2017
DOI: 10.1007/s10278-017-9961-x
|View full text |Cite
|
Sign up to set email alerts
|

Medical Image Tamper Detection Based on Passive Image Authentication

Abstract: Telemedicine has gained popularity in recent years. Medical images can be transferred over the Internet to enable the telediagnosis between medical staffs and to make the patient's history accessible to medical staff from anywhere. Therefore, integrity protection of the medical image is a serious concern due to the broadcast nature of the Internet. Some watermarking techniques are proposed to control the integrity of medical images. However, they require embedding of extra information (watermark) into image be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(23 citation statements)
references
References 21 publications
(37 reference statements)
0
23
0
Order By: Relevance
“…Since the first part provides fundamental quality scale, assigning higher redundancy rate for this part enables the recovery system for high tampering rates. In order to manage data payload for watermarking, the allocated rates should satisfy (2).…”
Section: Rate Allocationmentioning
confidence: 99%
See 2 more Smart Citations
“…Since the first part provides fundamental quality scale, assigning higher redundancy rate for this part enables the recovery system for high tampering rates. In order to manage data payload for watermarking, the allocated rates should satisfy (2).…”
Section: Rate Allocationmentioning
confidence: 99%
“…Nowadays, by developing the internet and social networks, image authentication is a very crucial issue as a result of information explosion [1][2][3][4]. Moreover, modern image manipulation software, like Photoshop, operating in powerful computers facilitate the image forgery [5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…With the rapid development of multimedia information processing technology and the growing popularity of the Internet, the dissemination of digital contents such as digital images, audio and video via internet has become more and more popular. At the same time, however, the contents of digital data can easily be modified or forged without leaving any visible traces [1][2][3]. To verify the authenticity of digital images and to protect their intellectual property, perceptual image hashing (PIH) has emerged as an effective technology for image security and authentication and has attracted extensive attention [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…Despite these algorithms obtaining favorable exp re is still room for improvement. Some techniques ignore geometric operation Widely used in digital images and videos [4][5][6][7][8][9][10][11][12][13][14][15], fragile watermarking technique has been a popular research topic, and numerous studies have obtained favorable results. The research and development of 3D model protection mechanisms, which have numerous applications, have gradually received scholarly attention.…”
Section: Introductionmentioning
confidence: 99%