2003
DOI: 10.1117/12.480450
|View full text |Cite
|
Sign up to set email alerts
|

Lossless watermarking scheme for enhancing security of medical data in PACS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…For example, two head-MRIs of two different patients can have different ROIs. A subjective RONI selection [ 6 , 7 , 20 22 ] is thus often used ( e.g. , manual ROI selection by a doctor), which reduces the embedding performance ( e.g.…”
Section: Proposed Embedding Schemementioning
confidence: 99%
“…For example, two head-MRIs of two different patients can have different ROIs. A subjective RONI selection [ 6 , 7 , 20 22 ] is thus often used ( e.g. , manual ROI selection by a doctor), which reduces the embedding performance ( e.g.…”
Section: Proposed Embedding Schemementioning
confidence: 99%
“…Although watermarking has an impact, more or less, on perceptual quality and difficulties with legacy content, Guo and Zhuang [103] suggested three ways to overcome the distortion induced in images by watermark embedding. They are: (1) defining acceptable range of distortion for watermarking; (2) separating an image into protection zone and insertion zone such as ROI (region of interest) and RONI (region of noninterest); and (3) considering watermarking as an invertible manner to recover the original image at the watermark decoder site.…”
Section: Digital Watermarking Versus Other Security Measures/toolsmentioning
confidence: 99%
“…All these suggest that a combination of suitable type of watermarking schemes, where the concept of multiple watermarking stems from, can be developed in order to address the rising security problems of medical images in teleradiology [77,[105][106][107]. Studies also show that incorporation of asymmetric encryption and lossless compression can help attain additional confidentiality, nonrepudiation property, high embedding capacity [15,103,108].…”
Section: Digital Watermarking Versus Other Security Measures/toolsmentioning
confidence: 99%
“…Whether the aim is to store or to transfer the medical information from source to destination for further diagnosis, security is the key issue which should not be compromised in any sense so, there is a need of strong security measures for preserving the medical information. Watermarking for natural images embeds the digital information without much altering the image pixels which is often called imperceptibility which is an important requirement in the watermarking of digital data [11]. A novel watermarking scheme to verify the authenticity and integrity of the digital mammographic images is presented in [30].…”
Section: Introductionmentioning
confidence: 99%
“…Arrange the redundant residued watermark matrix into vector form.10. Encode each entry of the redundant residued vector using Error correcting codes (63,16,11) which gives us an encoded redundant residued watermark.11. Organize the encoded redundant residued watermark in a vector and concatenate it with the hash computed in step 6 and call it a concatenated watermark W c as, W…”
mentioning
confidence: 99%