2011 International Conference on Communications and Signal Processing 2011
DOI: 10.1109/iccsp.2011.5739350
|View full text |Cite
|
Sign up to set email alerts
|

A messy watermarking for medical image authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…The dynamic system is defined by the following equation, (1) In this system the dynamic image changes with time. Though the behaviour is random it is deterministic.…”
Section: B Watermark Using Dynamic Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…The dynamic system is defined by the following equation, (1) In this system the dynamic image changes with time. Though the behaviour is random it is deterministic.…”
Section: B Watermark Using Dynamic Modelmentioning
confidence: 99%
“…The sensitivity of the image increase exponentially to the growth of perturbations in the initial conditions. Therefore, the watermark is generated through dynamic system using the reference color plane as initial condition [1]. Thereby, the watermark is generated dynamically.…”
Section: B Watermark Using Dynamic Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…When digital watermarking is used for copyright protection the embedded watermark must survive against attacks, while when used for content authentication the embedded watermark should be fragile or easily broken. The fragility of the watermarking scheme refers to its sensitivity to attacks [9]. Thus, in content authentication schemes, the more fragility of the watermarking against attacks the more successful the watermarking algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Poonkuuntran, S. and Rajesh, R.S., [9] proposed. A messy watermarking for medical image authentication.…”
Section: Literature Reviewmentioning
confidence: 99%