2016
DOI: 10.1002/sec.1690
|View full text |Cite
|
Sign up to set email alerts
|

A novel zero‐watermarking approach of medical images based on Jacobian matrix model

Abstract: Ensuring the medical images authenticity becomes an essential need. This need has to keep of course two factors: (i) high robustness and (ii) low complexity in term of processing. A zero-watermarking scheme could be a practical solution for this matter. This paper proposes a zero-watermarking algorithm to assure the authenticity of the transmitted medical images through an e-healthcare network. The targeted image is partitioned into 8 × 8 non-overlapping blocks, and the Jacobian matrix model is used to constru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…A total number of ‘seeds’ are 1024. 5: For every block, fix the mid‐frequency range index, where the watermark signal has to be added. In our case, we consider the indices [5–7, 12–14, 19–21, 26–28, 33–35]. 6: The size of DSSS is 15.…”
Section: Proposed Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…A total number of ‘seeds’ are 1024. 5: For every block, fix the mid‐frequency range index, where the watermark signal has to be added. In our case, we consider the indices [5–7, 12–14, 19–21, 26–28, 33–35]. 6: The size of DSSS is 15.…”
Section: Proposed Techniquementioning
confidence: 99%
“…However, the major limitations regarding this technique are imperceptibility and computational complexity. Ghadi et al [14] proposed an imperceptible and robust medical image watermarking technique based on the Jacobian matrix. The major issue with this technique is the high computational complexity.…”
Section: Introductionmentioning
confidence: 99%
“…At present, the studies on zero-watermarking are mostly concentrated in the image field. Ghadi et al [12] used the Jacobian matrix model and Jumana et al [13] used the genetic algorithm (GA) to construct zero-watermarks. To improve the security, many algorithms introduced visual cryptography (VC) to zero-watermarking technology [14]- [16].…”
Section: Related Workmentioning
confidence: 99%
“…Since each carrier generates its own unique zero-watermark, an intellectual property library must be established to store the zero-watermarks. To date, zero-watermarking technology has been applied to copyright protection in many fields, such as text [10], audio [11], image [12]- [19], video [20]- [24], relational databases [25], and sharing models in cooperative drive engineering [26].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, there is inevitably a contradiction between imperceptibility and robustness of the watermark. The traditional watermarking methods are usually limited for medical images [32][33][34] and remote-sensing images [35] which require low distortion and high resolution.…”
Section: Introductionmentioning
confidence: 99%