2020
DOI: 10.1002/ett.3918
|View full text |Cite
|
Sign up to set email alerts
|

A Secured and Robust Medical Image Watermarking Approach for Protecting Integrity of Medical Images

Abstract: In this paper, a novel medical image watermarking (MIW) technique for tele ‐ medicine applications is proposed. In this approach homomorphic transform (HT), redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) transforms are successfully utilized for developing an effective watermarking technique. Reflectance component of medical host image is obtained using HT, on which RDWT decomposition and SVD are applied. Similarly medical watermark image is processed with RDWT and SVD. Singu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0
5

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 44 publications
(31 citation statements)
references
References 56 publications
0
26
0
5
Order By: Relevance
“…Apart from the promising fake detection approaches listed above, researchers working on the topic of face manipulation could incorporate mechanisms that intentionally include imperceivable elements (watermarks) into the manipulated images/videos in order to make the detection easier [67,68]. While such idea does not address the general problem of detecting face manipulations, it could set the bar for adversaries higher and make sharing face manipulation techniques (with legitimate use cases) with the research community less challenging.…”
Section: Promising Approachesmentioning
confidence: 99%
“…Apart from the promising fake detection approaches listed above, researchers working on the topic of face manipulation could incorporate mechanisms that intentionally include imperceivable elements (watermarks) into the manipulated images/videos in order to make the detection easier [67,68]. While such idea does not address the general problem of detecting face manipulations, it could set the bar for adversaries higher and make sharing face manipulation techniques (with legitimate use cases) with the research community less challenging.…”
Section: Promising Approachesmentioning
confidence: 99%
“…Potency of the propounded method can be seen in Table 6 where it is compared with the other medical watermarking methods like [ 16 , 17 , 24 , 31 , 33 , 34 , 36 , 38 ]. From the comparison results, it is clear that the propounded method has competed with the remaining techniques in terms of robustness.…”
Section: Resultsmentioning
confidence: 99%
“…From the comparison results, it is clear that the propounded method has competed with the remaining techniques in terms of robustness. In Table 7 , the imperceptibility of the watermarking schemes are compared with the proposed scheme, from all the methods the proposed method imperceptibility is high except for [ 16 ] method and in comparison with [ 24 ] proposed method results are better for noise attacks, and for all the remaining attacks they are almost similar. Graphical comparison (Same attacks of Table 6 ) of propounded method with [ 16 , 33 ] is shown in Fig.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The primary applications of Watermarking are copyright protection, finger‐printing, and ownership identifications. It may be further used to protect integrity of medical images in telemedicine applications 7 . While in Steganography, the message usually is not related to the object itself, rather it mainly deals with some message which senders secretly send to the intended receivers.…”
Section: Introductionmentioning
confidence: 99%