covid
Buscar en
Journal of Applied Research and Technology. JART
Toda la web
Inicio Journal of Applied Research and Technology. JART Hybrid Non-Blind Watermarking Based on DWT and SVD
Journal Information
Vol. 12. Issue 4.
Pages 750-761 (August 2014)
Share
Share
Download PDF
More article options
Visits
3776
Vol. 12. Issue 4.
Pages 750-761 (August 2014)
Open Access
Hybrid Non-Blind Watermarking Based on DWT and SVD
Visits
3776
O. Jane1, E. Elba¿i2, H.G. ¿lk3
1 The Scientific and Technological Research Council of Turkey (TÜB¿TAK), Ankara, Turkey
2 ¿pek University, Department of Animation, Ankara, Turkey
3 Ankara University, Department of Electrical and Electronics Engineering, Ankara, Turkey
This item has received

Under a Creative Commons license
Article information
Abstract
Full Text
Bibliography
Download PDF
Statistics
Figures (8)
Show moreShow less
Tables (4)
Table 1. Variation of PSNR values on different scaling factors and attacks for Goldhill.
Table 2. Variation of PSNR values on different scaling factors and attacks for Peppers.
Table 3. Comparative study on PSNR values before and after attacks for both referenced and proposed method.
Table 4. Comparative study on NSR values for both referenced and proposed method.
Show moreShow less
Abstract

Watermarking is identified as a major technology to achieve copyright protection and multimedia security. Therefore, recent studies in literature include some evident approaches for embedding data into a multimedia element. Because of its useful frequency component separation, the Discrete Wavelet Transform (DWT) is commonly used in watermarking schemes. In a DWT-based scheme, the DWT coefficients are modified with the data that represents the watermark. In this paper, we present a hybrid non-blind scheme based on DWT and Singular Value Decomposition (SVD). After decomposing the cover image into four sub bands (LL, HL, LH and HH), we apply the SVD to LL band and modify diagonal singular value coefficients with the watermark itself by using a scaling factor. Finally, LL band coefficients are reconstructed with modified singular values and inverse DWT is applied to obtain watermarked image. Experimental results show that the proposed algorithm is considerably robust and reliable. In comparison to the previous literature, peak signal-to-noise ratio (PSNR) values of watermarked images are increased by approximately 20%. In terms of PSNR values before and after attacks and of normalized similarity ratio (NSR); although watermark is embedded into LL sub band; our proposed method gives much more satisfactory results on filtering, scaling, Gaussian, JPEG compression, rotation and cropping than that of previous literature.

Keywords:
Digital image watermarking
discrete wavelet transform
singular value decomposition
peak signal-to-noise ratio
normalized similarity ratio
non-blind watermarking
multimedia security
Full Text
1Introduction

Digital watermarking is the process that embeds data called watermark into a multimedia object (such as text, audio, image and video) such that watermark can be detected or extracted later to make an assertion about the object [1]. Digital watermarking has received increasing attention especially in recent years. Apart from copy control and copyright protection; broadcast monitoring, fingerprinting, indexing, medical applications and content authentication are other application areas of digital watermarking. For the purpose of designing and developing a new watermarking algorithm in those application areas, the most important properties are robustness and invisibility [2] which are the focal point of this study.

There are basically two approaches to embed a watermark: spatial domain and transform domain watermarking. In the spatial domain, the watermark is embedded by modifying the pixel values in the original image. Transform domain watermarking is similar to spatial domain watermarking; in this case, the coefficients of transforms such as Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT) or Discrete Wavelet Transform (DWT) are modified [3].

Watermark detection is classified into three categories: Non-blind, Blind and Semi-blind Watermarking. Nonblind watermarking requires the original image to detect the watermark. A blind technique does not require the original image to detect watermark. Semiblind watermarking technique requires the key and the watermarked document for detection.

In this study; visual, invisible and non-blind binary watermark will be embedded into cover image in transform domain. The rest of this paper includes the following sections. Section 2 reviews related studies on spatial and transform domain watermarking in the literature. Section 3 describes quality measures used as an objective metrics in order to evaluate experimental results. Watermark embedding and extracting algorithms are explained in detail in Section 4 and Section 5 respectively. Section 6 illustrates the experimental results and finally Section 7 concludes this work.

2Literature review

There are basically two ways to embed a watermark in: spatial domain and transform domain.

Starting point of spatial domain watermarking is to modify the host image pixel values.

Least Significant Bit embedding [4] is the simplest technique. Since the last binary bits are the least significant bits, their modification will not be recognized by human eyes. Spatial domain embedding techniques are very simple and effective, but they are not robust against all kinds of attacks, especially the cropping attack [5, 6].

The principle of transform domain watermarking techniques is to modify transform coefficients. One major drawback of transform domain techniques is the higher computational requirement. In this study, a new watermarking algorithm in combination of DWT and SVD will be implemented. Therefore, previous studies in the literature are discussed in the following.

a. Discrete Wavelet Transform: Due to its great frequency component separation properties, the DWT, in contrast to DCT, is very useful to identify the coefficients to be watermarked [7]. The DWT separates image into a lower resolution image (LL), and horizontal (HL), vertical (LH) and diagonal (HH) detail components. The DWT is also computationally efficient and implemented by using simple filter convolution. The magnitudes of DWT coefficients are larger in the lowest bands (LL) at each level of decomposition. Embedding the watermark in the higher level sub bands increases the robustness of the watermark. However, the image visual fidelity may be lost, which can be measured by PSNR. With the DWT, the edges and texture can be easily identified in the high frequency bands like HH, LH and HL. The large coefficients in these bands normally indicate edges in the image. Therefore, DWT understands the human visual system more closely in comparison to the DCT.

Dugad et al. [7] proposed wavelet based scheme for watermarking images by embedding the watermark into LL band coefficients in the same way Cox et al. proposed before [8]. Hsieh and Tseng proposed DWT-based algorithm in the following steps: An original image is decomposed into wavelet coefficients. Then, multi-energy watermarking scheme based on the qualified significant wavelet tree is used to achieve a robust algorithm [9]. Elbasi and Eskicioglu embedded a pseudo-random sequence as a watermark in two bands (LL and HH) by using DWT [10].

b. Singular Value Decomposition: Any m by n matrix A can be factored into A=U×S×VT (orthogonal) (diagonal) (orthogonal). The columns of U (m by m) (left singular vectors) are eigenvectors of A×AT and the columns of V (n by n) (right singular vectors) are eigenvectors of AT×A[11]. The U and V matrices are orthogonal matrices so that UT×U=I and VT×V=I, where I is the unit matrix. Columns of U and V matrices are called left and right singular vectors which represent horizontal and vertical details of an image respectively [12]. Their singular values on the diagonal of S (m by n) are the square roots of the nonzero eigenvalues of both A×AT and AT×A. If A is an image in this case; S, the diagonal matrix with rank R, have the luminance (gray scale) values of the image layers produced by U and V.

Gorodetski et al. proposed an approach on embedding a bit of data through slight modifications of singular values of a small block of the segmented covers [13]. Chandra divided the image into sub blocks, applied the SVD to those blocks and modified the largest singular value of them by a watermark and a scaling factor [14]. Liu and Tan used a pseudo Gaussian random number as a watermark and added it to the singular values of the original image [15]. Calagna et al. divided the cover image into blocks and applied the SVD to each block. In order to balance embedding capacity with distortion, the watermark was embedded in all the non-zero singular values according to the local features of the cover image [16]. Bao and Ma proposed an image-adaptive watermarking scheme for image authentication by applying a simple quantization-index-modulation process on wavelet domain SVD [17]. Ghazy et al. designed a new watermarking algorithm in the following order: The original image is divided into blocks and then the watermark is embedded in the singular values of each block separately. Watermark detection is implemented by extracting the watermark from the singular values of the watermarked blocks [18].

In general, most of the image energy is concentrated at the lower frequency coefficient sets LLs and therefore embedding watermarks in these coefficient sets may degrade the image significantly. However, embedding watermark in the LL bands increase robustness effectively [19]. The fact that makes our study novel is that we will increase robustness of the watermarked image under certain attacks without degrading the image by embedding binary watermark on LL band. In comparison to [18], in our study, watermark is embedded into SVD coefficients of LL sub-band. Although LL sub band embedding is not generally robust to geometric attacks, experimental results in Section 6 will show that the algorithm is not only robust to compression attacks but also to geometric attacks. This also explains why LL sub band is chosen for watermark embedding.

3Quality measures

Measurement of image and video quality is a challenging problem in wide range of application [6, 20]. The quality measures can be classified into two groups: Subjective and objective. There are a number of objective measures. We mention some of these measures below:

Mean Square Error (MSE): MSE is an old, proven measure of control and quality. The MSE is defined as follows in Eq. 1:

where I (i, j) is the original image that contains M×N pixels, and IW (i, j) is the watermarked image.

Peak Signal-to Noise Ratio (PSNR): PSNR is most commonly used as a measure of quality of reconstruction in image watermarking. It is a ratio between the maximum value of a signal and the magnitude of background noise. It is most easily defined via MSE for an 8-bit gray scale image as shown in Eq. 2.

Similarity Ratio (SR): SR is defined as in Eq. 3

where S and D represents the number of matching pixel values in compared images and the number of different pixel values in compared images respectively. SR is used in evaluation of non-blind watermark extraction. When different pixel values converge to 0, SR will be close to 1 which is the optimum and desired condition. In this study, binary image inFigure 1.c. is used as a watermark. Even the letters ‘B’ and ‘C’ is assigned as 0 under attack, SR is computed as 0.8002 which can be seen as a successful result at first glance; however, when SR is equal to 0.8002, all of pixels in extracted watermark is 0. Thus, it is convenient to map minimum SR 0.8002 to 0 and to use and calculate “Normalized SR (NSR)” in Eq. 4.

4Watermark embedding algorithm

In our proposed study, watermark embedding procedure is as follows:

Input: Cover Work (I) and Binary Image Watermark (W)

Output: Watermarked Image (IW)

  • Step 1.

    Using DWT, decompose the cover work, I, into four sub bands: LL, LH, HL and HH.

  • Step 2.

    Apply SVD to the sub band LL:

  • Step 3.

    Modify SLL, the singular values of the sub band LL, by adding binary watermark image, W, with the scaling factor ¿:

  • Step 4.

    Since the watermark image is directly added to the singular values of the sub band LL with the scaling factor, it is wise to reconstruct it by applying SVD again to SLLD:

  • Step 5.

    Replace SSSL with SLL in Step 2:

  • Step 6.

    Compute the inverse DWT to obtain the watermarked cover image.

5Watermark extracting algorithm

According to watermark embedding algorithm in the previous section, watermark extracting procedure is as follows:

Input: Attacked Watermarked Image (IW*)

Output: Extracted Watermark (W*)

  • Step 1.

    Using DWT, decompose watermarked and possibly attacked image, IW*, into four sub bands:

  • Step 2.

    Apply SVD to the sub band LLW:

  • Step 3.

    Using left and right singular vectors (USLL and VTSLL) of SLLD in Step 4 in watermark embedding algorithm, construct S*LLD by multiplying them with Sw in Step 2 in the following order:

  • Step 4.

    Extract the watermark W*:

  • Step 5.

    if the value of a pixel in W* is greater than or equal to pre-defined threshold value, TH, assign that pixel value to binary 1, otherwise to binary 0.

6Experimental results

Test images used in this proposed watermarking algorithm are shown in Figure 1.

Figure 1.

Test input images a. Goldhill, b. Peppers, c. Watermark.

(0.08MB).

Goldhill in Figure 1.a and Peppers Figure 1.b and are 8 bit 512×512 gray scale images respectively. Figure 1.c used as the watermark is a binary image in size 256×256.

In order to obtain good visual quality of watermarked images, choosing scaling factor value, ¿, plays an important role in watermark embedding procedures [21]. If the value of a is chosen close to zero, the watermarked image is less distorted and maximum PSNR can be obtained. However, for lower a values, watermarked images are less robust to several attacks. Therefore, to choose optimum value of ¿, it is useful in practice to investigate PSNR values of watermarked images after several attacks and to make a trade-off analysis on them.

Guiding to choose optimum scaling factor in watermark embedding algorithm, Table 1 shows the change of PSNR values for ¿ in certain intervals for the cover work in Figure 1.a.

Table 1.

Variation of PSNR values on different scaling factors and attacks for Goldhill.

Goldhill Attacks/Scaling Factors  5  10  15  20  25  30  35  40  45  50 
Filter  29.794  29.824  29.847  29.864  29.866  29.856  29.758  29.726  29.669  29.609 
Scaling  29.643  29.686  29.727  29.762  29.785  29.799  29.728  29.722  29.690  29.654 
Gaussian  30.000  29.993  29.941  29.960  29.889  29.846  29.719  29.618  29.533  29.414 
Histogram Eq.  17.545  17.555  17.570  17.553  17.547  17.551  17.532  17.538  17.516  17.543 
Gamma Correct.  17.696  17.698  17.703  17.707  17.714  17.719  17.720  17.726  17.734  17.747 
JPEG (Q=25)  8.356  8.353  8.349  8.343  8.329  8.316  8.300  8.279  8.260  8.253 
Rotation (20°)  11.430  11.427  11.421  11.414  11.405  11.394  11.381  11.365  11.347  11.334 
Intensity Adj.  19.114  19.106  19.092  19.077  19.054  19.030  18.993  18.958  18.919  18.876 
Cropping  13.047  13.046  13.046  13.046  13.045  13.044  13.042  13.041  13.039  13.037 
Salt & Pepper  12.364  12.364  12.377  12.332  12.389  12.359  12.387  12.347  12.334  12.341 

After investigating Table 1 in detail, maximum PSNR values for several attacks can be obtained by choosing the scaling factor, ¿, as 23 for the cover work in Figure 1.a., Goldhill.

In the same manner, Table 2 shows the change of PSNR values for scaling factors in certain intervals for the cover work in Figure 1.b.

Table 2.

Variation of PSNR values on different scaling factors and attacks for Peppers.

Peppers Attacks/Scaling Factors  5  10  15  20  25  30  35  40  45  50 
Filter  31.601  31.645  31.682  31.711  31.725  31.723  31.716  31.625  31.575  31.542 
Scaling  30.337  30.388  30.436  30.486  30.525  30.552  30.575  30.531  30.521  30.528 
Gaussian  30.100  30.080  30.050  30.059  30.004  30.007  29.948  29.857  29.800  29.741 
Histogram Eq.  18.609  18.605  18.596  18.608  18.594  18.579  18.570  18.560  18.596  18.564 
Gamma Correct.  18.335  18.339  18.343  18.349  18.355  18.363  18.373  18.383  18.394  18.406 
JPEG (Q=25)  8.079  8.081  8.082  8.083  8.086  8.093  8.099  8.111  8.117  8.124 
Rotation (20°)  10.047  10.045  10.041  10.035  10.029  10.022  10.012  10.001  9.987  9.973 
Intensity Adj.  18.782  18.775  18.765  18.755  18.739  18.720  18.696  18.665  18.634  18.607 
Cropping  12.879  12.879  12.878  12.878  12.878  12.877  12.876  12.875  12.873  12.872 
Salt & Pepper  12.109  12.066  12.089  12.060  12.060  12.080  12.095  12.072  12.054  12.081 

After investigating Table 2 in detail, maximum PSNR values for several attacks can be obtained by choosing the scaling factor, ¿, as 20 for the cover work in Figure 1.b., Peppers.

Figure 2 shows watermarked images after using related scaling factors and applying watermark embedding algorithm in Section 4.

Figure 2.

a. Watermarked Image, Goldhill (¿=23, PSNR=47.9272 dB), b. Watermarked Image, Peppers (¿=20, PSNR=50.1702 dB).

(0.06MB).

Thinking that PSNR values between 30 and 40 dB is considered as satisfactory, results in Figure 2 show that watermark embedding algorithm is successful enough to use it in several applications. Nevertheless, watermark embedding and extracting algorithms are complements of each other. Thus, it is worthwhile to investigate extracted watermarks after pre-defined attacks in both Table 1 and Table 2.

Figure 3 shows watermarked Goldhill images after attacks and their PSNR values.

Figure 3.

a. Filter (29.8630 dB), b. Scaling 512×512256×256 (29.7727 dB), c. Gaussian (29.9154 dB), d. Histogram (17.5452 dB), e. Gamma Correction (17.7106 dB), f. JPEG Compression (Q=25) (8. 3348 dB) g. Rotation (20 degree) (11.4089 dB), h. Intensity Adjustment (19.0637 dB), i. Cropping (13.0455 dB), j. Salt & Pepper (12.3335 dB).

In a similar way, Figure 4 shows watermarked Peppers images after attacks and their PSNR values.

Figure 4.

a. Filter (31.7115 dB), b. Scaling 512×512256×256 (30.4856 dB), c. Gaussian (30.0589 dB), d. Histogram (18. 6076 dB), e. Gamma Correction (18.3488 dB), f. JPEG Compression (Q=25) (8.0828 dB) g. Rotation (20 degree) (10.0352 dB), h. Intensity Adjustment (18.7548 dB), i. Cropping (12.8781 dB), j. Salt & Pepper (12.0598 dB).

(0.26MB).

Even though PSNR values after attacks are too low to extract the watermark on them, our proposed algorithm provides high NSR enough close to 1.0. However, before calculating and comparing NSR values for each attacked images, we had better find optimum threshold values as we did in choosing optimum scaling factor. Figure 5 shows the change of NSR for threshold values in certain intervals between 0 and 1 for the cover work in Figure 1.a., Goldhill.

Figure 5.

Variation of NSR values of Goldhill cover work for several attacks on different threshold between 0 and 1.

(0.12MB).

In the same way, Figure 6 shows the change of NSR for threshold values in certain intervals between 0 and 1 for the cover work in Figure 1.b., Peppers.

Figure 6.

Variation of NSR values of Peppers cover work for several attacks on different threshold between 0 and 1.

(0.12MB).

After analyzing Figure 5 and 6, NSR values for several attacks can be obtained maximum by choosing threshold value, TH, as 0.5 for both cover works in Figure 1.a and Figure 1.b. Figure 7 shows extracted watermark images from attacked Goldhill and calculated NSR values for TH=0.5 after applying watermark extracting algorithm in Section 5.

Figure 7.

Extracted watermarks from attacked Goldhill image and their NSR values. a. Filter (0.9946), b. Scaling 512×512256×256 (0.9925), c. Gaussian (0.9883), d. Histogram (0.9880), e. Gamma Correction (0.9995), f. JPEG Compression (Q=25) (0.9929) g. Rotation (20 degree) (0.9883), h. Intensity Adjustment (0.9903), i. Cropping (0.9947), j. Salt & Pepper (0.9076).

(0.09MB).

Figure 8 shows extracted watermark images from attacked Peppers and calculated NSR values for TH=0.5 after applying watermark extracting algorithm in Section 5.

Figure 8.

Extracted watermarks from attacked Peppers image and their NSR values. a. Filter (0.9946), b. Scaling 512×512256×256 (0.9936), c. Gaussian (0.9891), d. Histogram (0.9878), e. Gamma Correction (0.9969), f. JPEG Compression (Q=25) (0.9880) g. Rotation (20 degree) (0.9957), h. Intensity Adjustment (0.9891), i. Cropping (0.9947), j. Salt & Pepper (0.9047).

(0.1MB).
7Conclusion

This paper presented a non-blind watermarking scheme based on hybrid DWT and SVD. After decomposing the cover image into four sub bands (LL, HL, LH and HH), we apply SVD to LL band and modify diagonal singular value coefficients with the watermark itself by using a scaling factor. Then, LL band coefficients are reconstructed with modified singular values and finally inverse DWT is applied to obtain watermarked image.

The novelty of this study from the reference method proposed by Ghazy et al. in [18] is to decompose the cover work, I, into four sub bands; LL, LH, HL and HH by using DWT and to modify singular values of sub band LL with a pre-defined scaling factor.

The other novel side of this study is to make an optimization analysis and decide on scaling factor used in embedding and on threshold value used in extracting.

PSNR values before and after attacks for both referenced method in [18] and proposed method are compared in Table 3.

Table 3.

Comparative study on PSNR values before and after attacks for both referenced and proposed method.

AttacksPSNR (dB)
Goldhill (¿=23)Peppers (¿=20)
Referenced Method [18] PSNR: 39.9644  Propo sed Method PSNR: 47.9272  Referenced Method [18] PSNR: 41.9841  Proposed Method PSNR: 50.1702 
Filter  24.0069  29.863  27.141  31.7115 
Scaling  24.3656  29.7727  26.1235  30.4856 
Gaussian  29.6162  29.9154  29.8035  30.0589 
Histogram Eq.  17.5812  17.5452  20.5316  18.6076 
Gamma Correct.  17.8411  17.7106  18.0348  18.3488 
JPEG (Q=25)  8.1869  8.3348  7.4375  8.0828 
Rotation (20°)  11.2472  11.4089  10.0447  10.0352 
Intensity Adj.  19.012  19.0637  17.6205  18.7548 
Cropping  9.9401  13.0455  8.4982  12.8781 
Salt & Pepper  12.2597  12.3335  12.2813  12.0598 

In the same way, NSR values for both referenced method in [18] and proposed method are comparatively shown in Table 4.

Table 4.

Comparative study on NSR values for both referenced and proposed method.

AttacksNSR
Goldhill (¿=23)Peppers (¿=20)
Referenced Method (Ghazy et al., 2007)  Proposed Method  Referenced Method (Ghazy et al., 2007)  Proposed Method 
Filter  0.9702  0.9946  0.9837  0.9946 
Scaling  0.9359  0.9925  0.9601  0.9936 
Gaussian  0.9886  0.9883  0.9873  0.9891 
Histogram Eq.  0.9877  0.988  0.9878  0.9878 
Gamma Correct.  0.9995  0.9995  0.9995  0.9969 
JPEG (Q=25)  0.9921  0.9929  0.9943  0.988 
Rotation (20°)  0.9512  0.9883  0.9943  0.9957 
Intensity Adj.  0.9907  0.9903  0.9909  0.9891 
Cropping  0.9845  0.9947  0.9675  0.9947 
Salt & Pepper  0.9288  0.9076  0.8869  0.9047 

In our study, frequently-preferred transform domain technique DWT and decomposition method SVD is combined so that watermarked images are much more robust against attacks. Thus, on the contrary to traditional DWT watermarking techniques, this proposed algorithm can be considered as robust against not only compression-based attacks such as filtering, Gaussian and JPEG compression; but also geometric and pixel-based attacks such as scaling, histogram equalization, gamma correction, rotation, intensity adjustment, and salt and pepper. This is because the change of diagonal coefficients in singular value matrix of LL sub band has small effect on perceptual of the watermark.

As shown visually in Figure 7, Figure 8 and compared SNR values objectively in Table 4, NSR values are close to 1 despite strong attacks causing lower PSNR values in Table 3.

In comparison to [18], PSNR values of watermarked images are increased approximately by 20%. Furthermore; in the light of PSNR values before and after attacks and NSR values, our proposed method gives much more satisfactory results on filtering, scaling, Gaussian, JPEG compression, rotation and cropping than that of previous studies.

References
[1]
P. Morasso.
Spatial control arm movements.
Exp. Brain Res., 42 (1981), pp. 223-227
[2]
T. Flash, N. Hogan.
The coordination of arm movements: an experimentally confirmed mathematical model.
J. Neurosci., 5 (1985), pp. 1688-1703
[3]
Y. Uno, M. Kawato, R. Suzuki.
Formation and control of optimal trajectory in human multijoint arm movements.
Biol. Cybern., 61 (1989), pp. 89-101
[4]
E.R.F.W. Crossman, P.J. Goodeve.
Feedback control of handmovements and Fitts law.
Q. J. Exp. Psychol., A35 (1983), pp. 251-278
[5]
C.C. Gielen, E.J. Vrijenhock, S.F. Neggers.
Arm position constraints during pointing and reaching in 3-D space.
J. Neurophysiol., 78 (1997), pp. 660-673
[6]
D. Goldvasser, C.A. McGibbon, D.E. Krebs.
High curvature and jerk analyses of arm ataxia.
Biol. Cybern., 84 (2001), pp. 85-90
[7]
K.E. Novàk, L.E. Miller, J.C. Houk.
Kinematic properties of rapid hand movements in a knob turning task.
Exp. Brain Res., 132 (2000), pp. 419-433
[8]
P. Viviani, R.A. Schneider.
development study of the relationship between geometry and kinematics in drawing movements.
J. Exp. Psychol. Hum. Percept. Perform, 17 (1991), pp. 198-218
[9]
P. Viviani, T. Flash.
Minimum-jerk, two-thirds power law, and isochrony: converging approaches tomovement planning.
J. Exp. Psychol. Hum. Percept. Perform, 21 (1995), pp. 32-53
[10]
M.M. Panjabi, A.A. White.
Basic biomechanics of the spine.
Neurosurgery, 7 (1980), pp. 76-93
[11]
J. Dimnet, A. Pasquet, M.H. Krag, M.M. Panjabi.
Cervical spine motion in the sagittal plane: Kinematic and geometric parameters.
Journal of Biomechanics, 15 (1982), pp. 959-969
[12]
S. Gracovetsky, H. Farfan.
The optimum spine.
Spine, 11 (1986), pp. 543
[13]
J. Cholewicki, S.M. McGill.
Lumbar spine kinematics obtained from videofluoroscopy.
Journal of Biomechanics, 25 (1992), pp. 801
[14]
N. Yoganandan, F. Pintar, D.J. Maiman, J. Reinartz, A. Sances, S.J. Larson, J.F. Cusick.
Kinematics of the lumbar spine following pedicle screw plate fixation.
[15]
S.M. Levin.
The importance of soft tissue for structural support of the body.
Prolotherapy in the lumbar spine and pelvis, pp. 357
[16]
J.M. Willems, G.A. Jull, J.K.-F. Ng.
An in vivo study of the primary and coupled rotations of the thoracic spine.
Clinical Biomechanics, 11 (1996), pp. 311-316
[17]
M.J. Faber, H.C. Schamhardt, P.R. van Weeren.
Determination of 3D spinal kinematics without defining a local vertebral coordinate system.
Journal of Biomechanics, 32 (1999), pp. 1355-1358
[18]
H. Yoshikawa, T. Ishii, Y. Mukai, N. Hosono, H. Sakaura, Y. Nakajima, Y. Sato, K. Sugamoto.
Kinematics of the upper cervical spine in rotation: In vivo three-dimensional analysis.
Spine, 29 (2004), pp. E139-E144
[19]
M. Ziddiqui, E. Karadimas, M. Nicol, F.W. Smith, D. Wardlaw.
Effects of X-stop device on sagittal lumbar spine kinematics in spinal stenosis.
Journal of Spinal Disorden Technology, 19 (2006), pp. 328-333
[20]
T. Ishii, Y. Mukai, N. Hosono, H. Sakaura, R. Fujii, Y. Nakajima, S. Tamura, M. Iwasaki, H. Yoshikawa, K. Sugamoto.
Kinematics of the cervical spine in lateral bending: In vivo three-dimensional analysis.
Spine, 31 (2006), pp. 155-160
[21]
R.J. Konz, S. Fatone, R.L. Stine, A. Ganju, S.A. Gard, S.L. Ondra.
A kinematic model to assess spinal motion during walking.
[22]
V.C. Chanceya, D. Ottaviano, B.S. Myers, R.W. Nightingale.
A kinematic and anthropometric study of the upper cervical spine and the occipital condyles.
Journal of Biomechanics, 40 (2007), pp. 1953-1959
[23]
K.P. Gill, S.J. Bennett, G.J.P. Savelsbergh, J.H. van Dieën.
[24]
M. Jones, C. Holt, D. Franyuti.
Developing a methodology for the analysis of infant spine kinematics for the investigation of the shaken baby syndrome.
Journal of Biomechanics, 41 (2008), pp. S3-55
[25]
S.J. Zhu, Z. Huang, M.Y. Zhao.
Feasible Human-Spine Motion Simulators Based on Parallel Manipulators Source: Parallel Manipulators, Towards New Applications.
pp. 506
[26]
C Innocenti, V. Parenti-Castelli.
Direct position analysis of the Stewart platform mechanism.
Mechanism and Machine Theory, 35 (1990), pp. 611-621
[27]
Tsai, L.-W. Robot analysis, John Wiley & Sons, (1999).
[28]
J. Gallardo-Alvarado, R. Rodríguez-Castro.
Nazrul Islam, Md. Analytical solution of the forward position analysis of parallel manipulators that generate 3-RS structures.
Advanced Robotics, 22 (2008), pp. 215-234
[29]
J. Gallardo-Alvarado, C.R. Aguilar-Nájera, L. Casique-Rosas, L. Pérez-González, J.M. Rico-Martínez.
Solving the kinematics and dynamics of a modular spatial hyper-redundant manipulator by means of screw theory.
Multibody System Dynamics, 20 (2008), pp. 307-325
Copyright © 2014. Universidad Nacional Autónoma de México
Article options