2018
DOI: 10.1007/s11042-018-6746-2
|View full text |Cite
|
Sign up to set email alerts
|

Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(17 citation statements)
references
References 26 publications
0
17
0
Order By: Relevance
“…Any complex matrix A of considerable size m*n of rank r (the established rank of the complex matrix A represent the specific number of non-zero singular values). Next there is an orthogonal matrix U of explicit order m*m, an orthogonal matrix V of order n*n and a “pseudo-diagonal” matrix S of dimension r [ 41 ] such that A: …”
Section: Proposed Watermarking Schemementioning
confidence: 99%
“…Any complex matrix A of considerable size m*n of rank r (the established rank of the complex matrix A represent the specific number of non-zero singular values). Next there is an orthogonal matrix U of explicit order m*m, an orthogonal matrix V of order n*n and a “pseudo-diagonal” matrix S of dimension r [ 41 ] such that A: …”
Section: Proposed Watermarking Schemementioning
confidence: 99%
“…Here w k represents the k-th watermark bit to be embedded in this block and I i,j is the same as in Equation (18). s is the embedding intensity and it meets the conditions of Equation (22).…”
Section: Watermark Embeddingmentioning
confidence: 99%
“…Recently, the copyright of medical images has attracted researchers' attention [18,19]. Digital watermarking is one of the prevalent techniques to protect the ownership of images [20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%
“…is image encryption method camouflages the existence of the original image, thus reducing the possibility of being attacked to a certain extent. As of now, many meaningful image encryption algorithms have been proposed [20][21][22][23][24][25][26][27][28][29][30][31][32][33]. Inspired by [19], the work of [20] embeds multiple color images into nonessential areas of the carrier image to achieve visually meaningful effects.…”
Section: Introductionmentioning
confidence: 99%