2012
DOI: 10.1109/titb.2012.2207730
|View full text |Cite
|
Sign up to set email alerts
|

A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images

Abstract: In this paper, we propose a joint encryption/water-marking system for the purpose of protecting medical images. This system is based on an approach which combines a substitutive watermarking algorithm, the quantization index modulation, with an encryption algorithm: a stream cipher algorithm (e.g., the RC4) or a block cipher algorithm (e.g., the AES in cipher block chaining (CBC) mode of operation). Our objective is to give access to the outcomes of the image integrity and of its origin even though the image i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0
4

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 119 publications
(69 citation statements)
references
References 15 publications
0
65
0
4
Order By: Relevance
“…Table 3 shows the comparaison of the proposed method and others method in term of availability, reliability, and confidentiality. therefore, the proposed is more secured than [6] and [16]- [20]. …”
Section: Comparison With Others Papersmentioning
confidence: 91%
See 3 more Smart Citations
“…Table 3 shows the comparaison of the proposed method and others method in term of availability, reliability, and confidentiality. therefore, the proposed is more secured than [6] and [16]- [20]. …”
Section: Comparison With Others Papersmentioning
confidence: 91%
“…where and −1 are, respectively, the semi restituted block and the function of extraction which is given in equation (6). In the first iteration the return string is initialized by the first DCT block coefficient of image to be watermarked.…”
Section: Proposed Semi Reversible Robust Hiding Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Information with authenticity code is embedded in both spatial domain and encrypted domain in the original input image 9 . This authenticity code is used to identify the image origin and an integrity proof.…”
Section: Materials and Methods Hybrid Baker Map With Aes In Cbc Modementioning
confidence: 99%