Security in medical image communication with arnold's cat map method and reversible watermarking
暂无分享,去创建一个
[1] Iwan Setyawan,et al. Watermarking digital image and video data. A state-of-the-art overview , 2000 .
[2] Shima Ramesh Maniyath,et al. An Uncompressed Image Encryption Algorithm Based on DNA Sequences , 2011 .
[3] M. Keyvanpour,et al. A new encryption method for secure embedding in image watermarking , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[4] G. C. Langelaar,et al. Watermarking digital image and video data , 2000 .
[5] M. Ferni Ukrit,et al. A Survey on Security in Medical Image Communication , 2011 .
[6] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[7] William Stallings,et al. Cryptography and network security , 1998 .
[8] Michael W. Marcellin,et al. An overview of JPEG-2000 , 2000, Proceedings DCC 2000. Data Compression Conference.
[9] H.M. Wechsler,et al. Digital image processing, 2nd ed. , 1981, Proceedings of the IEEE.
[10] Chin-Chen Chang,et al. Remarks on fingerprint-based remote user authentication scheme using smart cards , 2004, OPSR.
[11] Changjiang Zhang,et al. Digital Image Watermarking Algorithm with Double Encryption by Arnold Transform and Logistic , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.
[12] C. Roux,et al. A Low Distorsion and Reversible Watermark: Application to Angiographic Images of the Retina , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[13] Paul Wintz,et al. Digital image processing (2nd ed.) , 1987 .
[14] Chin-Chen Chang,et al. A reversible data hiding scheme with modified side match vector quantization , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[15] Christian Roux,et al. Reversible Watermarking for Knowledge Digest Embedding and Reliability Control in Medical Images , 2009, IEEE Transactions on Information Technology in Biomedicine.
[16] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[17] Christian Roux,et al. Watermarking Medical Images with Anonymous Patient Identification to Verify Authenticity , 2008, MIE.
[18] Nora Cuppens-Boulahia,et al. Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking , 2009, DPM/SETOP.
[19] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..