2018
DOI: 10.1007/s11042-018-6263-3
|View full text |Cite
|
Sign up to set email alerts
|

Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
73
0
2

Year Published

2018
2018
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 195 publications
(75 citation statements)
references
References 31 publications
0
73
0
2
Order By: Relevance
“…Thakur et al [27] using DWT-DCT-SVD in which the combination of these methods can improve the robustness. Their research used two-dimensional logistic map based chaotic encryption to improve security.…”
Section: Resultsmentioning
confidence: 99%
“…Thakur et al [27] using DWT-DCT-SVD in which the combination of these methods can improve the robustness. Their research used two-dimensional logistic map based chaotic encryption to improve security.…”
Section: Resultsmentioning
confidence: 99%
“…Another robust and indiscernible watermarking algorithm proposed by author is LWT-SVD [20]. A robust watermarking algorithm based on DWT-DCT-SVD and chaotic encryption has also been presented by researchers [21].…”
Section: Related Workmentioning
confidence: 99%
“…The substance will be confirmed by separating the implanted watermark. In the event that no watermark can be extricated, it implies the article got has been messed with [2,3].…”
Section: Figure 1: the Watermark Embedding And Detection Processmentioning
confidence: 99%
“…In visually impaired strategies the first media isn't required to separate the watermarking data. Security is an important issue which requires the watermark to be modified only by the owner [2].…”
Section: Introductionmentioning
confidence: 99%