2020
DOI: 10.1007/s13246-019-00838-2
|View full text |Cite
|
Sign up to set email alerts
|

Patient data hiding into ECG signal using watermarking in transform domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
31
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 48 publications
(31 citation statements)
references
References 24 publications
0
31
0
Order By: Relevance
“…We clearly see from Table 3 that all the three methods can successfully extract all the embedded watermark bits when there is no attack. However, the proposed method achieved less than 5% BER under all the attack scenarios, while the mechanisms in [12] and [14] achieved BERs closer to 50%. This implies that the mechanisms in [12] and [14] completely fail under all the considered filtering attack scenarios.…”
Section: Simulation Resultsmentioning
confidence: 88%
See 4 more Smart Citations
“…We clearly see from Table 3 that all the three methods can successfully extract all the embedded watermark bits when there is no attack. However, the proposed method achieved less than 5% BER under all the attack scenarios, while the mechanisms in [12] and [14] achieved BERs closer to 50%. This implies that the mechanisms in [12] and [14] completely fail under all the considered filtering attack scenarios.…”
Section: Simulation Resultsmentioning
confidence: 88%
“…However, the proposed method achieved less than 5% BER under all the attack scenarios, while the mechanisms in [12] and [14] achieved BERs closer to 50%. This implies that the mechanisms in [12] and [14] completely fail under all the considered filtering attack scenarios. From Tables 2 and 3, we can conclude that the proposed mechanism outperforms the methods in [12] and [14] in terms BER, while maintaining higher PSNR values.…”
Section: Simulation Resultsmentioning
confidence: 88%
See 3 more Smart Citations