2018
DOI: 10.1007/s10586-018-1905-9
|View full text |Cite
|
Sign up to set email alerts
|

An effective mechanism for medical images authentication using quick response code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 7 publications
1
12
0
Order By: Relevance
“…In another study on medical images, QR code and image were watermarking with various algorithms. The success of stigmatization was measured by taking certain parts of the images [24]. In the QR code, the watermarking was used to indicate that the relevant code belongs to a particular organization [25].…”
Section: Scopusmentioning
confidence: 99%
“…In another study on medical images, QR code and image were watermarking with various algorithms. The success of stigmatization was measured by taking certain parts of the images [24]. In the QR code, the watermarking was used to indicate that the relevant code belongs to a particular organization [25].…”
Section: Scopusmentioning
confidence: 99%
“…The interest of this transform is the optimization of the choice of locations and the strength of the signature in the image as well as its multi-scale aspect which offers a more robust distribution to the watermark [ 12 ]. Adding the watermark to the low-frequency coefficients can cause visible perceptual distortion, as the insertion of the watermark in the high-frequency coefficients is vulnerable to some types of attack like compression [ 13 ]. To obtain a good compromise between robustness and imperceptibility, the integration is performed in the medium frequencies of the image.…”
Section: Introductionmentioning
confidence: 99%
“…Inspired by Wen et al, a large number of zero-watermarking schemes have appeared, and a substantial portion of them create robust features based on the frequency domain [4,5] or hybrids of image transforms and decomposition [6][7][8][9][10][11][12]. Common image transforms such as the DCT (discrete cosine transform) [9,10], DWT (discrete wavelet transform) [4,7,8,11], DFT (discrete Fourier transform) [4], CAT (cellular automata transform) [5], FrFT (fractional Fourier transform) [6], and CT (contourlet transform) [12] have been applied to zero-watermarking. Utilizing the invariance of the significant values in decompositions such as SVD [6][7][8][9][11][12][13] and QR [10] to further improve the robustness is common in zero-watermarking research.…”
Section: Introductionmentioning
confidence: 99%
“…Common image transforms such as the DCT (discrete cosine transform) [9,10], DWT (discrete wavelet transform) [4,7,8,11], DFT (discrete Fourier transform) [4], CAT (cellular automata transform) [5], FrFT (fractional Fourier transform) [6], and CT (contourlet transform) [12] have been applied to zero-watermarking. Utilizing the invariance of the significant values in decompositions such as SVD [6][7][8][9][11][12][13] and QR [10] to further improve the robustness is common in zero-watermarking research. Zerowatermarking in the frequency domain or image decomposition is robust and widely used.…”
Section: Introductionmentioning
confidence: 99%