Crypto-watermarking scheme for tamper detection of medical images
暂无分享,去创建一个
[1] Rohit M. Thanki,et al. A Hybrid Watermarking Technique for Copyright Protection of Medical Signals in Teleradiology , 2018 .
[2] Alessandro Neri,et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..
[3] Ting Luo,et al. Stereo Matching Based Stereo Image Watermarking for Tamper Detection and Recovery , 2014, Int. J. Comput. Intell. Syst..
[4] Osamah M. Al-Qershi,et al. Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images , 2011, Journal of Digital Imaging.
[5] Shilpa P. Metkar,et al. Digital image security improvement by integrating watermarking and encryption technique , 2013, 2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC).
[6] G. Sharma,et al. On the security and robustness of encryption via compressed sensing , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[7] Javaid A. Sheikh,et al. Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication , 2020, Future Gener. Comput. Syst..
[8] Christian Roux,et al. A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.
[9] Amit Kumar Singh,et al. Multiple Watermarking on Medical Images Using Selective Discrete Wavelet Transform Coefficients , 2015 .
[10] Pekka Ruotsalainen,et al. Privacy and security in teleradiology. , 2010, European journal of radiology.
[11] M. Karthikeyan,et al. Protection of bio medical iris image using watermarking and cryptography with WPT , 2019, Measurement.
[12] Rohit M. Thanki,et al. A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory , 2017 .
[13] Mei Yu,et al. Sparse recovery based reversible data hiding method using the human visual system , 2017, Multimedia Tools and Applications.
[14] Nouna Kettaneh,et al. Statistical Modeling by Wavelets , 1999, Technometrics.
[15] Jianping Li,et al. Context-based watermarking cum chaotic encryption for medical images in telemedicine applications , 2018, Multimedia Tools and Applications.
[16] Nilanjan Dey,et al. Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing , 2019, Smart Health.
[17] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[18] Lamri Laouamer,et al. Efficient and robust encryption and watermarking technique based on a new chaotic map approach , 2017, Multimedia Tools and Applications.
[19] Y. Rachlin,et al. The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[20] Joel A. Tropp,et al. Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.
[21] Nilanjan Dey,et al. Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method , 2012, SIN '12.
[22] Ruey-Feng Chang,et al. Tamper Detection and Restoring System for Medical Images Using Wavelet-based Reversible Data Embedding , 2008, Journal of Digital Imaging.
[23] Amit Kumar Singh,et al. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications , 2018, Multimedia Tools and Applications.
[24] Gouenou Coatrieux,et al. A crypto-watermarking system for ensuring reliability control and traceability of medical images , 2016, Signal Process. Image Commun..
[25] Fatma Taher,et al. Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions , 2017, 2017 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS).
[26] Khan Muhammad,et al. Realization of an Adaptive Data Hiding System for Electronic Patient Record, Embedding in Medical Images , 2018, Security in Smart Cities: Models, Applications, and Challenges.
[27] Nisreen I. Yassin. Digital Watermarking for Telemedicine Applications: A Review , 2015 .
[28] Ashutosh Kumar Singh,et al. Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image , 2019, Multimedia Tools and Applications.
[29] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[30] Nilanjan Dey,et al. Digital Image Watermarking: Theoretical and Computational Advances , 2018 .
[31] S. Frick,et al. Compressed Sensing , 2014, Computer Vision, A Reference Guide.
[32] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[33] Mei Yu,et al. Asymmetric self-recovery oriented stereo image watermarking method for three dimensional video system , 2015, Multimedia Systems.
[34] Xinpeng Zhang,et al. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..
[35] E. R. Davies,et al. A skimming technique for fast accurate edge detection , 1992, Signal Process..
[36] Sriram Vishwanath,et al. Secrecy using compressive sensing , 2011, 2011 IEEE Information Theory Workshop.
[37] S. A. Hossein,et al. Security analysis of the joint encryption and compressed sensing , 2012, 2012 20th Telecommunications Forum (TELFOR).
[38] Jasni Mohamad Zain,et al. Tamper Localization and Lossless Recovery Watermarking Scheme with ROI Segmentation and Multilevel Authentication , 2012, Journal of Digital Imaging.
[39] Xiao Zhou,et al. Fragile Watermarking for Image Authentication Using the Characteristic of SVD , 2017, Algorithms.
[40] Anirban Sengupta,et al. Everything You Want to Know About Watermarking: From Paper Marks to Hardware Protection: From paper marks to hardware protection. , 2017, IEEE Consumer Electronics Magazine.
[41] Amit Mehto,et al. Adaptive Lossless Medical Image Watermarking Algorithm Based on DCT & DWT , 2016 .
[42] Rohit M. Thanki,et al. A RONI Based Visible Watermarking Approach for Medical Image Authentication , 2017, Journal of Medical Systems.
[43] Tian-ge Zhuang,et al. A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data , 2009, Journal of Digital Imaging.
[44] Jiantao Zhou,et al. A Review of Compressive Sensing in Information Security Field , 2016, IEEE Access.
[45] Saraju P. Mohanty,et al. Everything You Wanted to Know about Smart Health Care: Evaluating the Different Technologies and Components of the Internet of Things for Better Health , 2018, IEEE Consumer Electronics Magazine.
[46] Ali Al-Haj,et al. Crypto-Watermarking of Transmitted Medical Images , 2017, Journal of Digital Imaging.
[47] Gheith A. Abandah,et al. Combining cryptography and digital watermarking for secured transmission of medical images , 2016, 2016 2nd International Conference on Information Management (ICIM).