2018
DOI: 10.1016/j.matpr.2017.12.341
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Security of Electronic Patient Record Using Watermarking Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Step 3 : The feature vector V(j) and the encrypted watermark BW k (i, j) are performed XOR operation to generate the logical key Key k (i, j), which is saved in the third party to realize the embedding of multiple watermarks, as shown in Eq. (3).…”
Section: Watermark Embeddingmentioning
confidence: 99%
“…Step 3 : The feature vector V(j) and the encrypted watermark BW k (i, j) are performed XOR operation to generate the logical key Key k (i, j), which is saved in the third party to realize the embedding of multiple watermarks, as shown in Eq. (3).…”
Section: Watermark Embeddingmentioning
confidence: 99%
“…In the Haar wavelet, the copyright information in video bit streams is attached by engaging the dyadic equation. Besides, electronic patient security using a watermarking algorithm has been elucidated by Vidya and Padmaja [22]. In hospitals, the security of 'electronic patient record' (EPR) data gains prime importance for the safety of hospital records and wireless transmission of medical information.…”
Section: Related Workmentioning
confidence: 99%