2018 3rd International Conference on Communication and Electronics Systems (ICCES) 2018
DOI: 10.1109/cesys.2018.8724112
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint Encryption and Dual Watermarking to Verify the Security Issues In Teleradiology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Here we report all the standard methods found in the literature as illustrated in Table 1 and those used in this work to measure imperceptibility and robustness (along with capacity and computational cost) [34]. We use the methods for performance evaluation by ensuring [15] Discrete Wavelet Transform Robustness [16] Multiwavelet Transform Imperceptibility [17] Discrete Wavelet Transform Robustness [18] Fourier Transform Fidelity [19] Discrete wavelet Transform Imperceptibility [20] Discrete wavelet Transform Imperceptibility Frequency Domain + Radial Basis NN [21] Discrete Cosine Transform Robustness [22] Discrete wavelet Transform Imperceptible [23] Discrete wavelet Transform Invisible and Robust [24] Discrete wavelet Transform Robustness Frequency Domain + Hopfield NN [25] Capacity [26] Imperceptibility [27] Image Quality [28] Discrete Cosine Transform Invisible and Robust Frequency Domain + Full Counter Propagation NN [29] Robustness, Imperceptibility [30] Discrete Cosine Transform Robustness [31] Discrete Cosine Transform Complexity, Capacity, PSNR [32] Discrete Cosine Transform Imperceptibility, and robustness Frequency Domain + Synergetic NN [33] Discrete Wavelet Transform Robustness and Imperceptibility i) model and sources of distortion remain uniform ii)…”
Section: Literature Reviewmentioning
confidence: 99%
“…Here we report all the standard methods found in the literature as illustrated in Table 1 and those used in this work to measure imperceptibility and robustness (along with capacity and computational cost) [34]. We use the methods for performance evaluation by ensuring [15] Discrete Wavelet Transform Robustness [16] Multiwavelet Transform Imperceptibility [17] Discrete Wavelet Transform Robustness [18] Fourier Transform Fidelity [19] Discrete wavelet Transform Imperceptibility [20] Discrete wavelet Transform Imperceptibility Frequency Domain + Radial Basis NN [21] Discrete Cosine Transform Robustness [22] Discrete wavelet Transform Imperceptible [23] Discrete wavelet Transform Invisible and Robust [24] Discrete wavelet Transform Robustness Frequency Domain + Hopfield NN [25] Capacity [26] Imperceptibility [27] Image Quality [28] Discrete Cosine Transform Invisible and Robust Frequency Domain + Full Counter Propagation NN [29] Robustness, Imperceptibility [30] Discrete Cosine Transform Robustness [31] Discrete Cosine Transform Complexity, Capacity, PSNR [32] Discrete Cosine Transform Imperceptibility, and robustness Frequency Domain + Synergetic NN [33] Discrete Wavelet Transform Robustness and Imperceptibility i) model and sources of distortion remain uniform ii)…”
Section: Literature Reviewmentioning
confidence: 99%