2021
DOI: 10.5755/j01.itc.50.4.28957
|View full text |Cite
|
Sign up to set email alerts
|

Cost-Effective Watermarking Scheme for Authentication of Digital Fundus Images in Healthcare Data Management

Abstract: This paper presents a cost-effective watermarking scheme for the authentication of healthcare data management. The digital fundus images are one particular class of medical images and it is widely used for screening mass population, identifying early symptoms of various diseases in healthcare. The mass volume of such data and its management requires an effective authentication scheme, while it is exchanged on an open network. The proposed scheme uses a watermarking technique to authenticate the digital fundus … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…As we present in Section 5, our proposal was tested using fundus images, so this is an element to consider to selecting the approaches to compare. In Table 11, we present the comparison values of different watermarking schemes [9,14,[16][17][18][19]22]. We present the results indicated in each paper using fundus images.…”
Section: Comparison With Other Watermarking Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…As we present in Section 5, our proposal was tested using fundus images, so this is an element to consider to selecting the approaches to compare. In Table 11, we present the comparison values of different watermarking schemes [9,14,[16][17][18][19]22]. We present the results indicated in each paper using fundus images.…”
Section: Comparison With Other Watermarking Methodsmentioning
confidence: 99%
“…They calculated the histogram from the medical image, to determine a zero point and then a peak point because the number of pixels that are associated with the peak point is the number of bits that it is possible to insert. Klington et al [14] developed a watermarking algorithm to authenticate the digital fundus images using SVD and DWT. As a watermark, the authors used textual information about the fundus images and the original image.…”
Section: Watermarking Algorithmsmentioning
confidence: 99%
“…Neutrosophy is the study of origin, nature, and scope of neutralities. This branch is an extension of fuzzy logic or set and is generalized as neutrosophic set similarity [17]. The definition, concepts and properties of neutrosophic set (NS) are mentioned in many research papers [27,5].…”
Section: Neutrosophic Setmentioning
confidence: 99%
“…At present, nitrogen and phosphorus pollution has been detected in urban environments above a certain concentration, and industrial production has been stopped in some cities' wastewater treatment plants, so it is important to analyze and study nitrogen and phosphorus pollutants in urban wastewater [15][16]. The detection of water pollution sources can also be observed with the help of remote sensing technology in order to obtain a certain percentage of data on the surface properties of water bodies.…”
Section: Characteristics Of Water Pollution Sourcesmentioning
confidence: 99%