2018
DOI: 10.1016/j.bspc.2018.02.007
|View full text |Cite
|
Sign up to set email alerts
|

An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 80 publications
(19 citation statements)
references
References 42 publications
0
17
0
1
Order By: Relevance
“…The watermark bits are then integrated into the similar left singular value matrix values using appropriate thresholding to carefully maintain imperceptibility and robustness. In the innovative approach presented by Gangadhar & al [ 17 ], a sub-band decomposition of the medical image is first performed by carefully applying a DWT. Next, an SVD is applied precisely to the LL subbands.…”
Section: Related Workmentioning
confidence: 99%
“…The watermark bits are then integrated into the similar left singular value matrix values using appropriate thresholding to carefully maintain imperceptibility and robustness. In the innovative approach presented by Gangadhar & al [ 17 ], a sub-band decomposition of the medical image is first performed by carefully applying a DWT. Next, an SVD is applied precisely to the LL subbands.…”
Section: Related Workmentioning
confidence: 99%
“…Owing to the rapid development of information technology, intelligent medicine and remote diagnosis are becoming more and more mature [4][5][6]. A large number of medical images are often transmitted through the Internet [7]. Unauthorized persons can easily obtain, store, use, and tamper with medical images on the network [8].…”
Section: Introductionmentioning
confidence: 99%
“…Most of the current research in watermarking is aimed at developing a robust or imperceptible watermarking model by combining several algorithms in the spatial or transform domain, which leads to increased computational time. Several transformation algorithms are used, such as cosine transform [3], wavelet transform [4,5] and contourlet transform [6,7]. Transform domain methods are used to improve either the robustness or the imperceptibility by transmuting the raw pixel value into a certain coefficient, inserting the watermark, and then performing inverse transformation to get the embedded pixel value.…”
Section: Introductionmentioning
confidence: 99%