2016
DOI: 10.5815/ijmecs.2016.04.06
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Digital Image Watermarking Scheme for Medical Images using Neural Network, DWT and RSA

Abstract: Abstract-Image watermarking is the process of the hiding the one image into other image for the copyright protection. The process of watermarking must be done in this way that the pixels of the original image must remain in its original HD form. A lot of work has been done in this context in previous years but some techniques have their own applications, drawbacks as well as advantages. So, this paper will utilize three techniques i.e. Discreet Wavelet Transform (DWT), Neural Network (NN) and RSA encryption fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…The scheme has a significant drawback in terms of perceptual quality where the average PSNR is 41 dB, which is barely acceptable for medical images watermarking. Nagpal et al [10] proposed a watermarking scheme based on DWT, neural network , and rivest-shamir-adleman (RSA) encryption. In this technique, the watermark image was scrambled by applying the RSA encryption for security reasons.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The scheme has a significant drawback in terms of perceptual quality where the average PSNR is 41 dB, which is barely acceptable for medical images watermarking. Nagpal et al [10] proposed a watermarking scheme based on DWT, neural network , and rivest-shamir-adleman (RSA) encryption. In this technique, the watermark image was scrambled by applying the RSA encryption for security reasons.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The risk, which is the probability that a threat exploits a certain vulnerability in a system, is associated with the manifestation of the threat [ 18 , 38 , 39 ]. Often, the risk identification is not completely known due to a lack of knowledge about when or how the threat will manifest itself in the system.…”
Section: Introductionmentioning
confidence: 99%