2019
DOI: 10.1007/978-3-030-11196-0_40
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Digital Watermarking Applications for Medical Image Exchange Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 6 publications
0
12
0
Order By: Relevance
“…Telehealth involves telesurgery, telediagnosis, teleconferences, and other medical applications. Telemedicine connects specialists and patients separated by a physical distance [55]. Therefore, to ensure the confidentiality, authenticity, integrity, and availability associated with In reference [53], a three-level image watermarking embedding technique has been proposed for integrity verification.…”
Section: Medical Applicationsmentioning
confidence: 99%
“…Telehealth involves telesurgery, telediagnosis, teleconferences, and other medical applications. Telemedicine connects specialists and patients separated by a physical distance [55]. Therefore, to ensure the confidentiality, authenticity, integrity, and availability associated with In reference [53], a three-level image watermarking embedding technique has been proposed for integrity verification.…”
Section: Medical Applicationsmentioning
confidence: 99%
“…Medical image is a type of medical information that is considered as the heart of telemedicine, whereby it is used for several purposes including treatment, diagnosis, training, remote learning, and medical consultations between radiologists and clinicians (8). Dealing with digital medical image, despite its great utility in modern healthcare, raises many new security problems through legal and ethical mechanisms for local archiving and remote medical services (9).…”
Section: Medical Image Domainmentioning
confidence: 99%
“…The performances of the video processing attacks are low for this algorithm. Ling et al proposed a watermarking technique for video based on the affine invariant features [13]. This technique was appropriate for DCT‐based compressed video.…”
Section: Introductionmentioning
confidence: 99%
“…This method was robust for image processing attacks not for video processing attacks. Allaf and Kbir [13] analysed the different watermark algorithms for its less processing time. Usually, CWT‐based methods produce reasonable quality in terms of imperceptibility and robustness for image processing and geometrical attacks, except some of the video processing attacks.…”
Section: Introductionmentioning
confidence: 99%