝| 大又大粗又爽又黄少妇毛片口| 欧美日韩在线观看h| 大香蕉97超碰在线| 欧美日本中文国产一区发布| 一边亲一边摸免费视频| 国产爽快片一区二区三区| 22中文网久久字幕| 99久久综合免费| 亚洲精华国产精华液的使用体验| 美女国产视频在线观看| 麻豆精品久久久久久蜜桃| 你懂的网址亚洲精品在线观看| av一本久久久久| videos熟女内射| 91aial.com中文字幕在线观看| 成年人午夜在线观看视频| 伦精品一区二区三区| 十分钟在线观看高清视频www | 亚洲第一av免费看| 久久久久精品久久久久真实原创| 国产精品久久久久久精品古装| 男女啪啪激烈高潮av片| 亚洲精品国产av成人精品| 午夜福利,免费看| 国产男人的电影天堂91| 涩涩av久久男人的天堂| 欧美日韩精品成人综合77777| 中文字幕av电影在线播放| 99热全是精品| 国产精品一区二区性色av| 在线观看免费高清a一片| 91成人精品电影| 免费播放大片免费观看视频在线观看| 人妻少妇偷人精品九色| 国产片特级美女逼逼视频| 日本-黄色视频高清免费观看| 亚洲婷婷狠狠爱综合网| 免费大片黄手机在线观看| 国产日韩一区二区三区精品不卡 | 欧美xxxx性猛交bbbb| 欧美区成人在线视频| 久久午夜综合久久蜜桃| 日韩成人伦理影院| 午夜久久久在线观看| 久久狼人影院| 自拍欧美九色日韩亚洲蝌蚪91 | 各种免费的搞黄视频| 韩国av在线不卡| 寂寞人妻少妇视频99o| 国产在视频线精品| 久久久久久久久久人人人人人人| 9色porny在线观看| 一级av片app| 亚洲激情五月婷婷啪啪| 老司机亚洲免费影院| 成年美女黄网站色视频大全免费 | 春色校园在线视频观看| 日韩一区二区视频免费看| 我的女老师完整版在线观看| 乱码一卡2卡4卡精品| 婷婷色综合大香蕉| 亚洲av综合色区一区| 欧美精品人与动牲交sv欧美| 亚洲va在线va天堂va国产| 美女脱内裤让男人舔精品视频| 精品国产国语对白av| 国产精品一区二区三区四区免费观看| 嫩草影院新地址| 国产伦在线观看视频一区| 91久久精品国产一区二区三区| 另类亚洲欧美激情| 夫妻午夜视频| 免费人成在线观看视频色| 亚洲内射少妇av| 又黄又爽又刺激的免费视频.| 亚洲精品日韩av片在线观看| 韩国高清视频一区二区三区| 亚洲av国产av综合av卡| 精品人妻熟女av久视频| 伊人亚洲综合成人网| 亚洲国产精品成人久久小说| 我的老师免费观看完整版| 在线观看免费高清a一片| 亚洲成色77777| 男男h啪啪无遮挡| 蜜桃在线观看..| av天堂久久9| 99re6热这里在线精品视频| 在线观看美女被高潮喷水网站| 两个人免费观看高清视频 | 久热久热在线精品观看| 国产黄频视频在线观看| 国产黄色视频一区二区在线观看| 日日啪夜夜撸| 又黄又爽又刺激的免费视频.| 成人国产麻豆网| 国产深夜福利视频在线观看| 最黄视频免费看| 一级av片app| 五月伊人婷婷丁香| 啦啦啦啦在线视频资源| 2022亚洲国产成人精品| 国产精品熟女久久久久浪| 人人妻人人澡人人爽人人夜夜| 91在线精品国自产拍蜜月| 99国产精品免费福利视频| 人人妻人人添人人爽欧美一区卜| 久久亚洲国产成人精品v| 一级二级三级毛片免费看| 高清视频免费观看一区二区| 人人澡人人妻人| 精品人妻熟女毛片av久久网站| 久久青草综合色| av有码第一页| 91精品伊人久久大香线蕉| 久久国产精品大桥未久av | 国产欧美亚洲国产| 日本爱情动作片www.在线观看| av有码第一页| 久久 成人 亚洲| 少妇高潮的动态图| 大片免费播放器 马上看| 精品少妇黑人巨大在线播放| 美女脱内裤让男人舔精品视频| 老司机影院毛片| 久久免费观看电影| 狂野欧美激情性xxxx在线观看| 一本大道久久a久久精品| 国产69精品久久久久777片| 精品国产一区二区三区久久久樱花| 99久久中文字幕三级久久日本| 国模一区二区三区四区视频| 十八禁高潮呻吟视频 | 亚洲欧美精品专区久久| 桃花免费在线播放| 少妇的逼好多水| av在线播放精品| 特大巨黑吊av在线直播| 两个人免费观看高清视频 | 国产精品久久久久久av不卡| 99久久精品一区二区三区| 又大又黄又爽视频免费| 丝袜脚勾引网站| 国产免费福利视频在线观看| 精品少妇内射三级| 99re6热这里在线精品视频| 国内揄拍国产精品人妻在线| 五月天丁香电影| 亚洲,欧美,日韩| 如日韩欧美国产精品一区二区三区 | 成人漫画全彩无遮挡| 热99国产精品久久久久久7| 精品一品国产午夜福利视频| 国产精品福利在线免费观看| 日韩一区二区三区影片| 免费高清在线观看视频在线观看| 精品人妻熟女av久视频| av.在线天堂| 久久久久网色| 男女免费视频国产| 2021少妇久久久久久久久久久| 大陆偷拍与自拍| 精品卡一卡二卡四卡免费| 国产精品一区二区三区四区免费观看| 国产高清国产精品国产三级| 青春草视频在线免费观看| 国产成人91sexporn| 乱人伦中国视频| 国产伦精品一区二区三区视频9| 久久久久久人妻| av又黄又爽大尺度在线免费看| 免费人成在线观看视频色| 亚洲精品国产成人久久av| 国产探花极品一区二区| 久久精品久久精品一区二区三区| 三级经典国产精品| 99九九在线精品视频 | 丰满少妇做爰视频| 边亲边吃奶的免费视频| 国产视频内射| 国产一区二区在线观看日韩| 久久久久久久亚洲中文字幕| 久久ye,这里只有精品| 亚洲欧美日韩东京热| 我要看黄色一级片免费的| 日韩av不卡免费在线播放| 国产视频内射| 亚洲国产av新网站| 日本欧美视频一区| 一级毛片电影观看| 久久鲁丝午夜福利片| av卡一久久| 永久网站在线| 国产精品国产三级国产专区5o| 最黄视频免费看| 91成人精品电影| 狂野欧美激情性xxxx在线观看| 欧美日本中文国产一区发布| 夜夜骑夜夜射夜夜干| 一级,二级,三级黄色视频| 久热久热在线精品观看| 日本vs欧美在线观看视频 | 十分钟在线观看高清视频www | 欧美精品一区二区免费开放| 建设人人有责人人尽责人人享有的| 成人黄色视频免费在线看| 免费看日本二区| 亚洲av.av天堂| 欧美变态另类bdsm刘玥| av国产精品久久久久影院| 国产av精品麻豆| 亚洲精品第二区| 人人妻人人澡人人看| 日韩视频在线欧美|