2016
DOI: 10.1515/cait-2016-0026
|View full text |Cite
|
Sign up to set email alerts
|

A New Zero-Watermarking Algorithm Resisting Attacks Based on Differences Hashing

Abstract: Medical volume data containing patient information is often faced with various attacks in the transmission

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…While robustness means that the watermark should not be lost by any kind of image processing from unauthorized parties. The imperceptibility and robustness are trade-off constraints that usually conflict with each other, where increasing the imperceptibility will decrease the robustness and vice versa [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…While robustness means that the watermark should not be lost by any kind of image processing from unauthorized parties. The imperceptibility and robustness are trade-off constraints that usually conflict with each other, where increasing the imperceptibility will decrease the robustness and vice versa [4].…”
Section: Introductionmentioning
confidence: 99%
“…The image watermarking schemes can be classified into two main categories, which are spatial domain and transform domain schemes [4,5]. A Least Significant Bit is an example algorithm in the spatial domain that modifies the low-order bits of the hot image for the embedding process [6].…”
Section: Introductionmentioning
confidence: 99%
“…One of the most commonly used approaches in Image forensics is digital watermarking. In general, watermarking can be considered as the introduction of a signature, within an image before it is distributed [4] and its ownership can then be determined by verifying the signature [8]. A significant drawback of this scheme is that applying one or more image processing operations can easily distort or even destroy the watermark.…”
Section: Introductionmentioning
confidence: 99%