2021
DOI: 10.1007/978-981-16-3013-2_9
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Zero-Watermarkinging Algorithm Based on PHTs-DCT for Medical Images in the Encrypted Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…In order to better demonstrate the strong robustness of the AKAZE‐DCT algorithm, the algorithm is compared with the KAZE‐DCT algorithm, SIFT‐DCT algorithm, PHTs‐DCT algorithm and DCT algorithm in the face of different attacks [21–23]. As shown in Table 11 and Figure 13, red represents DCT, green represents KAZE‐DCT, blue represents SIFT‐DCT, cyan represents PHTs‐DCT and black represents the AKAZE‐DCT proposed in this paper.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to better demonstrate the strong robustness of the AKAZE‐DCT algorithm, the algorithm is compared with the KAZE‐DCT algorithm, SIFT‐DCT algorithm, PHTs‐DCT algorithm and DCT algorithm in the face of different attacks [21–23]. As shown in Table 11 and Figure 13, red represents DCT, green represents KAZE‐DCT, blue represents SIFT‐DCT, cyan represents PHTs‐DCT and black represents the AKAZE‐DCT proposed in this paper.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…In order to better demonstrate the strong robustness of the AKAZE-DCT algorithm, the algorithm is compared with the KAZE-DCT algorithm, SIFT-DCT algorithm, PHTs-DCT algorithm and DCT algorithm in the face of different attacks [21][22][23]. As shown in Table 11 and Figure and PHTs-DCT, AKAZE-DCT shows better robustness overall, both for conventional and geometric attacks.…”
Section: Comparison With Other Algorithmsmentioning
confidence: 99%
“…The comparison results are shown in Table 15. As can be seen from the table, for nongeometric attacks, such as Gaussian noise and JPEG compression (the attack intensity of the two is 5%), the performance of the proposed algorithm is slightly lower than that of the algorithm proposed by others in Table 15 [29][30][31][32], but the NC value of the two kinds of attacks is more than 0.5, which shows that the algorithm is robust.…”
Section: Translation Attackmentioning
confidence: 86%
“…When the rotation angle reaches 20°, the NC values of the algorithm [29,30] are 0.79 and 0.53 respectively. In this paper, it is proposed that the clockwise rotation angle of the algorithm can reach 80°, which is much higher than that of the algorithm [29][30][31][32]. For the downward translation attack with 15% attack intensity, the NC values of algorithm [30] and algorithm [32] are 0.61, 0.90 respectively, and the proposed algorithm NC is 0.91.…”
Section: Translation Attackmentioning
confidence: 99%
See 1 more Smart Citation