Watermarking techniques for medical data authentication: a survey

A Anand, AK Singh - Multimedia Tools and Applications, 2021 - Springer
With the widespread growth of medical images and improved communication and computer
technologies in recent years, authenticity of the images has been a serious issue for E …

Secure and robust fragile watermarking scheme for medical images

A Shehab, M Elhoseny, K Muhammad… - IEEE …, 2018 - ieeexplore.ieee.org
Due to the advances in computer-based communication and health services over the past
decade, the need for image security becomes urgent to address the requirements of both …

Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications

S Thakur, AK Singh, SP Ghrera, M Elhoseny - Multimedia tools and …, 2019 - Springer
In this paper, we present a robust and secure watermarking approach using transform
domain techniques for tele-health applications. The patient report/identity is embedding into …

Survey of robust and imperceptible watermarking

N Agarwal, AK Singh, PK Singh - Multimedia Tools and Applications, 2019 - Springer
Robustness, imperceptibility and embedding capacity are the preliminary requirements of
any watermarking technique. However, research concluded that these requirements are …

Chaotic based secure watermarking approach for medical images

S Thakur, AK Singh, SP Ghrera, A Mohan - Multimedia Tools and …, 2020 - Springer
In this paper, a chaotic based secure medical image watermarking approach is proposed.
The method is using non sub-sampled contourlet transform (NSCT), redundant discrete …

Blind robust image watermarking based on adaptive embedding strength and distribution of quantified coefficients

L Rakhmawati, W Wirawan, S Suwadi, C Delpha… - Expert Systems with …, 2022 - Elsevier
The image watermarking technique is a reliable method for protecting digital image rights.
The most widely used digital imaging format is the JPEG (joint photographic expert's group) …

Fragile watermarking schemes for image authentication: a survey

K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …

A novel color image tampering detection and self-recovery based on fragile watermarking

X Xia, S Zhang, K Wang, T Gao - Journal of Information Security and …, 2023 - Elsevier
In industrial applications, sensing devices' image data must be accurately identified and
recovered to prevent economic losses. Nevertheless, most industrial image watermarking …

Effective self-recovery and tampering localization fragile watermarking for medical images

GD Su, CC Chang, CC Lin - IEEE Access, 2020 - ieeexplore.ieee.org
It is increasingly important to achieve security and anti-counterfeiting for medical images.
The integrity and verifiability of medical images before they are reviewed for potential …

An enhanced fragile watermarking scheme to digital image protection and self-recovery

MQ Fan, HX Wang - Signal Processing: Image Communication, 2018 - Elsevier
Abstract Recently, Sarreshtedari and Akhaee proposed a source-channel coding approach
to digital image protection and self-recovery. This scheme is based on set partitioning in …