• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Robust Watermarking Scheme for NIfTI Medical Images

    2022-08-24 03:28:54AbhishekKumarKamredUdhamSinghVisvamDevadossAmbethKumarTapanKantAbdulKhaderJilaniSaudagarAbdullahAlTameemMohammedAlKhathamiMuhammadBadruddinKhanMozaherulHoqueAbulHasanatandKhalidMahmoodMalik
    Computers Materials&Continua 2022年5期

    Abhishek Kumar,Kamred Udham Singh,Visvam Devadoss Ambeth Kumar,Tapan Kant,Abdul Khader Jilani Saudagar,Abdullah Al Tameem,Mohammed Al Khathami,Muhammad Badruddin Khan,Mozaherul Hoque Abul Hasanat and Khalid Mahmood Malik

    1School of Computer Science and IT,JAIN(Deemed to be University),Bangalore,560069,India

    2Department of Computer Science and Information Engineering,National Cheng Kung University,Tainan,701,Taiwan

    3Department of Computer Science&Engineering,Panimalar Engineering College,Anna University,Chennai,600123,India

    4Patna Women’s College,Patna,800001,India

    5Information Systems Department,College of Computer and Information Sciences,Imam Mohammad Ibn Saud Islamic University(IMSIU),Riyadh,11432,Saudi Arabia

    6Department of Computer Science and Engineering,Oakland University,Rochester,48309,USA

    Abstract:Computed Tomography(CT)scan and Magnetic Resonance Imaging(MRI)technologies are widely used in medical field.Within the last few months, due to the increased use of CT scans, millions of patients have had their CT scans done.So, as a result, images showing the Corona Virus for diagnostic purposes were digitally transmitted over the internet.The major problem for the world health care system is a multitude of attacks that affect copyright protection and other ethical issues as images are transmitted over the internet.As a result, it is important to apply a robust and secure watermarking technique to these images.Notably,watermarking schemes have been developed for various image formats,including.jpg,.bmp,and.png,but their impact on NIfTI (Neuroimaging Informatics Technology Initiative) images is not noteworthy.A watermarking scheme based on the Lifting Wavelet Transform(LWT)and QR factorization is presented in this paper.When LWT and QR are combined, the NIfTI image maintains its inherent sensitivity and mitigates the watermarking scheme’s robustness.Multiple watermarks are added to the host image in this approach.Measuring the performance of the graphics card is done by using PSNR, SSIM, Q (a formula which measures image quality),SNR,and Normalized correlation.The watermarking scheme withstands a variety of noise attacks and conversions,including image compression and decompression.

    Keywords: Watermarking;NIfTI;LWT;QR;image security

    1 Introductio n

    Today, the role of computers in a wide range of occupations is critical to success, because computer-assisted technologies provide rapid and accurate results in every industry.In addition to medical science and healthcare systems, these technologies were used to quickly transmit digital medical images around the world to aid in diagnosis.CT-scan, MRI, and Color Doppler Imaging have transformed modern medicine.As a result, doctors can acquire and interpret imaging results much faster and more accurately than with previous imaging methods such as x-rays.There are two major issues with film-based imaging.One is that print costs are high,and the other is that filmless imaging techniques must be used to solve this problem.Because multiple radiologists can view the same image at the same time,film-less imaging provides greater access and broader diagnostics than film-based imaging.Thus, a doctor who is too far away from the patient may provide a solution by using a film-less imaging system, which is beneficial to both the patient and the doctor.COVID-19 has recently spread throughout the world,and it is now a major concern for doctors.Researchers are working to find a cure for the corona pandemic,which is affecting billions of people,by using digital imaging technology to detect and assess COVID-19 [1].However, it is critical to safeguard private electronic data from malicious intruders.

    Hospitals now hold the majority of COVID-19 patient data due to the increased use of medical imaging (medical imaging of the patient) with patient personal information, diagnosis history, and other reports delivered over the network.It has become common practise to expose yourself to new risks in order to benefit from them for specific reasons such as diagnosis, treatment, medical consultation, distance learning, and training.Healthcare providers (doctors and imaging providers)have a difficult time taking security threats seriously.Images may be intentionally or unintentionally distorted during medical image generation and communication,which can have serious consequences for patient diagnosis[2].For the researcher,this is the moment of truth:It is a difficult task to maintain the delicate medical image’s integrity and authenticity in an unprotected network.Watermarking can ensure the image’s integrity and authenticity.Digital watermarking is a process that embeds a digital watermark(a meaningful image)into an image carrier(an image that has not been altered in any way,such as size,format,or information)without changing anything else,including the image’s characteristics(image size,format,and content).To verify the image’s legitimacy,you must extract the watermark that has been embedded in the host image [3].When a watermarking procedure affects a medical image in a clinical setting, trust in the image is undermined.Misdiagnosis caused by minor changes in the image could result in dangerous consequences and legal issues.Watermarking techniques that use transformation domains and spatial domains can be considered.To convert an image to the frequency domain,a transform domain strategy employs various wavelet transforms such as DCT,DFT,DWT,and watermark insertion.In contrast to spatial watermarking techniques,which embed the watermark’s bits in the host image,image watermarking strategies embed the watermark’s bits in a different location.Transformation domain schemes outperform spatial domain systems in terms of robustness[4].The robustness of all digital watermarking techniques is a major issue.Many researchers have proposed watermarking proposals for.bmp and jpg medical photos.As of now,three DICOM watermarking systems have been proposed:The increasing use of advanced imaging technologies such as X-ray, ultrasound, MRI, and CAT scans necessitated the development of the NIfTI imaging technology rather than Windows-style BMP, JPEG, and DICOM-based CT scans.There is highly sensitive medical data in NIfTI photographs.To prevent counterfeiting,it is critical to use a strong watermarking method in the NIfTI images to provide the necessary medical diagnosis in the healthcare system[5].

    A safe watermarking approach for NIfTI images is based on LWT and QR factorization,which we call NIfTI QR LWT.The image watermarking and grayscale watermarks that are used in this approach try to provide better robustness and reduced complexity for CT-Scan image watermarking(.nii format).start by applying the LWT on the image, which breaks the image down into four subbands LL(low-low),HL(high-low),LH(low-high)and HH(high-high).It permits every one of these steps to take place;then apply QR factorization on the watermark.As you can see,LL uses more of the image’s energy in their factorized watermark,and so would be the best choice for that application.

    This proposed system is extremely resilient to noise attacks and various formatting changes.Related work has been discussed in Section 2.Sections 3 and 4 go over the LWT and QR.Section 4 also introduces the proposed watermarking strategy.Section 5 includes experimental results as well as an examination of some proposed medical imaging work.Section 6 examines the results of the robustness analysis,and Section 7 provides the analysis’conclusions.

    2 Related Work

    The fact that telemedicine applications have advanced significantly[6]indicates that researchers are now interested in the application of digital medical imaging.The majority of medical images are classified as colour or grayscale.Furthermore,most medical equipment,such as CT scans,X-rays,and ultrasounds,generate images with varying shades of grey,such as bmp,jpg,DICOM,and so on.As a result,researchers are more aware of medical imaging,which has far-reaching applications beyond medical imaging.Several image watermarking techniques are reported in the literature, all of which are based on matrix decompositions.

    The watermarking scheme created by Wang et al.[7] was first used by the image’s creator.HL and LH were chosen for watermark insertion, so LU factorization is also applied to those two subbands.To incorporate a watermark,it has first altered with the Arnold transformation and then the transformed watermark is applied to the bands that have been selected.Multiple image processing attacks,such as contrast adjustment,noise assault,JPEG compression,cropping,and Gaussian noise,are resistant to this methodology.Lin et al.[8]introduced a watermarking methodology in which the initially DWT is applied to the LL band,and the QR decomposition is subsequently employed on the R matrix to incorporate the encrypted watermark in the initial row.According to Su et al.[9],a blind watermarking method for QR decomposition is proposed.When the image was first divided into 4 X 4 blocks, QR decomposition was applied to each block and watermark is inserted in the initial row of R matrix of each blocks.While cropping,blurring,rotation,scaling,adding noise,and sharpening have no effect on the image, the technique is well protected against each of these effects.Ni et al.[10] suggested LWT-based watermarking technique.The watermark is added in LL sub bands after LWT has been applied to the host image.A chaotic sequence is used to estimate the location of spatial tempering.In this study,Gao et al.[11]proposed a reversible watermarking scheme using the LWT and chaotic system.To divide the host image into non-overlapping blocks,the author first applied LWT on every non-overlapping block.The subsequent LL band is used to insert the watermark on every block.To make shuffling of blocks even more chaotic,use the chaotic system.This is specifically meant to counter crop hacking,and it is very secure.Lizong et al.[12]suggested a watermarking approach based on LWT and a chaotic system.The black-and-white image is the watermark,while the color image is the host image.This approach survives image processing attacks such as cropping, sharpening, and JPEG compression.A new method devised by Zairi et al.[13]uses DWT,DCT,and QR decomposition in combination.Entropy values have been used to determine watermark embedding in this method,according to the images’entropy.Researchers Ghaderi et al.[14]developed a method that utilized LWT and SVD.An author performs a 4-level LWT on the HL and LH sub bands before applying the SVD to the HL and LH sub bands.The watermark image has been transformed into a binary image,and afterwards the watermark is added by changing the values of the binary image’s bands.It has built-in contrast and rotation, scaling, and cropping resistance for the JPEG compression and cropping.In a study done by Chamlawi et al.[15], a novel LWT semi-fragile watermarking approach is created.The first watermark is used for authentication, while the second watermark for image recovery and authenticity was implemented.Determines that the JPEG compression attack scheme is both efficient and secure.In a paper published in the Computational Molecular Biology journal,Mehta et al.[16]described a scheme that combines the Lagrangian Weibull(LWT),QR,and SVR models(LSVR).For the cover image,the author started with the LWT.After that,he broke the low-frequency sub bands into 4x4 blocks.Once QR decomposition has been applied to these blocks,watermarking is done to the first row of R matrix.This approach is completely resistant to cropping,scaling,noise,and JPEG compression attacks.Su et al.[17]devised a watermarking strategy that makes use of LWT and state coding.The LWT was first applied to the colour space YCrCb.A watermark is also added to the Y,Cr,and Cb frequencies in low-frequency bands.Sleit et al.[18]developed semi-blind hybrid watermarking in grayscale images by first using SVD and DWT and then adding a binary watermark.Golshan et al.[19]proposed a hybrid watermarking technique that incorporates SVD,DCT,and DWT.The image was first decomposed using the DCT, followed by the DWT, which was used to divide it into four sub-bands.Finally, a watermark is inserted into the singular values of each sub.S.introduced the technique of using LWT and SVD to create robust watermarking.K.and Sarkar.The transformation in this scheme was performed using Sarkar et al.[20],LWT.The image is divided into 2x2 blocks using LWT.The author then applied the SVD to these blocks,inserting a watermark in each individual value.According to Verma et al.[21],a recent LWT-based design scheme is planned in which three levels of LWT are used,after which LH bands are separated into blocks that are then randomly shuffled before being encoded using binary watermarking.One major disadvantage of this strategy is that it cannot withstand noise or rotation attacks.

    3 Preliminaries

    Using image security enhancement, LWT (Lifting Wavelet Transform) is the most common watermarking method.The Wim Sweldens created it[22]The main feature of the lifting method is that all construction is done in the spatial domain.It cuts down the time and space complexity better than traditional wavelet transforms.There are fewer calculations to perform with the traditional wavelet transform, but with the lifting wavelet transform, fewer calculations are required, which means it is better as far as time and space complexity.Therefore, the quickest and most efficient approach to calculating the wavelet transform is to use the DWT.Neither the Fourier transform nor the lifting transform is required for lifting operations.After the wavelet transformation, the digital signal’s sequence of integers becomes a sequence of floating-point numbers.The digital signal cannot be completely restructured,as a result of this.In order to have a reasonably reversible implementation,we need a transform algorithm that preserves the domain of signal after the transform.when converted to LWT,the scope of the transform stays the same This ensures that integer to integer transformations will always be applied.LWT always outperforms traditional wavelet transforms,as this explains why it is broadly utilized in image processing.

    Now,we’ll talk about LWT in image processing.LWT divides an image into four sub-bands:LL,LH,HL,and HH.The LL sub-band has low-frequency components that contain the majority of the image’s energy, while the other sub-bands have high-frequency components that contain less of the image’s energy.Because the LL band contains the majority of the energy in the raw image,the LWT can be applied several times on it to decompose it into sub-bands.The 2-level LWT is depicted in Fig.1.

    Figure 1:2-Level LWT

    QR Factorization Theorem:In QR decomposition[23],a non-singular matrix of sizem×n.

    where Q is an orthogonal matrix with sizeS×Sand R represents the upper-triangular matrix.The row of Q matrix is generated by applying the Gram-Schmidt.Aand Q is denoted as

    A= [z1,z2,........,zn] andQ= [w1,w2,........,wn].The upper-triangular matrix R can be computed as:

    4 Proposed Algorithm

    First, the information needed for watermarking is securely stored, and then the information contained in the image data is processed to include watermarks.Grayscale is used for both the watermark and the background image.After selecting the first slice of the NIfTI image,perform LWT on it,resulting in the division of the image into four different frequency sub-bands as shown in Fig.2.This sub-band transmits the information required for image processing.During the QR factorization process,the primary components of the watermark are transformed into a new vector,which is then transformed into a new vector through the QR factorization process.

    Figure 2:Block diagram of hybrid method for digital watermarking process

    Embedded in the first slice of the NIfTI image’s LL frequency sub-band,the new watermark vector can be seen as an LL frequency sub-band watermark.It is necessary to control the augmentation of the host watermark by using a scaling factor (alpha).LL frequency sub-bands are overlaid on the composite image, which is then inverse transformed to achieve this result.After that, the patient’s EPR metadata(which includes their medical image information)is added to the original dataset,which results in the generation of the watermarked NIfTI image.A representation of the algorithm is shown in Fig.2,which can be found further down on this page.

    Input:CT-Scan NIfTI image Size(630×630)

    Grayscale Watermark Size(32×32)

    Output:Watermarked NIfTI image

    Step 1Extract patient metadata from the image.

    Step 2Apply the QR Factorization using Eq.(1)on the watermark.

    Step 3Perform two level LWT on first slice of the NIfTI image which decompose the slice into LH,HL,LL,and HH sub bands.

    Step 4The factorized watermark components are embedded into transformed components of the host slice by selecting the LL band.Watermark is embedded in the slice as shown in Eq.(2).

    where

    The transformed component of the watermark slice is denoted by x’.

    The factorized watermark component is denoted by y.

    x is the host slice’s transform slice.

    And,αis the embedding strength.

    Step 5Apply the final watermarked slice to an Inverse Lifting Wavelet Transformation.

    Step 6Embedded the patient’s metadata in watermarked image.

    After performing the watermark embedding process as shown in Fig.2,the watermark extraction process is the next critical step.The proposed watermark extraction process is depicted in Fig.3.The original NIfTI image is required to extract the watermark from the watermarked NIfTI image,as can be seen.EPR is initially separated from both the actual and watermarked NIfTI image and select the first slice of the NIfTI image.Next, we apply the LWT to both the actual and watermarked slice, decomposing them into four different frequency sub-bands, namely LL, LH, HL, and HH.Furthermore,we isolated the noisy components from the watermarked slice using the LL sub-bands of both slices,and then used the Inverse QR factorization on these noisy components to generate the watermarks.The proposed method’s extraction process is depicted in Fig.3 and explained below.

    Figure 3:Block diagram of hybrid method for watermark extraction

    Input:M x N NIfTI image I;and M x N NIfTI watermarked image I+.

    Output:Watermark W

    Step 1:Extract patient information from both the NIfTI images i.e.,I and I+.

    Step 2:Select the first slice of both images I and I+.

    Step 3:Perform single level LWT on both slice S and S+to obtain LL,LH,HL and HH sub bands.

    Step 4:By reversing the embedding steps;Eq.(3)extract the watermark from the watermarked image

    where

    The watermarked slice isS+

    The factorized watermark component is denoted byy.

    The original slice isS.

    and,αis the embedding strength.

    Step 5:Perform inverse QR factorization on extracted components to get the extracted watermark.

    5 Result and Discussion

    The proposed watermarking method is tested over NIfTI images generated by the CT-Scan of COVID patient taken from https://zenodo.org/record/3757476#.X0pwCnkzZPZ [24] under ethical medical practices,without revealing the patient’s identity and only for the experimental purpose.On the MATLAB platform,the proposed watermarking method was tested on an Intel core TM i7-5500U CPU 2.5 GHz Windows10 machine with 8 GB RAM.Various NIfTI images with a resolution of 630×630 pixels and a png watermark with a resolution of 32×32 pixels and a bit depth of 8 bits.

    5.1 Performance Measures

    The proposed watermarking method’s imperceptibility is evaluated using six different NIfTI images.As described in Eqs.(4)–(9) respectively with MSE, PSNR, SNR, NC, Q and SSIM are the image quality measurements that are examined.PSNR,NC,and SSIM are used to assess perceptual imperceptibility.For the watermark perceptibility estimation,PSNR is employed,which is outlined as follows[25].

    To assess the quality of the watermarking method, NC are calculated as the difference between the actual slice and the watermarked slice as defined below[26].

    Universal IQI(image quality index)Q[27]is defined as follows.

    where,

    and

    The original and test image signals are represented by w and z,respectively.

    Index of universal image quality Q can be defined as the product of three components:

    SSIM(Structural Similarity Index Measure),It is used to determine how similar the actual slice and the watermarked slice.The SSIM value ranges from-1 to+1;if SSIM=1,the actual image and watermark image are identical as described in Eq.(9).

    where Δp:the average of actual image and Δq:the average of watermarked image.

    σ2p:the variance of original cover andσ2q:the variance of watermarked image with covarianceσpq.Where,k1and k2are free parameters.

    5.2 Analysis of Proposed Method

    The proposed method has been tested on six different NIfTI images which are Img1,Img2,Img3,Img4,Img5 and Img6 to determine the imperceptibility and robustness.The test results are depicted in Figs.4 and 5.The metadata containing COVID-19 affected person’s information is also preserved within the watermarked NIfTI image.

    Figure 4:First slice of NIfTI images used for experiment and watermark image in BMP format

    Figure 5:Extracted watermarks from six medical images

    Tab.1 shows the performance metrics for watermarked images ranging from Img1 to Img6.Fig.7 shows a graphical representation of the MSE between the original slice of NIfTI image and the watermarked slice of image.Fig.6 shows the difference in Q and NC between the original NIfTI image and the watermarked image.Fig.8 depicts the graphical interpretation of the method’s PSNR and SNR metrics.Fig.9 depicts the proposed SSIM,which is closer to one.

    Table 1:Qualitative analysis of watermarked slice of the images

    Figure 6:NC and Q of all six images

    Figure 7:MSE of all six images

    Figure 8:PSNR and SNR matrices of all six images

    Figure 9:SSIM of all six images

    Image quality parameters NC, SSIM and Q are having values approximately close to one;indicating virtually excellent correlation between the initial and watermarked images.PSNR of the watermarked image is over 41.5 db,which suggests that the watermarked image quality is extremely considerable.

    5.3 Analysis of Proposed Method for Different Number of Watermarks Insertion

    Proposed watermarking method inserted the multiple number of watermarks across the image.The maximum watermark insertions in the NIfTI image without hampering the diagnosis of watermarked NIfTI image, demonstrated in Tab.1.These images contain sensitive patient’s medical information too.Thus, it is much essential that the quality of these image must not be degraded after the watermarking.Tab.2 shows that the image quality metrics are directly proportional to the number of watermarks inserted,with no discernible change.Figs.10–13 show the PSNR,NC,Q,and SNR,respectively.In Fig.10,we can see that decreasing the number of inserted watermarks raises the PSNR value.If we evaluate the PSNR and SNR of img1 at 24 watermark insertions and 2 watermark insertions,we find that there is a significant variation in PSNR from 44.9879 DB to 55.86161 DB and SNR from 35.71489 DB to 46.58859 DB, but no significant variation in NC and Q.In Tab.3, the proposed method’s results are compared to those of the other existing methods,and it is discovered that the proposed method’s results are more significant[2–3,28].

    Table 2:Performance evaluation of the proposed method for various numbers of watermark insertions with a watermark image size of 32×32

    Figure 10:PSNR comparison at different number of inserted watermarks

    Figure 11:Normalized correlation comparison at different number of watermark insertion

    Figure 12:Image quality comparison at different number of watermark insertion

    Figure 13:SNR comparison at different number of watermark insertion

    Table 3:Performance comparison of NC an PSNR values comparison proposed and existing method

    6 Robust Analysis

    This method is tested with various number of watermark insertion and found that the results are promising.Watermarked images are subjected to various image processing attacks such as Salt&Pepper,Gaussian noise,Poisson,Speckle,which may result in the removal of watermarks.Sustenance of method against these attacks is a critical requirement of any significant watermarking method.The quality of the watermarked image and the robustness of the method are inversely proportional to each other, but a trade-off must be considered if necessary.As a result, this method is tested with the maximum number of watermarks insertion, which increases robustness, and the minimum number of watermarks insertion,which increases image watermark image quality.To test the method’s robustness,attacks were performed on the watermarked image with the fewest number of watermark inclusions.The proposed watermarking method is for CT-Scan medical images;after watermarking,a watermarked NIfTI image is generated, and then diagnosis is framed on this watermarked NIFTI image.As a result, any significant degradation in the watermarked image quality is unacceptable because it may result in the patient’s death.As a result,the method is tested with various noise attacks and parameters until the quality metrics indicate that the attacked watermarked image is of high quality.

    6.1 Salt&Pepper Noise Attack

    The salt and pepper noise attack are used on the watermarked NIfTI image with noise densities of 0.001 and 0.003 and the watermark is successfully extracted using the suggested watermarking method.Tab.4 shows that this attack for NIfTI healthcare images is tabulated,and the results show that the efficiency of the suggested technique for NIfTI images is promising.

    Table 4:Parameters values of watermarked image after Salt&pepper noise attack with variance from 0.001 to 0.004 and extracted watermarks

    6.2 Speckle Noise Attack

    The watermark is successfully extracted by the proposed watermarking method after a speckle noise attack with a variance of 0.001 to 0.003 is applied to the watermarked NIfTI image.Tab.5 shows the results of the evaluation of the NIfTI medical image attack,and the findings show that the proposed technique for NIfTI image is effective.

    Table 5:Parameters values of watermarked image after Speckle noise attack with variance from 0.001 to 0.003 and extracted watermarks

    6.3 Poisson Noise Attack

    The Poisson noise attack is applied to the watermarked NIfTI image, and the watermark is successfully extracted using the proposed watermarking method.Tab.6 tabulates the attack analysis for NIfTI medical images,and the results show that the proposed method for NIfTI images performs well for watermark extraction.

    6.4 Gaussian Noise Attack

    The proposed watermarking method successfully extracts the watermark from the watermarked NIfTI image using a Gaussian noise attack with variance 0.001 and varying it from 0.001 to 0.004.The results of the analysis of the attack for the NIfTI medical images are tabulated in Tab.7,and the results show that the proposed method for NIfTI images performs well.

    Table 6:Parameters values of watermarked image after poisson noise attack and extracted watermarks

    Table 7:Parameters values of watermarked image after Gaussian noise attack with variance from 0.001 to 0.003 and extracted watermarks

    7 Conclusions

    The digital image watermarking commonly used in the medical imaging in the field of teleradiology for the medical image authentication purpose while also preserving the integrity of the medical data.Indeed, in this Covid situation it may play an importance in remote diagnosis of the medical images, proposed watermarking scheme can contribute to the security of medical images which are transmitted over the Internet.These images are very sensitive so extreme precautions must be must needed.A seemingly minor image degradation is frequently not tolerated in this discipline since it could result in an inaccurate diagnosis.In this paper we have proposed a watermarking scheme for NIfTI images which ensure the integrity of the medical image while maintaining efficient imperceptibility and robustness.

    The proposed watermarking method combines LWT and QR factorization to watermark NIfTI images that contain sensitive medical image data as well as patient information.The proposed method has been tested on various NIfTI images (630 x 630) sourced from CT-Scan and watermarked with grayscale watermarks (32 x 32).The parameters NC, Q, SNR, PSNR, and SSIM serve as the foundation for analyzing watermarked image quality.The tradeoff between image quality and watermark insertion ensures that significant results are obtained.The proposed watermarking method is resistant to image processing attacks such as Salt&Pepper,Poisson,Speckle,and Gaussian noise.After image processing attacks the watermarks are extracted successfully from the watermarked slice of the NIFTI image.The method’s results are compared to other existing methods,which shows that the proposed method’s results are extremely significant.In the future,the embedded watermark logo can be encrypted using the best encryption algorithm before embedding that provides the maximum efficiency.Furthermore,to increase the robustness of the watermarking scheme,chaotic systems with matrix factorizations can be used.

    Acknowledgement:The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number 959.

    Funding Statement:This work was supported by Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number 959.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    大香蕉久久成人网| 久久国产精品大桥未久av| 亚洲视频免费观看视频| 亚洲精品一二三| 99国产精品免费福利视频| 51午夜福利影视在线观看| 在线观看日韩欧美| 91精品国产国语对白视频| 一边摸一边抽搐一进一出视频| 国产精品一区二区精品视频观看| 成年人午夜在线观看视频| 一二三四在线观看免费中文在| 国产精品国产高清国产av | 免费观看人在逋| 亚洲九九香蕉| 国产男女超爽视频在线观看| 久久久国产精品麻豆| 国产精品av久久久久免费| 高清黄色对白视频在线免费看| 一区二区三区精品91| 18禁裸乳无遮挡动漫免费视频| 一区二区三区国产精品乱码| 每晚都被弄得嗷嗷叫到高潮| 亚洲精品国产精品久久久不卡| 欧美乱妇无乱码| av一本久久久久| 国产乱人伦免费视频| 天天影视国产精品| 亚洲av熟女| 成人国语在线视频| 亚洲一区中文字幕在线| 日韩欧美一区视频在线观看| 母亲3免费完整高清在线观看| 色综合欧美亚洲国产小说| 天天躁日日躁夜夜躁夜夜| 成人国产一区最新在线观看| 黑丝袜美女国产一区| 免费在线观看黄色视频的| 人妻丰满熟妇av一区二区三区 | 亚洲av熟女| 精品午夜福利视频在线观看一区| 下体分泌物呈黄色| 亚洲,欧美精品.| 国产黄色免费在线视频| 亚洲在线自拍视频| 婷婷成人精品国产| 91成年电影在线观看| bbb黄色大片| 丁香六月欧美| 91成人精品电影| 亚洲性夜色夜夜综合| 久久久精品国产亚洲av高清涩受| 色综合婷婷激情| www.自偷自拍.com| 午夜福利欧美成人| 热99久久久久精品小说推荐| 十八禁网站免费在线| 欧美激情高清一区二区三区| av网站免费在线观看视频| 男女下面插进去视频免费观看| 1024视频免费在线观看| 欧美日韩一级在线毛片| 99久久精品国产亚洲精品| 国产亚洲欧美精品永久| 中文字幕av电影在线播放| 三上悠亚av全集在线观看| 欧美日本中文国产一区发布| 99热网站在线观看| 9热在线视频观看99| 国产精品香港三级国产av潘金莲| 丝袜人妻中文字幕| 精品第一国产精品| 999精品在线视频| 日本精品一区二区三区蜜桃| 很黄的视频免费| 精品国产国语对白av| 国产亚洲精品第一综合不卡| 亚洲av日韩在线播放| 成熟少妇高潮喷水视频| 一二三四在线观看免费中文在| 热99久久久久精品小说推荐| 日韩大码丰满熟妇| 欧美最黄视频在线播放免费 | tube8黄色片| 亚洲精品中文字幕一二三四区| 亚洲第一欧美日韩一区二区三区| 成年版毛片免费区| 亚洲男人天堂网一区| 如日韩欧美国产精品一区二区三区| 午夜免费鲁丝| 亚洲少妇的诱惑av| 亚洲一码二码三码区别大吗| 亚洲情色 制服丝袜| 不卡一级毛片| 国产精品自产拍在线观看55亚洲 | 午夜福利乱码中文字幕| 亚洲色图 男人天堂 中文字幕| 久久青草综合色| 纯流量卡能插随身wifi吗| 女性生殖器流出的白浆| 亚洲avbb在线观看| 美女视频免费永久观看网站| 中文字幕人妻丝袜制服| 久久久久精品国产欧美久久久| 一边摸一边做爽爽视频免费| 国产亚洲欧美在线一区二区| 精品一区二区三区四区五区乱码| 老熟妇乱子伦视频在线观看| 精品人妻熟女毛片av久久网站| 后天国语完整版免费观看| 国产成人免费无遮挡视频| 黑人巨大精品欧美一区二区蜜桃| 亚洲av熟女| 国产片内射在线| 亚洲精品在线美女| 人人妻人人澡人人爽人人夜夜| 成人国语在线视频| 一二三四在线观看免费中文在| 久久久久久免费高清国产稀缺| 超碰97精品在线观看| 国产精品综合久久久久久久免费 | 99香蕉大伊视频| 欧美中文综合在线视频| 亚洲av片天天在线观看| 欧美日韩av久久| 每晚都被弄得嗷嗷叫到高潮| 精品人妻在线不人妻| 一个人免费在线观看的高清视频| 99riav亚洲国产免费| 精品欧美一区二区三区在线| 久久精品国产综合久久久| 亚洲精品在线美女| 国产欧美日韩一区二区三| 国内毛片毛片毛片毛片毛片| 亚洲色图 男人天堂 中文字幕| 三级毛片av免费| 黄色丝袜av网址大全| 老司机亚洲免费影院| 伊人久久大香线蕉亚洲五| 热99久久久久精品小说推荐| 51午夜福利影视在线观看| 亚洲人成伊人成综合网2020| 淫妇啪啪啪对白视频| 国产精品98久久久久久宅男小说| 美女高潮到喷水免费观看| 性少妇av在线| 亚洲成人免费电影在线观看| 午夜福利免费观看在线| 亚洲avbb在线观看| 黑人巨大精品欧美一区二区蜜桃| 一边摸一边抽搐一进一小说 | 极品教师在线免费播放| 欧美国产精品一级二级三级| 日韩欧美国产一区二区入口| 99riav亚洲国产免费| 日日爽夜夜爽网站| 国产免费av片在线观看野外av| 亚洲熟女精品中文字幕| 欧美不卡视频在线免费观看 | 两性夫妻黄色片| 免费一级毛片在线播放高清视频 | 日韩制服丝袜自拍偷拍| 色精品久久人妻99蜜桃| 亚洲中文日韩欧美视频| 91麻豆精品激情在线观看国产 | 91精品国产国语对白视频| 亚洲欧美色中文字幕在线| 一边摸一边抽搐一进一小说 | 大型av网站在线播放| 丰满迷人的少妇在线观看| 999久久久国产精品视频| 免费女性裸体啪啪无遮挡网站| 国产高清videossex| 自线自在国产av| 亚洲av第一区精品v没综合| 久久久久精品国产欧美久久久| 成人av一区二区三区在线看| 亚洲欧美一区二区三区黑人| 欧美久久黑人一区二区| 国产xxxxx性猛交| 超色免费av| 精品国产国语对白av| 久久精品aⅴ一区二区三区四区| 成人手机av| 亚洲av成人一区二区三| 亚洲第一青青草原| 大码成人一级视频| 999久久久国产精品视频| 满18在线观看网站| 亚洲av片天天在线观看| 男女床上黄色一级片免费看| 免费久久久久久久精品成人欧美视频| 成人国产一区最新在线观看| 夜夜爽天天搞| 夜夜躁狠狠躁天天躁| 一区二区三区激情视频| 国产av一区二区精品久久| 久久人妻熟女aⅴ| 久久这里只有精品19| 91大片在线观看| 欧美激情久久久久久爽电影 | 777米奇影视久久| 在线十欧美十亚洲十日本专区| 国产91精品成人一区二区三区| 国产一区二区三区在线臀色熟女 | av天堂久久9| 最新美女视频免费是黄的| 久热爱精品视频在线9| 亚洲国产精品sss在线观看 | 一a级毛片在线观看| 黄片小视频在线播放| 日本vs欧美在线观看视频| 国产亚洲av高清不卡| 99精国产麻豆久久婷婷| 国产成人av激情在线播放| 波多野结衣av一区二区av| 男人的好看免费观看在线视频 | 99re在线观看精品视频| aaaaa片日本免费| 女同久久另类99精品国产91| 一夜夜www| 黄色怎么调成土黄色| 精品一区二区三卡| 日韩一卡2卡3卡4卡2021年| 亚洲精品成人av观看孕妇| videosex国产| 一级毛片女人18水好多| 18禁国产床啪视频网站| 老司机福利观看| 欧美亚洲日本最大视频资源| 99国产精品一区二区蜜桃av | 国产成人精品久久二区二区91| 精品少妇久久久久久888优播| 亚洲国产看品久久| 99热网站在线观看| 日韩免费av在线播放| 一级片免费观看大全| 亚洲成人手机| 亚洲精品美女久久久久99蜜臀| 老司机午夜福利在线观看视频| 黄色 视频免费看| 欧美精品人与动牲交sv欧美| av电影中文网址| 亚洲成av片中文字幕在线观看| 人妻久久中文字幕网| 亚洲欧美精品综合一区二区三区| 99精国产麻豆久久婷婷| 中文字幕av电影在线播放| 国产免费av片在线观看野外av| 两人在一起打扑克的视频| 国产亚洲一区二区精品| 免费人成视频x8x8入口观看| 一本综合久久免费| 人人妻人人澡人人爽人人夜夜| 久久影院123| 亚洲成人免费av在线播放| 亚洲人成电影观看| av免费在线观看网站| 国内毛片毛片毛片毛片毛片| 色播在线永久视频| 欧美激情极品国产一区二区三区| 我的亚洲天堂| 亚洲国产毛片av蜜桃av| 亚洲成a人片在线一区二区| 国产成人欧美| 1024视频免费在线观看| 老司机在亚洲福利影院| 一夜夜www| 少妇猛男粗大的猛烈进出视频| 80岁老熟妇乱子伦牲交| 国产激情久久老熟女| 婷婷精品国产亚洲av在线 | 十八禁高潮呻吟视频| 青草久久国产| 热99国产精品久久久久久7| 人妻 亚洲 视频| 亚洲精品自拍成人| 欧美久久黑人一区二区| 激情视频va一区二区三区| 女人久久www免费人成看片| 欧美日韩福利视频一区二区| 精品国内亚洲2022精品成人 | 亚洲av第一区精品v没综合| 午夜成年电影在线免费观看| 丰满饥渴人妻一区二区三| 捣出白浆h1v1| 波多野结衣一区麻豆| 国产99久久九九免费精品| 亚洲精品国产区一区二| videosex国产| 亚洲在线自拍视频| 人妻一区二区av| √禁漫天堂资源中文www| 涩涩av久久男人的天堂| 亚洲人成伊人成综合网2020| 国产深夜福利视频在线观看| 99热国产这里只有精品6| 建设人人有责人人尽责人人享有的| 亚洲一码二码三码区别大吗| 欧美精品啪啪一区二区三区| 日本a在线网址| 在线观看舔阴道视频| 亚洲精品美女久久av网站| 9热在线视频观看99| 91成年电影在线观看| 亚洲在线自拍视频| a级片在线免费高清观看视频| 婷婷丁香在线五月| 亚洲少妇的诱惑av| 国产亚洲欧美98| 国产欧美日韩一区二区三区在线| 波多野结衣一区麻豆| 午夜两性在线视频| 桃红色精品国产亚洲av| 亚洲中文字幕日韩| 欧美亚洲 丝袜 人妻 在线| 水蜜桃什么品种好| 大型av网站在线播放| av电影中文网址| 人人妻人人澡人人爽人人夜夜| 欧美最黄视频在线播放免费 | www.999成人在线观看| 久久ye,这里只有精品| 久久狼人影院| 国产成人啪精品午夜网站| 日本欧美视频一区| 精品久久蜜臀av无| 村上凉子中文字幕在线| 少妇的丰满在线观看| 亚洲精品在线观看二区| av片东京热男人的天堂| 村上凉子中文字幕在线| 久久精品国产99精品国产亚洲性色 | 久久99一区二区三区| 搡老熟女国产l中国老女人| 中文字幕人妻丝袜一区二区| 黄色怎么调成土黄色| 欧美黄色片欧美黄色片| 淫妇啪啪啪对白视频| 欧美激情 高清一区二区三区| 在线播放国产精品三级| 欧美老熟妇乱子伦牲交| 国产精品 欧美亚洲| avwww免费| 人妻久久中文字幕网| 在线观看一区二区三区激情| 亚洲第一欧美日韩一区二区三区| 亚洲国产看品久久| 午夜成年电影在线免费观看| 国产欧美日韩一区二区三| 夫妻午夜视频| 精品一区二区三卡| 免费av中文字幕在线| 久久精品国产亚洲av香蕉五月 | 亚洲成av片中文字幕在线观看| 最新美女视频免费是黄的| 女人高潮潮喷娇喘18禁视频| 欧美精品人与动牲交sv欧美| 人妻丰满熟妇av一区二区三区 | 免费在线观看影片大全网站| 成年动漫av网址| 国产av精品麻豆| 人妻久久中文字幕网| 欧美日韩黄片免| 18禁美女被吸乳视频| 亚洲欧美日韩高清在线视频| 欧美黑人欧美精品刺激| 国产精品电影一区二区三区 | 免费在线观看视频国产中文字幕亚洲| 日本a在线网址| 免费日韩欧美在线观看| 美女高潮到喷水免费观看| 色综合欧美亚洲国产小说| 欧美亚洲日本最大视频资源| 黑丝袜美女国产一区| 亚洲综合色网址| 一边摸一边做爽爽视频免费| 精品久久久久久久毛片微露脸| 久久久久精品国产欧美久久久| 在线观看免费视频网站a站| 美女扒开内裤让男人捅视频| 一进一出好大好爽视频| 人人澡人人妻人| 亚洲精品美女久久久久99蜜臀| 亚洲精品久久午夜乱码| videosex国产| 又黄又粗又硬又大视频| 一夜夜www| 久久久久国产精品人妻aⅴ院 | 精品国产超薄肉色丝袜足j| 十八禁人妻一区二区| 中文亚洲av片在线观看爽 | 免费看a级黄色片| 亚洲一区高清亚洲精品| 久久精品熟女亚洲av麻豆精品| 国产男女内射视频| 亚洲视频免费观看视频| 一级毛片女人18水好多| 一个人免费在线观看的高清视频| 一本大道久久a久久精品| 51午夜福利影视在线观看| 欧美激情久久久久久爽电影 | 久久人妻熟女aⅴ| 岛国在线观看网站| 亚洲精品自拍成人| 亚洲精品中文字幕在线视频| 国产成人一区二区三区免费视频网站| 亚洲美女黄片视频| 法律面前人人平等表现在哪些方面| 亚洲精品久久成人aⅴ小说| 久久中文看片网| 成人国语在线视频| 一区二区日韩欧美中文字幕| 久久久久久久久免费视频了| 国产三级黄色录像| 中文字幕精品免费在线观看视频| 久久精品国产亚洲av高清一级| 午夜激情av网站| 高清毛片免费观看视频网站 | 日韩成人在线观看一区二区三区| 人妻久久中文字幕网| 久久精品国产亚洲av香蕉五月 | 成在线人永久免费视频| 成年人午夜在线观看视频| 日韩人妻精品一区2区三区| 亚洲熟女毛片儿| 麻豆国产av国片精品| 黑人巨大精品欧美一区二区蜜桃| 中出人妻视频一区二区| 91麻豆精品激情在线观看国产 | 老熟妇仑乱视频hdxx| 99久久国产精品久久久| 一级a爱片免费观看的视频| √禁漫天堂资源中文www| 99国产综合亚洲精品| 国产精品久久久久成人av| 69av精品久久久久久| 一级a爱视频在线免费观看| 成人手机av| 亚洲 国产 在线| 国产97色在线日韩免费| 一区二区日韩欧美中文字幕| 黄色怎么调成土黄色| 亚洲成人国产一区在线观看| 日韩欧美在线二视频 | 最新在线观看一区二区三区| 国产99白浆流出| 十八禁人妻一区二区| 侵犯人妻中文字幕一二三四区| 国产亚洲精品久久久久5区| 我的亚洲天堂| 久热这里只有精品99| 欧美成人免费av一区二区三区 | 免费观看人在逋| 亚洲国产欧美网| 99精品欧美一区二区三区四区| 国产高清国产精品国产三级| 欧美av亚洲av综合av国产av| 欧美日韩福利视频一区二区| 999久久久精品免费观看国产| 香蕉丝袜av| 色综合婷婷激情| 日韩三级视频一区二区三区| 91老司机精品| 久久精品国产清高在天天线| 校园春色视频在线观看| 国产精品久久久av美女十八| av一本久久久久| 国产欧美亚洲国产| 欧美 亚洲 国产 日韩一| 1024视频免费在线观看| 国产欧美日韩一区二区三区在线| 久久精品国产99精品国产亚洲性色 | 亚洲在线自拍视频| 国产av精品麻豆| 九色亚洲精品在线播放| av福利片在线| 99re在线观看精品视频| 我的亚洲天堂| 中文字幕人妻丝袜制服| 亚洲三区欧美一区| 老司机午夜十八禁免费视频| 久久久精品免费免费高清| 久久人人爽av亚洲精品天堂| 99精国产麻豆久久婷婷| 亚洲欧美日韩另类电影网站| 在线观看免费午夜福利视频| 精品久久久久久,| 欧美精品av麻豆av| 国产精品一区二区在线观看99| 曰老女人黄片| 99精品久久久久人妻精品| 无遮挡黄片免费观看| 黑人猛操日本美女一级片| 日韩三级视频一区二区三区| 老司机亚洲免费影院| 在线观看免费日韩欧美大片| 国产日韩欧美亚洲二区| 国产精品一区二区在线不卡| 亚洲av电影在线进入| 777久久人妻少妇嫩草av网站| 国产熟女午夜一区二区三区| 免费少妇av软件| 精品一区二区三区av网在线观看| 中文字幕另类日韩欧美亚洲嫩草| 建设人人有责人人尽责人人享有的| 精品一区二区三区四区五区乱码| 80岁老熟妇乱子伦牲交| 热re99久久国产66热| av网站免费在线观看视频| 亚洲精品中文字幕在线视频| 久久草成人影院| 另类亚洲欧美激情| 精品国产国语对白av| 1024视频免费在线观看| 亚洲伊人色综图| 欧洲精品卡2卡3卡4卡5卡区| 亚洲精品粉嫩美女一区| 成年版毛片免费区| 一进一出抽搐动态| 国产av一区二区精品久久| 91精品国产国语对白视频| 啪啪无遮挡十八禁网站| 久久人人97超碰香蕉20202| 亚洲国产中文字幕在线视频| 亚洲中文av在线| 下体分泌物呈黄色| 人人妻人人澡人人看| 午夜福利乱码中文字幕| 亚洲中文日韩欧美视频| 一边摸一边抽搐一进一小说 | 欧洲精品卡2卡3卡4卡5卡区| 久久久久久久午夜电影 | 久久精品国产清高在天天线| 亚洲欧美一区二区三区久久| 高清毛片免费观看视频网站 | 国产不卡av网站在线观看| netflix在线观看网站| 这个男人来自地球电影免费观看| 午夜免费成人在线视频| 成人18禁高潮啪啪吃奶动态图| 午夜福利免费观看在线| 黑人巨大精品欧美一区二区mp4| 亚洲欧美激情综合另类| 久久精品国产清高在天天线| 午夜福利影视在线免费观看| 欧美乱妇无乱码| 国产又爽黄色视频| 一级毛片精品| 久久精品91无色码中文字幕| ponron亚洲| 夜夜夜夜夜久久久久| 巨乳人妻的诱惑在线观看| 精品欧美一区二区三区在线| 一a级毛片在线观看| 国产男女内射视频| 少妇被粗大的猛进出69影院| 99久久综合精品五月天人人| 亚洲国产精品sss在线观看 | 人成视频在线观看免费观看| 老司机亚洲免费影院| 最近最新免费中文字幕在线| 午夜两性在线视频| 午夜精品在线福利| 日韩制服丝袜自拍偷拍| 久久久国产成人精品二区 | 少妇被粗大的猛进出69影院| 黄片播放在线免费| 亚洲av日韩精品久久久久久密| 天天躁日日躁夜夜躁夜夜| 亚洲av熟女| 黑人巨大精品欧美一区二区mp4| 91国产中文字幕| 每晚都被弄得嗷嗷叫到高潮| 午夜精品在线福利| 女人被躁到高潮嗷嗷叫费观| 久久香蕉激情| 丝瓜视频免费看黄片| 亚洲免费av在线视频| avwww免费| 国产高清videossex| 男女床上黄色一级片免费看| 精品高清国产在线一区| 亚洲av第一区精品v没综合| 国产精品免费视频内射| 成人手机av| 亚洲av成人不卡在线观看播放网| 亚洲一区高清亚洲精品| 久久精品国产亚洲av香蕉五月 | 日本精品一区二区三区蜜桃| 真人做人爱边吃奶动态| 精品国产一区二区三区久久久樱花| 精品国内亚洲2022精品成人 | 后天国语完整版免费观看| 成人av一区二区三区在线看| 免费在线观看黄色视频的| 国产精品影院久久| 免费在线观看日本一区| 黑丝袜美女国产一区| 成年版毛片免费区| 成人黄色视频免费在线看| av中文乱码字幕在线| 午夜成年电影在线免费观看| 国产欧美日韩精品亚洲av| 午夜91福利影院| 69av精品久久久久久| 超碰97精品在线观看| 女警被强在线播放| 亚洲精品在线观看二区| 成人三级做爰电影| 日韩欧美一区二区三区在线观看 | 精品电影一区二区在线| 久久久国产成人精品二区 | 国产一区二区激情短视频| 老司机深夜福利视频在线观看|