2021
DOI: 10.1155/2021/4944797
|View full text |Cite|
|
Sign up to set email alerts
|

Robust Zero Watermarking Algorithm for Medical Images Based on Zernike-DCT

Abstract: Digital medical system not only facilitates the storage and transmission of medical information but also brings information security problems. Aiming at the security of medical images, a robust zero watermarking algorithm for medical images based on Zernike-DCT is proposed. The algorithm first uses a chaotic logic sequence to preprocess and encrypt the watermark, then performs edge detection and Zernike moment processing on the original medical image to get the accurate edge points, and then performs discrete … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 23 publications
0
12
0
Order By: Relevance
“…The comparison results are shown in Table 15. As can be seen from the table, for nongeometric attacks, such as Gaussian noise and JPEG compression (the attack intensity of the two is 5%), the performance of the proposed algorithm is slightly lower than that of the algorithm proposed by others in Table 15 [29][30][31][32], but the NC value of the two kinds of attacks is more than 0.5, which shows that the algorithm is robust.…”
Section: Translation Attackmentioning
confidence: 86%
See 1 more Smart Citation
“…The comparison results are shown in Table 15. As can be seen from the table, for nongeometric attacks, such as Gaussian noise and JPEG compression (the attack intensity of the two is 5%), the performance of the proposed algorithm is slightly lower than that of the algorithm proposed by others in Table 15 [29][30][31][32], but the NC value of the two kinds of attacks is more than 0.5, which shows that the algorithm is robust.…”
Section: Translation Attackmentioning
confidence: 86%
“…For geometric attacks, when the rotation angle reaches 10°, the NC value can reach 0.88 respectively, while the NC value of the algorithm [29,30] is 0.82 and 0.61 respectively. When the rotation angle reaches 20°, the NC values of the algorithm [29,30] are 0.79 and 0.53 respectively.…”
Section: Translation Attackmentioning
confidence: 99%
“…In this study, we deal only with the watermark embedding part and not with the extraction part since we study the performance of the models on watermarked images. There are numerous watermarking methodologies, like other moment families [ 33 ] or transformations [ 34 ], that are applied in medical images, and these can constitute a new category of attacks.…”
Section: Methodsmentioning
confidence: 99%
“…In the experimental process, we selected the same size of brain map and text "HN" watermark information for testing to maintain uniformity. Then, we compared with the existing algorithms KAZE-DCT [30], Zernike-DCT [31], Inception V3-DCT [32], and DWT-DCT. As can be seen, from both Table 6 and Fig.…”
Section: Algorithms Comparisonmentioning
confidence: 99%