A review of medical image watermarking requirements for teleradiology

H Nyeem, W Boles, C Boyd - Journal of digital imaging, 2013 - Springer
Teleradiology allows medical images to be transmitted over electronic networks for clinical
interpretation and for improved healthcare access, delivery, and standards. Although such …

Digital image watermarking: its formal model, fundamental properties and possible attacks

H Nyeem, W Boles, C Boyd - EURASIP Journal on Advances in Signal …, 2014 - Springer
While formal definitions and security proofs are well established in some fields like
cryptography and steganography, they are not as evident in digital watermarking research. A …

High capacity reversible data hiding with interpolation and adaptive embedding

MA Wahed, H Nyeem - PloS one, 2019 - journals.plos.org
A new Interpolation based Reversible Data Hiding (IRDH) scheme is reported in this paper.
For different applications of an IRDH scheme to the digital image, video, multimedia, big …

Utilizing least significant bit-planes of RONI pixels for medical image watermarking

H Nyeem, W Boles, C Boyd - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
We propose a computationally efficient image border pixel based watermark embedding
scheme for medical images. We considered the border pixels of a medical image as RONI …

On the robustness and security of digital image watermarking

H Nyeem, W Boles, C Boyd - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
In most of the digital image watermarking schemes, it becomes a common practice to
address security in terms of robustness, which is basically a norm in cryptography. Such …

Content-independent embedding scheme for multi-modal medical image watermarking

H Nyeem, W Boles, C Boyd - Biomedical engineering online, 2015 - Springer
Background As the increasing adoption of information technology continues to offer better
distant medical services, the distribution of, and remote access to digital medical images …

Capacity enlargement of the PVD steganography method using the GLM technique

M Safarpour, M Charmi - arXiv preprint arXiv:1601.00299, 2016 - arxiv.org
In most steganographic methods, increasing in the capacity leads to decrease in the quality
of the stego-image, so in this paper, we propose to combine two existing techniques, Pixel …

Counterfeiting attacks on block-wise dependent fragile watermarking schemes

H Nyeem, W Boles, C Boyd - … of the 6th International Conference on …, 2013 - dl.acm.org
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile
watermarking schemes. We consider vulnerabilities such as the exploitation of a weak …

AAdhar based smartcard system for security management in South Asia

KN Mishra - 2016 International Conference on Control …, 2016 - ieeexplore.ieee.org
Recently biometrics is merged into digitization technology to improve the credibility of the
conventional watermarking techniques. The access control and authenticity verification have …

Унифицированная модель систем встраивания информации в цифровые сигналы

ВА Федосеев - Компьютерная оптика, 2016 - cyberleninka.ru
В работе предложена модель унифицированного описания стеганографических
систем и систем встраивания цифровых водяных знаков, основанная на разделении …