2004
DOI: 10.1016/j.patrec.2004.06.012
|View full text |Cite
|
Sign up to set email alerts
|

Blind image data hiding based on self reference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0
3

Year Published

2006
2006
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 97 publications
(45 citation statements)
references
References 18 publications
0
42
0
3
Order By: Relevance
“…Specific organ segmentation based approaches are considered in [11] for CT imaging, an LSB modification scheme that detects and recovers image tampering using a Region-of-Interest approach is considered in [12], [13] and [14] and a method for distortion-free, reversible and fragile medical image watermarking is given in [16]. Other watermarking schemes that focus on applications in medical imaging include those that combine lossless compression and encryption [17] including blind watermarking assuming a DICOM format [18], [19] and [20].…”
Section: Medical Image Information Hidingmentioning
confidence: 99%
“…Specific organ segmentation based approaches are considered in [11] for CT imaging, an LSB modification scheme that detects and recovers image tampering using a Region-of-Interest approach is considered in [12], [13] and [14] and a method for distortion-free, reversible and fragile medical image watermarking is given in [16]. Other watermarking schemes that focus on applications in medical imaging include those that combine lossless compression and encryption [17] including blind watermarking assuming a DICOM format [18], [19] and [20].…”
Section: Medical Image Information Hidingmentioning
confidence: 99%
“…The algorithm presented (Yulin Wang, Alan Pearmain, 2004) is blind watermarking based on scene detection. The algorithm is adapted on hardware where Integer DCT is utilized.…”
Section: B Watermarking Embedding Hardware Implementationmentioning
confidence: 99%
“…However, more data cannot be embedded in the transform domain. Several transform domain based (DCT, DHT, SVD, DWT, and CT) [1,2,3,4,5,6,7,8,9,17] watermarking algorithms are available in the current literature. However, these algorithms fail to achieve all requirements of digital image watermarking system, viz., imperceptibility of watermark image, robustness against attacks, information hiding capacity, security, successful retrieval of watermark, and reduced computational complexity.…”
Section: Introductionmentioning
confidence: 99%