2008 Congress on Image and Signal Processing 2008
DOI: 10.1109/cisp.2008.390
|View full text |Cite
|
Sign up to set email alerts
|

Medical Image Authentication Using Hash Function and Integer Wavelet Transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
6
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…Though the pixel domain is usually adopted during embedding, the transformed domain such as the Integer Wavelet Transform (IWT) [13] and the Integer-DCT (IDCT) [14], have been considered too, mainly to provide advantages from the invisibility point of view. There are also various algorithms designed specifically for the authentication of medical images ( [15], [8], [5]), but they do not seem to be compliant with the strict requirements of an actual application scenario. In fact, this aspect appears as the most critical: the majority of known works only partially takes into account the structured indications coming from the medical community in terms not only of provided functionalities and performances, but primarily for what concerns the adaptation with a pre-existing infrastructure, security protocols and devices.…”
Section: Introductionmentioning
confidence: 96%
“…Though the pixel domain is usually adopted during embedding, the transformed domain such as the Integer Wavelet Transform (IWT) [13] and the Integer-DCT (IDCT) [14], have been considered too, mainly to provide advantages from the invisibility point of view. There are also various algorithms designed specifically for the authentication of medical images ( [15], [8], [5]), but they do not seem to be compliant with the strict requirements of an actual application scenario. In fact, this aspect appears as the most critical: the majority of known works only partially takes into account the structured indications coming from the medical community in terms not only of provided functionalities and performances, but primarily for what concerns the adaptation with a pre-existing infrastructure, security protocols and devices.…”
Section: Introductionmentioning
confidence: 96%
“…In transform domain watermarking can be performed using DCT (Discrete Cosine Transform) [2] or IWT (Integer Wavelet Transform) [3].Different approaches have been proposed in order to improve the security of medical image transmission using watermarking, which gives one level security. A Tamper Assessment Factor (TAF) of the watermarked image with the physician's signature and patient diagnosis information embedded into wavelet transform coefficients of the medical images is proposed in [4].…”
Section: Introductionmentioning
confidence: 99%
“…The Preliminary works in this area have been done in the spatial domain (Meerwald et al, 2001;Giakoumaki et al, 2003) and transform domain-using DWT (Discrete Wavelet Transform) for watermarking (Nayak et al, 2004). In transform domain watermarking can be performed using DCT (Discrete Cosine Transform) (Jansen et al, 2009) or IWT (Integer Wavelet Transform) (Piao et al, 2008).…”
Section: Introductionmentioning
confidence: 99%