2018
DOI: 10.1002/cpe.5108
|View full text |Cite
|
Sign up to set email alerts
|

NSCT domain–based secure multiple‐watermarking technique through lightweight encryption for medical images

Abstract: This paper discusses a lightweight encryption-based secure digital watermarking technique for medical applications. The technique uses redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) along with nonsubsampled contourlet transform (NSCT) to improve robustness and imperceptibility. The security of the proposed technique is further improved by incorporating a lightweight (low-complexity) cryptographic mechanism that is applied after embedding multiple watermarks. The proposed sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 30 publications
(61 reference statements)
0
13
0
Order By: Relevance
“…So the advantage of the Non‐subsampled Contourlet transform is that it not only has translation invariance, multi‐direction, multi‐scale, and anti‐counterfeiting Gibbs distortion, but also can be implemented quickly 28 . The NSCT method is improved from the traditional contourlet change.…”
Section: Methodsmentioning
confidence: 99%
“…So the advantage of the Non‐subsampled Contourlet transform is that it not only has translation invariance, multi‐direction, multi‐scale, and anti‐counterfeiting Gibbs distortion, but also can be implemented quickly 28 . The NSCT method is improved from the traditional contourlet change.…”
Section: Methodsmentioning
confidence: 99%
“…Color image watermarking is quite like the grayscale watermarking, but only the difference is, there are three color components like red, green, and blue. Recently, the interest in security of copyrights have been enhanced in several fields like military, bioinformatics, medical, 16 biometric, 13 and webserver applications, 17 and so on.…”
Section: Introductionmentioning
confidence: 99%
“…In the meantime, the embedding process can also be completed in the transformed domains, e.g. the discrete cosine transform (DCT) [6]- [11], discrete Fourier transform (DFT) [12]- [14], discrete wave transformation (DWT) [15]- [17], and singular value decomposition (SVD) [10], [11], [18]- [21]. To ensure the robustness of the embedding algorithms, frequency domain analysis is utilized to find out the possible locations of the embedding watermark coefficients [16], [22].…”
Section: Introductionmentioning
confidence: 99%