Multi-watermarking algorithm for medical image based on KAZE-DCT
With the wide application of digital watermarking technology in the field of medical imaging,
the security of medical image information has been improved. Aiming at the problem of poor …
the security of medical image information has been improved. Aiming at the problem of poor …
Application of robust zero-watermarking scheme based on federated learning for securing the healthcare data
B Han, RH Jhaveri, H Wang, D Qiao… - IEEE journal of …, 2021 - ieeexplore.ieee.org
The privacy protection and data security problems existing in the healthcare framework
based on the Internet of Medical Things (IoMT) have always attracted much attention and …
based on the Internet of Medical Things (IoMT) have always attracted much attention and …
Robust zero-watermarking algorithm for medical images based on SIFT and Bandelet-DCT
The gradual improvement of traditional medicare in the cloud has greatly promoted the
development of medical enterprise. Meanwhile, problems such as the leakage of patients' …
development of medical enterprise. Meanwhile, problems such as the leakage of patients' …
A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images
M Nazari, M Mehrabian - Multimedia Tools and Applications, 2021 - Springer
Nowadays, secure medical data transmission is an essential issue in telemedicine through
unsecured channels. Watermarking methods are widely used to provide optimal security for …
unsecured channels. Watermarking methods are widely used to provide optimal security for …
A robust zero-watermarking algorithm for lossless copyright protection of medical images
The continuous orthogonal moments of images have become a main tool used in zero-
watermarking algorithms in recent years. However, there is a problem that should not be …
watermarking algorithms in recent years. However, there is a problem that should not be …
A reversible-zero watermarking scheme for medical images
R Taj, F Tao, S Kanwal, A Almogren, A Altameem… - Scientific Reports, 2024 - nature.com
The paper addresses the issue of ensuring the authenticity and copyright of medical images
in telemedicine applications, with a specific emphasis on watermarking methods. While …
in telemedicine applications, with a specific emphasis on watermarking methods. While …
Robust zero-watermarking of color medical images using multi-channel Gaussian-Hermite moments and 1D Chebyshev chaotic map
Copyright protection of medical images is a vital goal in the era of smart healthcare systems.
In recent telemedicine applications, medical images are sensed using medical imaging …
In recent telemedicine applications, medical images are sensed using medical imaging …
Robust zero-watermarking scheme based on a depthwise overparameterized VGG network in healthcare information security
T Huang, J Xu, S Tu, B Han - Biomedical Signal Processing and Control, 2023 - Elsevier
As healthcare information technology has rapidly evolved, securely storing and transmitting
medical data online and successfully protecting patient privacy are currently the research …
medical data online and successfully protecting patient privacy are currently the research …
Robust zero-watermarking algorithm for medical images using double-tree complex wavelet transform and Hessenberg decomposition
T Huang, J Xu, Y Yang, B Han - Mathematics, 2022 - mdpi.com
With the rapid development of smart medical care, copyright security for medical images is
becoming increasingly important. To improve medical images storage and transmission …
becoming increasingly important. To improve medical images storage and transmission …
Improving the management of medical imaging by using robust and secure dual watermarking
M Cedillo-Hernandez, A Cedillo-Hernandez… - … Signal Processing and …, 2020 - Elsevier
Nowadays, the management of medical imaging could be affected by several issues related
to information security. Among others, a critical issue is related to information authentication …
to information security. Among others, a critical issue is related to information authentication …