2022
DOI: 10.1016/j.heliyon.2022.e10788
|View full text |Cite
|
Sign up to set email alerts
|

A secured compression technique based on encoding for sharing electronic patient data in slow-speed networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 58 publications
0
1
0
Order By: Relevance
“…The typical watermarking procedures are as follows: First, the watermark is concealed in the cover media (video, image, or audio) using special embedding techniques to generate a watermarked media. Then, the watermarked media can be transmitted over the internet securely distributedly [ 5 , 6 ]. The concealed data can be extracted from the watermarked video in a fast extraction process with minimum distortion and simultaneously preserve the visual imperceptibility of the watermarked video.…”
Section: Introductionmentioning
confidence: 99%
“…The typical watermarking procedures are as follows: First, the watermark is concealed in the cover media (video, image, or audio) using special embedding techniques to generate a watermarked media. Then, the watermarked media can be transmitted over the internet securely distributedly [ 5 , 6 ]. The concealed data can be extracted from the watermarked video in a fast extraction process with minimum distortion and simultaneously preserve the visual imperceptibility of the watermarked video.…”
Section: Introductionmentioning
confidence: 99%