2018
DOI: 10.1016/j.cmpb.2018.02.021
|View full text |Cite
|
Sign up to set email alerts
|

Encryption and watermark-treated medical image against hacking disease—An immune convention in spatial and frequency domains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(15 citation statements)
references
References 27 publications
0
15
0
Order By: Relevance
“…This verification step essentially solves the false positive detection problem that arises in SVD based watermarking. The experimental results of proposed scheme shows that it is imperceptible and robust against different kinds of attacks [8][9]. For improved security using image compression, watermarking using DCT technique is used which has been combined with image compression technique by using improved adaptive Huffman encoding.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…This verification step essentially solves the false positive detection problem that arises in SVD based watermarking. The experimental results of proposed scheme shows that it is imperceptible and robust against different kinds of attacks [8][9]. For improved security using image compression, watermarking using DCT technique is used which has been combined with image compression technique by using improved adaptive Huffman encoding.…”
Section: Literature Surveymentioning
confidence: 99%
“…The proposed work of this DICOM image encryption uses a fuzzy chaotic encryption card and for water-marking uses a discrete wavelet transform. The most confusing mechanism in image encryption is Arnold's transformation and this limitation of Arnold's transformation is overcome by this proposed method [8].…”
Section: Literature Surveymentioning
confidence: 99%
“…In their paper, Abdmouleh et al presented a partial cryptographic approach that was based on the digital wavelet transform (DWT) and was JPEG2000 compliant to ensure the safe transfer and storage of medical images [ 6 ]. Lakshmi et al presented a similar algorithm using a discrete wavelet transform (DWT), with the difference being that they used a fuzzy chaotic map for the watermarking [ 7 ]. In their paper, Cao et al presented a medical image encryption algorithm using edge maps that were derived from a source image.…”
Section: Introductionmentioning
confidence: 99%
“…The method in [ 5 ] focused on the embedding capacity, but no results are given with respect to other criteria, such as the correlation coefficients entropy, the number of pixel change rate (NPCR), or the uniform average change intensity (UACI). The methods in [ 6 , 7 ] are based on the digital wavelet transform (DWT) and allow for safe transport, but they do not provide suitable results with respect to the correlation coefficients. The results that were obtained in [ 8 ] are only suitable for the NPCR, and other values are not suitable.…”
Section: Introductionmentioning
confidence: 99%
“…However, RC5 can be broken by attackers due to its poor diffusion property in key computation [10], [11]. This can be overcome by using RC5 in combination with chaos to enhance the security level, where chaos sequences can be used for ciphering of medical images [12].…”
Section: Introductionmentioning
confidence: 99%