2021
DOI: 10.1007/978-981-16-3013-2_8
|View full text |Cite
|
Sign up to set email alerts
|

A Zero Watermarking Scheme for Encrypted Medical Images Based on Tetrolet-DCT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(15 citation statements)
references
References 6 publications
1
14
0
Order By: Relevance
“…Our algorithm can still extract complete watermark information when the rotation angle reaches 70°, as shown in Table 4. As can be seen from Figure 16c, the algorithm proposed in this paper significantly outperforms algorithms [18][19][20] and DWT-DCT in resisting the rotation attack. For the scaling attack, as can be seen from Figure 16d, algorithms [18,19] and DWT-DCT slightly outperform our algorithm.…”
Section: Algorithm Comparisonmentioning
confidence: 84%
See 4 more Smart Citations
“…Our algorithm can still extract complete watermark information when the rotation angle reaches 70°, as shown in Table 4. As can be seen from Figure 16c, the algorithm proposed in this paper significantly outperforms algorithms [18][19][20] and DWT-DCT in resisting the rotation attack. For the scaling attack, as can be seen from Figure 16d, algorithms [18,19] and DWT-DCT slightly outperform our algorithm.…”
Section: Algorithm Comparisonmentioning
confidence: 84%
“…As can be seen from Figure 16c, the algorithm proposed in this paper significantly outperforms algorithms [18][19][20] and DWT-DCT in resisting the rotation attack. For the scaling attack, as can be seen from Figure 16d, algorithms [18,19] and DWT-DCT slightly outperform our algorithm. For Y-axis and Xaxis shear attacks, our algorithms show good performance.…”
Section: Algorithm Comparisonmentioning
confidence: 84%
See 3 more Smart Citations