Aparna et al., 2019 - Google Patents
A blind medical image watermarking for secure e-healthcare application using crypto-watermarking systemAparna et al., 2019
View HTML- Document ID
- 3347859800662368681
- Author
- Aparna P
- Kishore P
- Publication year
- Publication venue
- Journal of Intelligent Systems
External Links
Snippet
A reliable medical image management must provide proper security for patient information. Protecting the medical information of the patients is a major concern in all hospitals. Digital watermarking is a procedure prevalently used to secure the confidentiality of medical …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Aparna et al. | A blind medical image watermarking for secure e-healthcare application using crypto-watermarking system | |
| Younus et al. | Video steganography using knight tour algorithm and LSB method for encrypted data | |
| Ray et al. | Recent trends in image watermarking techniques for copyright protection: a survey | |
| Tang et al. | Reversible data hiding with differential compression in encrypted image | |
| Bourouis et al. | Recent advances in digital multimedia tampering detection for forensics analysis | |
| Aparna et al. | An efficient medical image watermarking technique in E-healthcare application using hybridization of compression and cryptography algorithm | |
| Pan et al. | A video coverless information hiding algorithm based on semantic segmentation | |
| AL-Hashemy et al. | A new algorithm based on magic square and a novel chaotic system for image encryption | |
| Shamia et al. | A secure framework for medical image by integrating watermarking and encryption through fuzzy based roi selection | |
| Shankar et al. | Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization | |
| Rehman et al. | Leveraging coverless image steganography to hide secret information by generating anime characters using GAN | |
| Jiang et al. | Perceptual image hashing based on a deep convolution neural network for content authentication | |
| Arunkumar et al. | RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices | |
| Li et al. | Coverless image steganography using morphed face recognition based on convolutional neural network | |
| Deeba et al. | Digital image watermarking based on ANN and least significant bit | |
| Liu et al. | A novel watermarking algorithm for three-dimensional point-cloud models based on vertex curvature | |
| Wu et al. | An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks | |
| Kumar et al. | Studies on steganography images and videos using deep learning techniques | |
| Pilania et al. | An ROI-based robust video steganography technique using SVD in wavelet domain | |
| Selvaraj et al. | Whirlpool algorithm with hash function based watermarking algorithm for the secured transmission of digital medical images | |
| Shankar et al. | Moderate embed cross validated and feature reduced Steganalysis using principal component analysis in spatial and transform domain with Support Vector Machine and Support Vector Machine-Particle Swarm Optimization | |
| Xing et al. | Image perceptual hashing for content authentication based on Watson’s visual model and LLE | |
| Yang et al. | Color image steganalysis based on embedding change probabilities in differential channels | |
| Nadgauda et al. | StegaNet: a deep learning model for image steganography using customized CNN and autoencoders | |
| Ramyashree et al. | Optimal information hiding: advanced bitstream‐based watermarking for secure and efficient integration of image data in digital videos |