Aparna et al., 2019 - Google Patents

A blind medical image watermarking for secure e-healthcare application using crypto-watermarking system

Aparna et al., 2019

View HTML
Document ID
3347859800662368681
Author
Aparna P
Kishore P
Publication year
Publication venue
Journal of Intelligent Systems

External Links

Snippet

A reliable medical image management must provide proper security for patient information. Protecting the medical information of the patients is a major concern in all hospitals. Digital watermarking is a procedure prevalently used to secure the confidentiality of medical …
Continue reading at www.degruyterbrill.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30244Information retrieval; Database structures therefor; File system structures therefor in image databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS

Similar Documents

Publication Publication Date Title
Aparna et al. A blind medical image watermarking for secure e-healthcare application using crypto-watermarking system
Younus et al. Video steganography using knight tour algorithm and LSB method for encrypted data
Ray et al. Recent trends in image watermarking techniques for copyright protection: a survey
Tang et al. Reversible data hiding with differential compression in encrypted image
Bourouis et al. Recent advances in digital multimedia tampering detection for forensics analysis
Aparna et al. An efficient medical image watermarking technique in E-healthcare application using hybridization of compression and cryptography algorithm
Pan et al. A video coverless information hiding algorithm based on semantic segmentation
AL-Hashemy et al. A new algorithm based on magic square and a novel chaotic system for image encryption
Shamia et al. A secure framework for medical image by integrating watermarking and encryption through fuzzy based roi selection
Shankar et al. Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization
Rehman et al. Leveraging coverless image steganography to hide secret information by generating anime characters using GAN
Jiang et al. Perceptual image hashing based on a deep convolution neural network for content authentication
Arunkumar et al. RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices
Li et al. Coverless image steganography using morphed face recognition based on convolutional neural network
Deeba et al. Digital image watermarking based on ANN and least significant bit
Liu et al. A novel watermarking algorithm for three-dimensional point-cloud models based on vertex curvature
Wu et al. An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks
Kumar et al. Studies on steganography images and videos using deep learning techniques
Pilania et al. An ROI-based robust video steganography technique using SVD in wavelet domain
Selvaraj et al. Whirlpool algorithm with hash function based watermarking algorithm for the secured transmission of digital medical images
Shankar et al. Moderate embed cross validated and feature reduced Steganalysis using principal component analysis in spatial and transform domain with Support Vector Machine and Support Vector Machine-Particle Swarm Optimization
Xing et al. Image perceptual hashing for content authentication based on Watson’s visual model and LLE
Yang et al. Color image steganalysis based on embedding change probabilities in differential channels
Nadgauda et al. StegaNet: a deep learning model for image steganography using customized CNN and autoencoders
Ramyashree et al. Optimal information hiding: advanced bitstream‐based watermarking for secure and efficient integration of image data in digital videos