2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA) 2017
DOI: 10.1109/icecta.2017.8251971
|View full text |Cite
|
Sign up to set email alerts
|

A reversible watermarking scheme for ownership protection and authentication of medical Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…1. Watermarking makes it possible for two parties to secretly communicate over an open channel, which is problematic for authorized users [1]. Alice and Bob, two authorized users, intend to collaborate to create an invisible watermark scheme.…”
Section: Preliminarymentioning
confidence: 99%
See 2 more Smart Citations
“…1. Watermarking makes it possible for two parties to secretly communicate over an open channel, which is problematic for authorized users [1]. Alice and Bob, two authorized users, intend to collaborate to create an invisible watermark scheme.…”
Section: Preliminarymentioning
confidence: 99%
“…The DCT process is first carried out on each block individually after splitting 8 × 8 blocks of the original image, 𝑰, via the JPEG compression process, as shown in Eq. (1). The size of the original image is presumed to be multiples of eight.…”
Section: Jpeg Compression Processmentioning
confidence: 99%
See 1 more Smart Citation
“…Digital watermarking methods are mainly used in healthcare [25], remote sensing [22] and industrial [18,24] application areas for the purpose of ownership identification [30], copyright protection [49], fingerprinting [32,33,36], monitoring [10,19,20] and forgery detection [12]. With respect to the watermark embedding domain digital watermarking methods like steganography [26,27,29,35] can be generally classified as spatial domain methods and transform domain methods such as discrete Fourier transform [34], discrete cosine transform [1,3,23], discrete wavelet transform [2,17,21,41,42].…”
Section: Related Workmentioning
confidence: 99%