Computational Analysis of the Human Eye With Applications 2011
DOI: 10.1142/9789814340304_0011
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Transmission of Retinal Fundus Images with Patient Information Using Encryption, Watermarking, and Error Control Codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The two algorithms were designed with different configurations of the n, k, t, and m values, as shown in Table 3. Two different m values were chosen: code-words with symbols composed by 4 bits are typically used in image transmission [38,39], while code-words with 8-bit symbols are practically implemented in Quick Response (QR) codes [14], Digital Video Broadcasting-Terrestrial (DVB-T) [40], and the Consultative Committee for Space Data Systems (CCSDS) standard for space applications [41]. All configurations were designed to correct any number of errors ν ≤ t in the code-word.…”
Section: Hardware Configurationmentioning
confidence: 99%
“…The two algorithms were designed with different configurations of the n, k, t, and m values, as shown in Table 3. Two different m values were chosen: code-words with symbols composed by 4 bits are typically used in image transmission [38,39], while code-words with 8-bit symbols are practically implemented in Quick Response (QR) codes [14], Digital Video Broadcasting-Terrestrial (DVB-T) [40], and the Consultative Committee for Space Data Systems (CCSDS) standard for space applications [41]. All configurations were designed to correct any number of errors ν ≤ t in the code-word.…”
Section: Hardware Configurationmentioning
confidence: 99%