2019
DOI: 10.1007/978-3-030-14118-9_62
|View full text |Cite
|
Sign up to set email alerts
|

A Blind Fragile Based Medical Image Authentication Using Schur Decomposition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…An interesting watermarking application is known as signal authentication, where a fragile watermark is used to identify and localize tampering in the attacked signals. A representative fragile watermarking scheme for medical images is reported in [8]. Due to the need to restore the attacked signals, beyond identifying the attack, self-recovery schemes have emerged.…”
Section: Introductionmentioning
confidence: 99%
“…An interesting watermarking application is known as signal authentication, where a fragile watermark is used to identify and localize tampering in the attacked signals. A representative fragile watermarking scheme for medical images is reported in [8]. Due to the need to restore the attacked signals, beyond identifying the attack, self-recovery schemes have emerged.…”
Section: Introductionmentioning
confidence: 99%
“…Table 1 has present a general view on the secured data fields in term of purpose, strength, weakness and used-based. Provide information security and transfer them through insecure communication [6] Protect the confidentiality, integrity, and non-repudiation (availability) of the data [7] It is a private communication and protecting the data from alteration as an authentication purpose [8] Copyright protection, broadcast monitoring, video authentication, and ID card security [9] Strength Secure the data as well as protect the privacy by using cryptography with another technique [10], for example, steganography [11] Provide a secure process of authorization and better security functionalities [12] Provide end-to-end data confidentiality for sensitive information and robust authenticity [13] Enhance imperceptibility and computational complexity for the digital media [14] Weakness…”
Section: Introductionmentioning
confidence: 99%