Healthcare Data Analytics and Management 2019
DOI: 10.1016/b978-0-12-815368-0.00011-7
|View full text |Cite
|
Sign up to set email alerts
|

Secure and reversible data hiding scheme for healthcare system using magic rectangle and a new interpolation technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…Fragile watermarking techniques are either reversible or non-reversible, or blind or nonblind. The blind techniques do not need the original medical image (that's why it is suitable for mobile based telemedicine applications), and reversible techniques can produce the original (PMI and PMR) from the watermark cover (8,9). The most important characteristics for these methods are the ability to recover without distortion of the actual PMI, and the tamper proofing added with authentication (8).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Fragile watermarking techniques are either reversible or non-reversible, or blind or nonblind. The blind techniques do not need the original medical image (that's why it is suitable for mobile based telemedicine applications), and reversible techniques can produce the original (PMI and PMR) from the watermark cover (8,9). The most important characteristics for these methods are the ability to recover without distortion of the actual PMI, and the tamper proofing added with authentication (8).…”
Section: Introductionmentioning
confidence: 99%
“…The most important characteristics for these methods are the ability to recover without distortion of the actual PMI, and the tamper proofing added with authentication (8). The purpose of integrity and authentication of PMI and PMR in fragile watermark application is to find and localize a place of tampering (8,9). PMI authentication and recovery capabilities using fragile watermarking include watermark generation and embedding along with tamper localization and some of these methods have PMI self-recovery capabilities (6).…”
Section: Introductionmentioning
confidence: 99%