2014 International Conference on Intelligent Networking and Collaborative Systems 2014
DOI: 10.1109/incos.2014.116
|View full text |Cite
|
Sign up to set email alerts
|

Protection of Microscopy Images through Digital Watermarking Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…Step 4 In this stage, four neighbor pixels of pixel 7 is selected. In Block 4 of Figure 1b, we observe that only two neighbor pixels, namely 8 and 11 at position (2, 4) and (3,3), respectively, are selected. Only these two pixels are chosen to avoid the redundancy.…”
Section: Watermark Preprocessingmentioning
confidence: 99%
See 2 more Smart Citations
“…Step 4 In this stage, four neighbor pixels of pixel 7 is selected. In Block 4 of Figure 1b, we observe that only two neighbor pixels, namely 8 and 11 at position (2, 4) and (3,3), respectively, are selected. Only these two pixels are chosen to avoid the redundancy.…”
Section: Watermark Preprocessingmentioning
confidence: 99%
“…Spatial domain techniques embed a watermark of a given image by modifying its pixels directly. This technique is easy to implement and requires few computational resources [2,3]. On the other hand, the transform domain technique is applied to coefficients obtained as the result of a frequency transform of either a whole image or single block-shaped regions of a frame.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many motivations lead us to the use of steganography and they can be significantly different from each other. For example, there may be the need to establish a “covert channel,” as well as to insert a seal into a digital content, which cannot be removed or altered (ie, digital watermarking). It is important to point out that unlike cryptography, which deals with the protection of the message content, steganography deals with techniques to hide the presence of hidden information within a message or within stored/exchanged data.…”
Section: Introductionmentioning
confidence: 99%
“…The secret information can be the unique serial number to identify the user, and it can also be relevant information of products, as the authentication of products to deal with the dispute, and this secret information is the digital watermark. With the development of the information hiding technology, Pizzolante (2014) proposed to take the digital watermarking technique applied to the microscope images. The digital watermark is divided into image watermarks (Tsai et al 2013;Zhou et al 2014), audio watermark (Duymaz 2012;Zhang et al 2014b), video watermark (Xie et al 2013;Panyavaraporn 2013) and the alike according to different formats.…”
Section: Introductionmentioning
confidence: 99%