2015
DOI: 10.1504/ijsise.2015.067069
|View full text |Cite
|
Sign up to set email alerts
|

Tamper detection of electrocardiographic signal using watermarked bio-hash code in wireless cardiology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 31 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Finally, blood vessel is extracted from the watermarked image (Dey et al, 2013a(Dey et al, , 2013bChakraborty et al, 2014) and the accuracy is compared with the previously obtained results. EPR is recovered from the watermarked (Dey et al, 2014a(Dey et al, , 2014b image with the help of original retinal image.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Finally, blood vessel is extracted from the watermarked image (Dey et al, 2013a(Dey et al, , 2013bChakraborty et al, 2014) and the accuracy is compared with the previously obtained results. EPR is recovered from the watermarked (Dey et al, 2014a(Dey et al, , 2014b image with the help of original retinal image.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…A computer-aided system helps automating this clinical activity in order to obtain faster and reliable analysis. Recently, an imperative research is focused on the medical image processing in various fields such as [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…This method showed a consistent improvement in the results when the number of images increases in contrast with the erratic behavior of the basic version. 4 Jaya et al [23] 2009 Median filter, the weighted median and the adaptive filter.…”
mentioning
confidence: 99%
“…One of the well-known techniques (Pal et al, 2013;Dey et al, 2013aDey et al, , 2013b) that have been implemented in image processing (Dey et al, 2012c(Dey et al, , 2012d(Dey et al, , 2015 for information security is watermarking (Bhattacharya et al, 2012;Dey et al, 2014Dey et al, , 2013c. Watermarking refers (Dey et al, 2012e, 2012f;Chakraborty et al, 2012) to hiding or embedding any message inside a signal (Dey et al, 2012g, 2012h), image or video.…”
Section: Introductionmentioning
confidence: 99%