2020
DOI: 10.1007/s11042-020-09769-7
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and robust watermarking approach based on single value decompression, multi-level DWT, and wavelet fusion with scrambled medical images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(17 citation statements)
references
References 44 publications
0
17
0
Order By: Relevance
“…Robustness to various signal processing attacks is of vital importance, in addition to the security of embedded data in medical images. Some of the recent work with high robustness to various attacks could be seen in [ 50 , 51 ]. In [ 50 ] a method for the secure transmission of medical images has been presented.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Robustness to various signal processing attacks is of vital importance, in addition to the security of embedded data in medical images. Some of the recent work with high robustness to various attacks could be seen in [ 50 , 51 ]. In [ 50 ] a method for the secure transmission of medical images has been presented.…”
Section: Related Workmentioning
confidence: 99%
“…Also, the scheme supports a very small payload of 0.18 bpp. A multilevel discrete wavelet transform and singular value decomposition-based scheme for medical has been reported in [ 51 ]. This scheme is highly robust for hiding watermarks, which could be patient information.…”
Section: Related Workmentioning
confidence: 99%
“…Trujillo-Toledo et al [ 22 ] proposed design an embedded cryptosystem based on a pseudo-random number generator (PRNG)using enhanced sequences from the Logistic 1D map, and it reaches a throughput of up to 47.44 Mbit/s using a personal computer with a 2.9 GHz clock, and 10.53 Mbit/s using a Raspberry Pi 4. Hemdan [ 23 ] presented a medical image watermarking approach based on Wavelet Fusion (WF), Singular Value Decomposition (SVD), and Multi-Level Discrete Wavelet Transform (M-DWT) with scrambling techniques for securing the watermarks images. García-Guerrero et al [ 24 ] introduces a process to improve the randomness of five chaotic maps that are implemented on a PIC-microcontroller.…”
Section: Introductionmentioning
confidence: 99%
“…At present, encryption and watermarking techniques have become the two major thrusts of image security research. But the small capacity of data hiding makes the watermarking technique more suitable to protect the copyright of digital images [9], [10]. Certainly, the encryption technique makes it possible for us to transmit massive image data without leaking any useful information whether in wireless or wired communications [7].…”
Section: Introductionmentioning
confidence: 99%