2018
DOI: 10.1007/978-3-319-74690-6_68
|View full text |Cite
|
Sign up to set email alerts
|

Toward a Secure and Robust Medical Image Watermarking in Untrusted Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The work in the field of digital watermarking started with the spatial domain in 1993 [1] and continued in the same domain [4], [8], [9]. Further researchers started working in frequency domain techniques [2], [8], [11] by identifying the advantages of frequency domain techniques over spatial domain in medical field. Later on it is also presented by few researchers that hybrid watermarking techniques are best which incorporates features of multiple digital watermarking techniques combining spatial and frequency / transform domain techniques [3], [5], [8], [31] or combining multiple frequency domain techniques [6], [7], [10].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The work in the field of digital watermarking started with the spatial domain in 1993 [1] and continued in the same domain [4], [8], [9]. Further researchers started working in frequency domain techniques [2], [8], [11] by identifying the advantages of frequency domain techniques over spatial domain in medical field. Later on it is also presented by few researchers that hybrid watermarking techniques are best which incorporates features of multiple digital watermarking techniques combining spatial and frequency / transform domain techniques [3], [5], [8], [31] or combining multiple frequency domain techniques [6], [7], [10].…”
Section: Related Workmentioning
confidence: 99%
“…The method has better transparency with PSNR > 35dB for scaling factor 40. A homomorphic encryption technique using Number Theoretic Transform (NTT) in combination with key exchange protocol Diffie Hellman for security of medical images in cloud is presented by Soualmi et al [2]. Execution time is fast 1.2 -2.8 sec and new transform is tried but robustness is not tested against any attack.…”
Section: Related Workmentioning
confidence: 99%