2014
DOI: 10.1007/s10278-014-9700-5
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking Techniques used in Medical Images: a Survey

Abstract: The ever-growing numbers of medical digital images and the need to share them among specialists and hospitals for better and more accurate diagnosis require that patients' privacy be protected. As a result of this, there is a need for medical image watermarking (MIW). However, MIW needs to be performed with special care for two reasons. Firstly, the watermarking procedure cannot compromise the quality of the image. Secondly, confidential patient information embedded within the image should be flawlessly retrie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
94
0
4

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 174 publications
(98 citation statements)
references
References 74 publications
0
94
0
4
Order By: Relevance
“…On the other hand, transform domains are proven to be more robust toward different attacks (Mousavi et al 2014), and singular value decomposition (SVD)-based watermarking is one of the most powerful watermarking schemes in this domain. The robust performance of existing SVD-based watermarking methods is not always better than that of frequency-based methods such as Gaussian filtering and noising (Tsai et al 2012) for most of attacks (Chang et al 2005) developed in the spatial domain.…”
Section: Watermarking Schemes Addressing the Current Issuesmentioning
confidence: 99%
“…On the other hand, transform domains are proven to be more robust toward different attacks (Mousavi et al 2014), and singular value decomposition (SVD)-based watermarking is one of the most powerful watermarking schemes in this domain. The robust performance of existing SVD-based watermarking methods is not always better than that of frequency-based methods such as Gaussian filtering and noising (Tsai et al 2012) for most of attacks (Chang et al 2005) developed in the spatial domain.…”
Section: Watermarking Schemes Addressing the Current Issuesmentioning
confidence: 99%
“…The integrity and authenticity of digital images cannot be guaranteed. To resolve this issue, many schemes have been proposed including digital signature [1] and digital watermarking [2,3]. The authentication algorithm based on digital signature attaches a signature to the data, which is usually a hash code about the image or its characteristics.…”
Section: Introductionmentioning
confidence: 99%
“…The transform domain involves discrete Fourier transform (DFT), discrete cosine transform (DCT), and discrete wavelet transform (DWT), etc. Many related watermarking schemes have been proposed [3]. In recent years, the watermarking scheme, which is based on singular value decomposition (SVD), became a hot area during the watermarking procedures.…”
Section: Introductionmentioning
confidence: 99%