Secure and Robust Fragile Watermarking Scheme for Medical Images
暂无分享,去创建一个
Mohamed Elhoseny | Arun Kumar Sangaiah | Khan Muhammad | Abdulaziz Shehab | Haojun Huang | Po Yang | Guolin Hou | A. K. Sangaiah | Po Yang | M. Elhoseny | Khan Muhammad | A. Shehab | Haojun Huang | G. Hou
[1] Chih-Chin Lai,et al. A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm , 2011, Digit. Signal Process..
[2] Lingling Wu,et al. Arnold Transformation Algorithm and Anti-Arnold Transformation Algorithm , 2009, 2009 First International Conference on Information Science and Engineering.
[3] Sung Wook Baik,et al. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..
[4] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[5] Millie Pant,et al. Robust and false positive free watermarking in IWT domain using SVD and ABC , 2016, Eng. Appl. Artif. Intell..
[6] Nasir D. Memon,et al. On the Security of the Yeung Mintzer Authentication Watermark , 1999, PICS.
[7] Chun-Chi Lo,et al. Probability-based Tamper Detection Scheme for BTC-compressed Images Based on Quantization Levels Modification , 2013 .
[8] C. Loan. Generalizing the Singular Value Decomposition , 1976 .
[9] Wen Gao,et al. An image fragile watermark scheme based on chaotic image pattern and pixel-pairs , 2007, Appl. Math. Comput..
[10] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.
[11] Khan Muhammad,et al. Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy , 2018, IEEE Access.
[12] RhoSeungmin,et al. A review on automated diagnosis of malaria parasite in microscopic blood smears images , 2018 .
[13] Chokri Ben Amar,et al. Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain , 2014, IET Image Process..
[14] Ninghui Li,et al. Oblivious signature-based envelope , 2003, PODC '03.
[15] Shan Suthaharan,et al. Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..
[16] Radu Ovidiu Preda,et al. Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain , 2014, 2014 10th International Conference on Communications (COMM).
[17] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[18] Kaoru Kurosawa,et al. On Parallel Hash Functions Based on Block-Ciphers , 2003, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[19] Tieniu Tan,et al. An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..
[20] Seungmin Rho,et al. A review on automated diagnosis of malaria parasite in microscopic blood smears images , 2018, Multimedia Tools and Applications.
[21] Zhihan Lv,et al. Secure video summarization framework for personalized wireless capsule endoscopy , 2017, Pervasive Mob. Comput..
[22] Nitin N. Patil,et al. Self Embedding Fragile Watermarking for Image Tampering Detection and Image Recovery Using Self Recovery Blocks , 2015, 2015 International Conference on Computing Communication Control and Automation.
[23] Xinpeng Zhang,et al. Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.
[24] Sung Wook Baik,et al. Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices , 2017, Multimedia Tools and Applications.
[25] Rui Sun,et al. A SVD- and quantization based semi-fragile watermarking technique for image authentication , 2002, 6th International Conference on Signal Processing, 2002..
[26] Sung Wook Baik,et al. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy , 2016, Journal of Medical Systems.
[27] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[28] Sung Wook Baik,et al. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.
[29] Balasubramanian Raman,et al. A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .
[30] Banani Patra,et al. CRT-based fragile self-recovery watermarking scheme for image authentication and recovery , 2012, 2012 International Symposium on Intelligent Signal Processing and Communications Systems.