2021
DOI: 10.1007/s10586-020-03215-x
|View full text |Cite
|
Sign up to set email alerts
|

A robust blind medical image watermarking approach for telemedicine applications

Abstract: In order to enhance the security of exchanged medical images in telemedicine, we propose in this paper a blind and robust approach for medical image protection. This approach consists in embedding patient information and image acquisition data in the image. This imperceptible integration must generate the least possible distortion. The watermarked image must present the same clinical reading as the original image. The proposed approach is applied in the frequency domain. For this purpose, four transforms were … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 60 publications
(20 citation statements)
references
References 44 publications
0
20
0
Order By: Relevance
“…The comparison shown in Table XXVI and its corresponding bar graph shown in Figure 28. The Results shown in Table XXVI and Figure 28 reveals that our proposed technique outperforms the technique [55].…”
Section: Performance Comparison Of the Proposed Scheme With Other Schemesmentioning
confidence: 82%
See 1 more Smart Citation
“…The comparison shown in Table XXVI and its corresponding bar graph shown in Figure 28. The Results shown in Table XXVI and Figure 28 reveals that our proposed technique outperforms the technique [55].…”
Section: Performance Comparison Of the Proposed Scheme With Other Schemesmentioning
confidence: 82%
“…Finally we compared the proposed technique with the technique recently reported by Kahlessename et. al [55]. The comparison shown in Table XXVI and its corresponding bar graph shown in Figure 28.…”
Section: Performance Comparison Of the Proposed Scheme With Other Schemesmentioning
confidence: 99%
“…Recovery of compressed data from high bit plane image (b). Recovery of compressed data from low bit plane image (6) Data refinement between the compressed data produced by two bit plane images After two groups compressed data are derived from Low p and High p , the data refinement between these two groups of data must be conducted to obtain real and effective compressed data.…”
Section: Tamper Detection and Cover Image Recoverymentioning
confidence: 99%
“…As the cloud is regarded as dishonest entity, the privacy protection of outsourced image has drawn much attention from researchers, and many schemes have been proposed to solve the problem. In general, there are two approaches to protect privacy of the outsourced image; one is to conduct encryption of image before it is outsourced to the cloud [1][2][3], the other one is to utilize the combination of encryption and digital watermarking to protect images [4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…Data encryption capability is weaker than the usual LSB method since this method embeds data in two layers. Kahlessenane et al 8 proposed a similar work where four types of transform domain—DWT, non‐subsampled contourlet transform (NSCT), nonsubsampled shearlet transform (NSST), and discrete cosine transform (DCT) were combined with Schur decomposition to fabricate the stego image. DWT‐PSNR Schur's value is determined to be superior to the other transforms.…”
Section: Introductionmentioning
confidence: 99%