2019
DOI: 10.32604/cmc.2019.06034
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT-DCT and Chaotic Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(28 citation statements)
references
References 0 publications
0
28
0
Order By: Relevance
“…The dual-tree complex wavelet transform (DTCWT) is proposed to overcome the defects of the usual discrete wavelet transform [29]. When the corresponding wavelet basis (approximate) satisfies the Hilbert transformation relation, it can greatly reduce the translation sensitivity in the normal real wavelet transform and improve the direction selectivity [33], [34].…”
Section: B 3-d Dual-tree Complex Wavelet Transformmentioning
confidence: 99%
See 1 more Smart Citation
“…The dual-tree complex wavelet transform (DTCWT) is proposed to overcome the defects of the usual discrete wavelet transform [29]. When the corresponding wavelet basis (approximate) satisfies the Hilbert transformation relation, it can greatly reduce the translation sensitivity in the normal real wavelet transform and improve the direction selectivity [33], [34].…”
Section: B 3-d Dual-tree Complex Wavelet Transformmentioning
confidence: 99%
“…3) Classical watermarking. These methods embed the watermark information in the least significant bit (LSB) of the spatial domain [15], or into the medium-frequency or low-frequency coefficients of the frequency domain, DCT, DFT, or DWT [22], [25], [26], [33]. Thabit and Khoo [16] performed Slantlet transformation (SLT) on the non-overlapping blocks of the main image, and then modified the difference value of the average SLT coefficient in the high-frequency subband to embed data bits.…”
Section: Introductionmentioning
confidence: 99%
“…How to construct a good PRNG and generate high-performance and high-quality PRNs has always been a hot topic for scholars. Chaos is widely used in complex networks [13][14][15][16], electronic circuits [17][18][19][20], image encryption [21][22][23][24][25], synchronous control [26][27][28], encryption system [29][30][31][32], and other fields because of its good random characteristics, extreme sensitivity to initial values and parameters, longterm unpredictability, and ergodicity of orbits. e PRNs based on the chaos system have the advantages of fast generation speed, high security performance, and good statistical characteristics.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, chaotic systems have attracted wide attention from researchers due to their own particularities and their vast application potential in the memristor [1][2][3][4], random number generator [5,6], secure communication [7][8][9], image encryption [10][11][12][13][14], and artificial neural network [15][16][17][18][19][20]. How to increase the complexity of a chaotic system and generate complex chaotic attractors to make it hard to encipher information in encryption system applications has become a field of interest for researchers both in and outside China.…”
Section: Introductionmentioning
confidence: 99%