2022
DOI: 10.1007/s11042-022-12592-x
|View full text |Cite
|
Sign up to set email alerts
|

Robust zero-watermarking algorithm for medical images based on SIFT and Bandelet-DCT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(19 citation statements)
references
References 22 publications
1
18
0
Order By: Relevance
“…In order to better demonstrate the strong robustness of the AKAZE‐DCT algorithm, the algorithm is compared with the KAZE‐DCT algorithm, SIFT‐DCT algorithm, PHTs‐DCT algorithm and DCT algorithm in the face of different attacks [21–23]. As shown in Table 11 and Figure 13, red represents DCT, green represents KAZE‐DCT, blue represents SIFT‐DCT, cyan represents PHTs‐DCT and black represents the AKAZE‐DCT proposed in this paper.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to better demonstrate the strong robustness of the AKAZE‐DCT algorithm, the algorithm is compared with the KAZE‐DCT algorithm, SIFT‐DCT algorithm, PHTs‐DCT algorithm and DCT algorithm in the face of different attacks [21–23]. As shown in Table 11 and Figure 13, red represents DCT, green represents KAZE‐DCT, blue represents SIFT‐DCT, cyan represents PHTs‐DCT and black represents the AKAZE‐DCT proposed in this paper.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…In order to better demonstrate the strong robustness of the AKAZE-DCT algorithm, the algorithm is compared with the KAZE-DCT algorithm, SIFT-DCT algorithm, PHTs-DCT algorithm and DCT algorithm in the face of different attacks [21][22][23]. As shown in Table 11 and Figure and PHTs-DCT, AKAZE-DCT shows better robustness overall, both for conventional and geometric attacks.…”
Section: Comparison With Other Algorithmsmentioning
confidence: 99%
“…Commonly used feature descriptors are SIFT (Scale Invariant Feature Transform) [20,25,26], SURF (Speeded Up Robust Features) [22][23][24], FAST (Features from accelerated segment test) [26], Daisy [27] etc. Fang et al [20] used the SIFT algorithm to extract image features and perform bandelet transform and DCT on their characteristics to obtain the feature vector of medical images. This algorithm has good robustness but poor resistance to cropping attacks, high computational cost, and does not take into account the problem of missing pixel values resulting in missing extracted watermarks due to rotation attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Meng et al [29] and Liu et al [30] developed an irreversible watermarking scheme using wavelet transform and U-net based machine learning method. Fang et al [31] proposed an information hiding technique based on adversarial generative networks to effectively secure data in data sharing. Uchida et al [32] embedded watermarking information in the network model without affecting the performance of the network to ensure the intellectual property of the shared neural network model.…”
Section: Introductionmentioning
confidence: 99%