2012 IEEE International Conference on Communication, Networks and Satellite (ComNetSat) 2012
DOI: 10.1109/comnetsat.2012.6380799
|View full text |Cite
|
Sign up to set email alerts
|

Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(17 citation statements)
references
References 2 publications
0
14
0
Order By: Relevance
“…The original Least Significant Digits (LSBs) that are removed in watermark embedding process are stored in RONI after compression. The stored LSBs later can be used to restore the image to its original bits value so the watermarking scheme can be reversible [8]. The research was conducted on a single frame of ultrasound which is impractical in the real world; thus a digital watermarking on multiframes medical images is proposed.…”
Section: Theory: Concept Of Digital Watermarkingmentioning
confidence: 99%
“…The original Least Significant Digits (LSBs) that are removed in watermark embedding process are stored in RONI after compression. The stored LSBs later can be used to restore the image to its original bits value so the watermarking scheme can be reversible [8]. The research was conducted on a single frame of ultrasound which is impractical in the real world; thus a digital watermarking on multiframes medical images is proposed.…”
Section: Theory: Concept Of Digital Watermarkingmentioning
confidence: 99%
“…Based on the medium used for hiding data inside an image, watermarking techniques are classified into two categories, namely, spatial domain and frequency domain. In spatial domain watermarking techniques [ 2 5 ], data is embedded directly into host image. In frequency domain techniques [ 6 8 ], data is embedded into transformed host image.…”
Section: Introductionmentioning
confidence: 99%
“…Robust watermarking techniques [ 6 8 , 12 ] are used in applications where protection of copyright information of images is required, as robust watermarks sustain intentional or unintentional attacks on images. Fragile watermarking techniques [ 2 5 , 13 ] are used in applications which require detection of tampers caused by unauthorized persons during transmission of images and also authorization of source of image. Hybrid watermarking techniques [ 14 16 ] are used in applications that require both privacy control and integrity control of images.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Information is straightforwardly inserted into original image in spatial domain watermarking techniques [5][6][7][8]. In frequency domain techniques [9][10][11], information is inserted into transformed original image.…”
mentioning
confidence: 99%