A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security Issues of Teleradiology
暂无分享,去创建一个
[1] Colin Boyd,et al. A Review of Medical Image Watermarking Requirements for Teleradiology , 2013, Journal of Digital Imaging.
[2] Sharath Pankanti,et al. Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..
[3] Gonzalo Pajares Martinsanz,et al. A wavelet-based image fusion tutorial , 2004 .
[4] P. Viswanathan,et al. FUSION OF CRYPTOGRAPHIC WATERMARKING MEDICAL IMAGE SYSTEM WITH REVERSIBLE PROPERTY , 2011 .
[5] David Bull,et al. Image fusion metric based on mutual information and Tsallis entropy , 2006 .
[6] Alireza Khotanzad,et al. Invariant Image Recognition by Zernike Moments , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[7] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[8] Tony M Damico. A Brief History of Cryptography , 2009 .
[9] P. Venkata Krishna,et al. Multimodal Biometric Invariant Moment Fusion Authentication System , 2010, BAIP.
[10] Roland T. Chin,et al. On Image Analysis by the Methods of Moments , 1988, IEEE Trans. Pattern Anal. Mach. Intell..
[11] Christian Roux,et al. A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.
[12] Pauli Kuosmanen,et al. Wavelet domain features for fingerprint recognition , 2001 .
[13] Ahmad-Reza Sadeghi,et al. Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages , 2006, ACISP.
[14] Edward H. Adelson,et al. The Laplacian Pyramid as a Compact Image Code , 1983, IEEE Trans. Commun..
[15] David P. Jablon. Strong password-only authenticated key exchange , 1996, CCRV.
[16] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[17] P. Venkata Krishna,et al. Fusion of Cryptographic Watermarking Medical Image System with Reversible Property , 2011 .
[18] Charalampos Manifavas,et al. Chameleon - A New Kind of Stream Cipher , 1997, FSE.
[19] Weidong Zhao,et al. Security Theory and Attack Analysis for Text Watermarking , 2009, 2009 International Conference on E-Business and Information System Security.
[20] Saleh A Al-Damegh. Emerging issues in medical imaging. , 2005, Indian journal of medical ethics.
[21] Hua Zhang,et al. A new watermarking approach based on probabilistic neural network in wavelet domain , 2008, Soft Comput..
[22] Thumrongrat Amornraksa,et al. Fingerprint recognition using DCT features , 2006 .
[23] P. Venkata Krishna,et al. Text Fusion Watermarking in Medical Image with Semi-reversible for Secure Transfer and Authentication , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[24] G. Qu,et al. Information measure for performance of image fusion , 2002 .
[25] P. Viswanathan,et al. Medical Image Spatial Fusion Watermarking System , 2013 .
[26] F. Prior,et al. Potential impact of HITECH security regulations on medical imaging , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[27] P. Viswanathan,et al. Fingerprint enhancement and compression method using Morlet wavelet , 2010 .
[28] Zhou Wang,et al. Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .
[29] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[30] Pekka Ruotsalainen,et al. Privacy and security in teleradiology. , 2010, European journal of radiology.
[31] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[32] Sen Wang,et al. Fingerprint enhancement in the singular point area , 2004, IEEE Signal Processing Letters.
[33] Shiguo Lian,et al. Joint Fingerprint Embedding and Decryption for Video Distribution , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[34] Zhuowen Tu,et al. Image Parsing: Unifying Segmentation, Detection, and Recognition , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[35] Ilya Mironov,et al. (Not So) Random Shuffles of RC4 , 2002, IACR Cryptol. ePrint Arch..
[36] Ira S. Moskowitz,et al. Correlation-based watermarking method for image authentication applications , 2004 .