2013
DOI: 10.1049/iet-cvi.2012.0109
|View full text |Cite
|
Sign up to set email alerts
|

Fragile and blind watermarking technique based on Weber's law for medical image authentication

Abstract: In developing countries such as India, transmission of medical images over the network is essential for providing health services to rural/remote population. During this transmission, a small distortion in the medical image may lead to wrong conclusions. Thus, arises the need to embed some authentication information in medical images to authenticate transmitted image. In this study, a blind and fragile watermarking technique based on Weber's law is proposed. Here, fragile watermark is inserted by quantising in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
13
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(14 citation statements)
references
References 30 publications
0
13
0
1
Order By: Relevance
“…Table 3 shows the comparaison of the proposed method and others method in term of availability, reliability, and confidentiality. therefore, the proposed is more secured than [6] and [16]- [20]. …”
Section: Comparison With Others Papersmentioning
confidence: 90%
See 2 more Smart Citations
“…Table 3 shows the comparaison of the proposed method and others method in term of availability, reliability, and confidentiality. therefore, the proposed is more secured than [6] and [16]- [20]. …”
Section: Comparison With Others Papersmentioning
confidence: 90%
“…Ali Al-Haj et al [19] where the authors have proposed an encryption algorithm for secured medical image transmission. Ekta Walia et al [20] where the authors have proposed a fragile and blind watermarking technique. Bouslimi et al [6] where the authors have proposed a joint encryption/watermarking system.…”
Section: Comparison With Others Papersmentioning
confidence: 99%
See 1 more Smart Citation
“…However, semi-fragile watermarking techniques aim to prove the integrity and authenticity of the data content, It can accept the non-malicious modification and the watermark will be destroyed against malicious attacks, it called soft authenticate [7]. The fragile watermarking approaches called hard authenticate, which does not allow for any modification even for slight non-malicious modification and the watermark will be destroyed [8].…”
Section: Introductionmentioning
confidence: 99%
“…Also, the algorithm attaches only binary watermark images and it became computationally inefficient, since it used vector quantization algorithm for the optimization of adaptive quantization parameters, while indexing the blocks. Many other algorithms (Bhosale et al, 2012;Chen et al, 2012;Coatrieux et al, 2012;Ishikawa et al, 2012;Kandpal et al, 2012;Vargas et al, 2013;Varghese et al, 2014;Walia et al, 2013;Wang et al, 2011;Wang et al, 2012;Wu et al, 2005;Yang et al, 2010;Zareian et al, 2013) also developed in the literature by meeting some requirements of watermarking, but these algorithms also failed in simultaneously meeting other vital requirements of watermarking (Mason et al, 2000) including perceptibility, robustness, orthogonality, protection against attacks etc.…”
Section: Introductionmentioning
confidence: 99%