2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC) 2013
DOI: 10.1109/ispcc.2013.6663402
|View full text |Cite
|
Sign up to set email alerts
|

Digital image security improvement by integrating watermarking and encryption technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The results showed that watermarking techniques are still not accepted yet for modern applications, where the current watermarking techniques suffer from some weaknesses; for instance, the sensitivity of the bit error is very low, and the possibility of detecting a valid watermark image as an invalid watermark image or vice versa is very high [13]. As a solution to such vulnerabilities, several medical image security approaches that merge watermarking and cryptographic techniques for medical image systems were proposed in the literature such as [16][17][18]. In the following, we briefly present some related works to the combination of watermarking and cryptographic primitives.…”
Section: Background Motivation and State Of The Artmentioning
confidence: 99%
“…The results showed that watermarking techniques are still not accepted yet for modern applications, where the current watermarking techniques suffer from some weaknesses; for instance, the sensitivity of the bit error is very low, and the possibility of detecting a valid watermark image as an invalid watermark image or vice versa is very high [13]. As a solution to such vulnerabilities, several medical image security approaches that merge watermarking and cryptographic techniques for medical image systems were proposed in the literature such as [16][17][18]. In the following, we briefly present some related works to the combination of watermarking and cryptographic primitives.…”
Section: Background Motivation and State Of The Artmentioning
confidence: 99%
“…The SVD of a picture M with size x× x is written by M = USV T , wherever U and V both are orthogonal matrices, and S = diag(λi) is just a diagonal matrix of singular values λi, i = 1,...,m, that should be organized in descending order [13]. Columns of U and V would be the left singular vectors and right singular vectors respectively of picture M. These watermarking methods are mainly used for obtaining either SVD of original picture or each block of host picture, furthermore it alters singular values to the watermark [14]. The principal component matrix is given as following.…”
Section: B Singular Value Decompositionmentioning
confidence: 99%
“…Prabhat Kumar Sharma et.al (2012) [12] had planned the utilization of ABC for optimum fusion of multi-temporal pictures and studied the effect of the difference in the source area. Shilpa P. Metkar et.al (2013) [14] had presented a scheme for enhancing picture protection. Two techniques RC4 and Advances Encryption Standard are followed for security that employs stream cipher and block cipher respectively.…”
Section: Related Workmentioning
confidence: 99%
“…Nowadays, different protocols [8][9][10][11][12][13][14][15][16][17][18][19] combine them in order to benefit from the complementarity of these two mechanisms in terms of a priori/a posteriori protection, and consequently to provide a better security response. Most of them focus on the copyright protection in the framework of video on demand (VOD), where the objective is to identify the person (issuer or recipient) at the origin of an illegal distribution by mean of a watermark (a fingerprint).…”
Section: Introduction: Teleassistance Legal Framework and Medical Litmentioning
confidence: 99%
“…• "Watermarking Followed by Encryption" (WFE) [8,9,17] where the issuer generates and embeds the recipient fingerprint within a copy before encrypting it. Herein, the seller is considered as honest.…”
Section: Introduction: Teleassistance Legal Framework and Medical Litmentioning
confidence: 99%