We present two semi-automatic solution methods for the three dimensional (3D) segmentation of cavity and myocardium from a 3D cardiac multislice CT (MSCT) data. The main framework of the segmentation algorithms is based on random walks, in which the novelty lies in a seeds-selection method composed of region growing technique and morphological operation to locate and identify the cavity and myocardium of the left ventricle (LV). In the first solution, a semi-automatic segmentation approach (Method_1) is suggested to extract the epi-cardium and endo-cardium boundaries of LV of the heart. This proposed solution depends on the use of the normal random walker algorithm. In the second solution, a semi-automatic segmentation approach (Method_2) based on improved random walks is proposed. Segmentation is done within the framework of toboggan algorithm in combination with a random walk based technique. The two proposed semi-automatic segmentation methods either based on the normal random walker or the improved random walker algorithms utilized six-connected lattice topology and a conjugate gradient method to promote the segmentation performance of the 3D data. The two semi-automatic solution methods were evaluated using 20 cardiac MSCT datasets. Semi-automatic generated contours were compared to expert contours. For Method_1, 83.4% of epi-cardial contours and 74.7% of endo-cardial contours had a maximum error of 5 mm along 95% of the contour arc length. For Method_2, those numbers were 94.3% (epi-cardium) and 92.3% (endo-cardium), respectively. Volume regression analysis revealed good linear correlations between manual and semiautomatic volumes, r ≥ 0.99.
We propose a new public digital watermarking technique for video copyright protection working in the discrete wavelet transform (DWT) domain. The proposed scheme is a combination of spread-spectrum and quantization-based watermarking. The proposed scheme is characterized by two achievements: (i) a spread-spectrum technique is used to spread the power spectrum of the watermark data and (ii) an error correction code is applied and embeds the watermark with spatial and temporal redundancy. The goal of these two achievements is to increase robustness against attacks, protect the watermark against bit errors, and achieve a very good perceptual quality. The effectiveness of the proposed scheme is verified through a series of experiments in which a number of video and standard image-processing attacks are conducted. The proposed scheme achieves a very good perceptual quality with mean peak signal-to-noise-ratio values of the watermarked videos of >40 dB and high resistance to a large spectrum of attacks.
This paper presents a new homomorphic image cryptosystem. The idea of this system is based on encrypting the reflectance component after the homomorphic transform and embedding the illumination component as a least significant bit watermark into the encrypted reflectance component. A comparison study is held between the RC6 block cipher algorithm and the chaotic Baker map algorithm for the encryption of the reflectance component. We present a security analysis for the proposed cryptosystem against the entropy, brute-force, statistical, and differential attacks from a strict cryptographic viewpoint. Experimental results verify and prove that the proposed homomorphic image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that this cryptosystem has a very powerful diffusion mechanism (a small change in the plain text makes a great change in the cipher image). The homomorphic encryption using RC6 algorithm is more secure than that using the chaotic Baker map algorithm but not robust to noise. Thus, the proposed homomorphic cryptosystem can be used in different applications, depending on the core algorithm used.
We investigate the implementation and application of the RC5 block cipher algorithm for digital images and provide testing, verification, and encryption efficiency of the RC5 block cipher for digital images. We describe briefly the basic design parameters of the RC5 block cipher and its implementation for digital images. A complete specification for the method of application of the RC5 block cipher to digital images is given. Several test images are used for inspecting the validity of the encryption and decryption algorithms. Also, we provide and introduce a mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, and apply it to several images. The encryption quality of the RC5 block cipher algorithm is investigated along its several design parameters, such as word size, number of rounds, and secret key length, and the optimal choices for the best values of these design parameters are given.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.