Watermarking techniques used in medical images: a survey
The ever-growing numbers of medical digital images and the need to share them among
specialists and hospitals for better and more accurate diagnosis require that patients' privacy …
specialists and hospitals for better and more accurate diagnosis require that patients' privacy …
RETRACTED ARTICLE: Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital …
Digital watermarking is a technique that provides security and authentication for digital
image transmission. In general, patient reports are stored in the form of a medical image. A …
image transmission. In general, patient reports are stored in the form of a medical image. A …
Watermarking and encryption for holographic communication
Holographic communication is a three-dimensional (3D) video communication technology
based on computer-generated holograms (CGHs) which has the potential to give users a …
based on computer-generated holograms (CGHs) which has the potential to give users a …
[PDF][PDF] Performance comparison of single and multiple watermarking techniques
M Natarajan, Y Govindarajan - International Journal of Computer …, 2014 - mecs-press.org
The present work compares single and multiple watermarking by using discrete wavelet
transform and different embedding methods. The different embedding methods are additive …
transform and different embedding methods. The different embedding methods are additive …
[PDF][PDF] A comparative study of image-in-image steganography using three methods of least significant bit, discrete wavelet transform and singular value decomposition
MS Goli, A Naghsh - Bulletin de la Société Royale des Sciences …, 2016 - popups.uliege.be
Today, with the growth in application of communication equipment as well as the use of
Internet for information exchange, the need for data security and protection is felt more than …
Internet for information exchange, the need for data security and protection is felt more than …
[PDF][PDF] Introducing a new method of robust digital image watermarking against crop** and salt & pepper noise using Sudoku
S Saneie, A Naghsh - Majlesi Journal of Multimedia Processing, 2015 - research.iaun.ac.ir
With rapid development of digital technology, protecting information such as copyright,
content ownership confirmation has become more important. In image watermarking …
content ownership confirmation has become more important. In image watermarking …
On secure image transmission combining chaotic encryption and watermarking using dead beat synchronization of 4D Henon maps
N Khalifa, RL Filali, M Benrejeb - 2015 3rd International …, 2015 - ieeexplore.ieee.org
In this paper, the main idea of the proposed method is to build a secure image transmission
combining watermarking and encryption techniques. From one hand, it consists of an image …
combining watermarking and encryption techniques. From one hand, it consists of an image …
[PDF][PDF] Conceptual framework for twenty-first century learning: Develo** computing and computational thinking
N Usta, S Mirasyedioglu - … Journal of Innovation and Research in …, 2021 - researchgate.net
This study aims to focus on the basic components of computational thinking (CT) and to
investigate its relationship with competencies/skills in the 21st century and establish new …
investigate its relationship with competencies/skills in the 21st century and establish new …
A new image watermarking technique based on periodic plus smooth decomposition (PPSD)
N Aherrahrou, H Tairi - Soft Computing, 2018 - Springer
Robustness against geometric distortion is one of the crucial important issues in
watermarking. The discrete Fourier transform (DFT)-based watermarking methods have …
watermarking. The discrete Fourier transform (DFT)-based watermarking methods have …
Adaptive image watermarking using bidimensional empirical mode decomposition
Digital watermarking is considered one of the technological means used to guarantee the
security and authenticity of data transmitted over communication systems. A new method of …
security and authenticity of data transmitted over communication systems. A new method of …