2022
DOI: 10.1049/bme2.12102
|View full text |Cite
|
Sign up to set email alerts
|

Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform

Abstract: With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it. Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated‐KAZE discrete cosine transform (AKAZE‐DCT) is proposed to address the poor robustness of medical image watermarking algorithms … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…In this experiment, we have considered the cased of 'No Attack', 'Gaussian Noise', 'Histogram Equalization', 'Median Filter', 'Cropping', 'Salt & Pepper', 'Scaling', 'Rotation 15 0 ' and 'Rotation 45 0 . Among them 'Cropping', 'Scaling' and 'Rotation (15 0 & 45 0 )' are in the category of Geometric attacks whereas 'Gaussian Noise', 'Median Filter' and 'Salt & Pepper' are used to add noise signals [12]. The process of Histogram Equalization changes or adjusts the contrast of the images by auto modi cation of the histogram.…”
Section: Simulation and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this experiment, we have considered the cased of 'No Attack', 'Gaussian Noise', 'Histogram Equalization', 'Median Filter', 'Cropping', 'Salt & Pepper', 'Scaling', 'Rotation 15 0 ' and 'Rotation 45 0 . Among them 'Cropping', 'Scaling' and 'Rotation (15 0 & 45 0 )' are in the category of Geometric attacks whereas 'Gaussian Noise', 'Median Filter' and 'Salt & Pepper' are used to add noise signals [12]. The process of Histogram Equalization changes or adjusts the contrast of the images by auto modi cation of the histogram.…”
Section: Simulation and Resultsmentioning
confidence: 99%
“…The logical key is used to extract the encrypted watermark in the process of watermark extraction. The watermark is a binary image and the model is a non-blind method [12]. Narima Zermi et.…”
Section: Introductionmentioning
confidence: 99%
“…The digital watermarking techniques further improve the conventional encryption techniques. It can be considered a technology for hiding information because its invisibility not only hides the patient's data but also won't influence the physician's evaluation of the host image, enhancing the safety of the patient's privacy [1]. With watermarking, specific information called a watermark is added to the host image which can later be extracted to verify its authenticity [2].…”
Section: Introductionmentioning
confidence: 99%
“…It mainly includes the increasing awareness of patients' privacy protection, which leads to the difficulty of acquiring case image data. Multimodal data of diseases are characterized by large span and low density due to a wide variety of diseases and examination methods [16]. The large gap in the number of samples between different types of diseases that need to be identified leads to a decrease in the robustness of the system [17].…”
Section: Introductionmentioning
confidence: 99%