2017 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS) 2017
DOI: 10.1109/icecs.2017.8292084
|View full text |Cite
|
Sign up to set email alerts
|

Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 4 publications
0
14
0
Order By: Relevance
“…DWT based techniques are alluring a result of their simplicity and less computational weight. Further hybrid techniques are developed by researchers for integrating the advantages of both spatial and transform domain or different techniques of frequency domain itself [7], [8], [10], [17], [18], [25], [30]- [33].…”
Section: Fig 1 Taxonomy Of Digital Watermarkingmentioning
confidence: 99%
See 3 more Smart Citations
“…DWT based techniques are alluring a result of their simplicity and less computational weight. Further hybrid techniques are developed by researchers for integrating the advantages of both spatial and transform domain or different techniques of frequency domain itself [7], [8], [10], [17], [18], [25], [30]- [33].…”
Section: Fig 1 Taxonomy Of Digital Watermarkingmentioning
confidence: 99%
“…Further researchers started working in frequency domain techniques [2], [8], [11] by identifying the advantages of frequency domain techniques over spatial domain in medical field. Later on it is also presented by few researchers that hybrid watermarking techniques are best which incorporates features of multiple digital watermarking techniques combining spatial and frequency / transform domain techniques [3], [5], [8], [31] or combining multiple frequency domain techniques [6], [7], [10]. Along with this, Multi-level watermarking [12] and multiple watermarks [6], [7], [11] are also used by few of them for medical images.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Initially the first secure hashing algorithm (SHA-1) based on digital signature algorithm (DSA) was used for authentication of messages [1]. SHA-1 was further enhanced for media applications by many researchers and a family of security and hashing schemes is developed based on SHA and message digest algorithm (MDA) [3].…”
Section: Introductionmentioning
confidence: 99%