Tang Y, Li K, Wang C, Bian S, Huang Q (2024) A two-stage robust reversible watermarking using polar harmonic transform for high robustness and capacity. Information Sciences 654:119786. https://doi.org/10.1016/j.ins.2023.119786
Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A RONI Based Visible Watermarking Approach for Medical Image Authentication. J Med Syst 41:143. https://doi.org/10.1007/s10916-017-0795-3
Wei X, Zhang W, Yang B, Wang J, Xia Z (2021) Fragile Watermark in Medical Image Based on Prime Number Distribution Theory. J Digit Imaging 34:1447–1462. https://doi.org/10.1007/s10278-021-00524-4
Article PubMed PubMed Central Google Scholar
Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. Journal of Visual Communication and Image Representation 39:51-57. https://doi.org/10.1016/j.jvcir.2016.05.008
Shehab A, Elhoseny M, Muhammad K, et al (2018) Secure and Robust Fragile Watermarking Scheme for Medical Images. IEEE Access 6:10269-10278. https://doi.org/10.1109/ACCESS.2018.2799240
Huang Z, Feng B, Xiang S (2023) Robust reversible image watermarking scheme based on spread spectrum. Journal of Visual Communication and Image Representation 93:103808. https://doi.org/10.1016/j.jvcir.2023.103808
Eltoukhy MM, Khedr AE, Abdel-Aziz MM, Hosny KM (2023) Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption. Alexandria Engineering Journal 78:517-529. https://doi.org/10.1016/j.aej.2023.07.068
Bouarroudj R, Souami F, Belalla FZ (2023) Reversible Fragile Watermarking for Medical Image Authentication in the Frequency Domain, 2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM), Medea, Algeria, 2023, pp. 1–6. https://doi.org/10.1109/IC2EM59347.2023.10419699
Senol A, Elbasi E, Topcu AE, Mostafa M (2023) A Semi-Fragile, Inner-Outer Block-Based Watermarking Method Using Scrambling and Frequency Domain Algorithms. Electronics 12:1065. https://doi.org/10.3390/electronics12041065
Nguyen TS, Chang CC, Yang XQ (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU - International Journal of Electronics and Communications 70(8):1055-1061. https://doi.org/10.1016/j.aeue.2016.05.003
Begum M, Ferdush J, Uddin MS (2022) A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition. Journal of King Saud University - Computer and Information Sciences 34(8-B):5856-5867. https://doi.org/10.1016/j.jksuci.2021.07.012
Akhtarkavan E, Majidi B, Mandegari A (2023) Secure Medical Image Communication Using Fragile Data Hiding Based on Discrete Wavelet Transform and A₅ Lattice Vector Quantization. IEEE Access 11:9701-9715. https://doi.org/10.1109/ACCESS.2023.3238575
Bouarroudj R, Souami F, Bellala FZ, Zerrouki N (2024) A reversible fragile watermarking technique using fourier transform and Fibonacci Q-matrix for medical image authentication. Biomedical Signal Processing and Control 92:105967. https://doi.org/10.1016/j.bspc.2024.105967
Bhalerao S, Ansari IA, Kumar A (2023) A Reversible Medical Image Watermarking for ROI Tamper Detection and Recovery. Circuits Syst Signal Process 42:6701–6725. https://doi.org/10.1007/s00034-023-02416-0
Pakdaman Z, Nezamabadi-pour H, Saryazdi S (2021) A new reversible data hiding in transform domain. Multimed Tools Appl 80:8931–8955. https://doi.org/10.1007/s11042-020-10058-6
Pal P, Jana B, Bhaumik J (2021) An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting Code. Wireless Pers Commun 121:939– 961. https://doi.org/10.1007/s11277-021-08666-y
Turuk MP, Dhande AP (2016) A Novel Reversible Multiple Medical Image Watermarking for Health Information System. J Med Syst 40:269. https://doi.org/10.1007/s10916-016-0608-0
Article PubMed CAS Google Scholar
Thanki R, Borra S (2019) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimed Tools Appl 78:13905–13924. https://doi.org/10.1007/s11042-018-6746-2
Bouarroudj R, Souami F, Bellala FZ (2023) Fragile watermarking for medical image authentication based on DCT technique. 2023 5th International Conference on Pattern Analysis and Intelligent Systems (PAIS), Sétif, Algeria 1–6. https://doi.org/10.1109/PAIS60821.2023.10322029
Singh D, Udmale SS, Singh SK (2023) Integer wavelet transform based an effective fragile watermarking scheme for exact authentication and restoration. J Ambient Intell Human Comput 14:4841–4852. https://doi.org/10.1007/s12652-022-04369-9
Wu HC, Fan WL, Tsai CS, Ying JJC (2022) An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks. Multimed Tools Appl 81:19351–19375. https://doi.org/10.1007/s11042-021-11018-4
Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. Journal of Visual Communication and Image Representation 30:312-327. https://doi.org/10.1016/j.jvcir.2015.05.006
Sivasubramanian N, Konganathan G (2020) A novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT. Computing 102:1365–1384. https://doi.org/10.1007/s00607-020-00797-7
Roček A, Slavíček K, Dostál O, Javorník M (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomedical Signal Processing and Control 29:44-52. https://doi.org/10.1016/j.bspc.2016.05.005
Mantos PLK, Maglogiannis I (2016) Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images. J Med Syst 40:156. https://doi.org/10.1007/s10916-016-0514-5
Qasim AF, Meziane F, Aspin R (2017) Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Computer Science Review 27:45-60. https://doi.org/10.1016/j.cosrev.2017.11.003
Mohsin AH, Zaidan AA, Zaidan BB et al (2018) Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review. J Med Syst 42:245. https://doi.org/10.1007/s10916-018-1103-6
Article PubMed CAS Google Scholar
Anand A, Singh AK (2021) Watermarking techniques for medical data authentication: a survey. Multimed Tools Appl 80: 30165–30197. https://doi.org/10.1007/s11042-020-08801-0
Li Z, Zhang H, Liu X, Wang C, Wang X (2021) Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT. Digital Signal Processing 15:103062. https://doi.org/10.1016/j.dsp.2021.103062
Xia Z, Wang C, Ma B, et al (2023) Geometric attacks resistant double zero-watermarking using discrete Fourier transform and fractional-order Exponent-Fourier moments. Digital Signal Processing 140:104097. https://doi.org/10.1016/j.dsp.2023.104097
Cao H, Hu F, Sun Y, Chen S, Su Q (2022) Robust and reversible color image watermarking based on DFT in the spatial domain. Optik 262:169319. https://doi.org/10.1016/j.ijleo.2022.169319
Li C, Chen G (2004) Chaos in the fractional order Chen system and its control. Chaos, Solitons & Fractals 22(3):549-554. https://doi.org/10.1016/j.chaos.2004.02.035
Huang X, Liu L, Li X, Yu M, Wu Z (2019) A New Pseudorandom Bit Generator Based on Mixing Three-Dimensional Chen Chaotic System with a Chaotic Tactics. Complexity 9:6567198. https://doi.org/10.1155/2019/6567198
Albertina B, Watson M, Holback C, et al (2016) Radiology Data from The Cancer Genome Atlas Lung Adenocarcinoma [TCGA-LUAD] collection. The Cancer Imaging Archive. https://doi.org/10.7937/K9/TCIA.2016.JGNIHEP5
Hany M (2020) Chest CT-Scan images Dataset, Kaggle. https://www.kaggle.com/datasets/mohamedhanyyy/chest-ctscan-images
Nickparvar M (2021) Brain Tumor MRI Dataset, Kaggle. https://doi.org/10.34740/kaggle/dsv/2645886
Chowdhury M, Rahman T, Khandakar A, et al (2020) Can AI Help in Screening Viral and COVID-19 Pneumonia?. IEEE Access 8:132665-132676. https://doi.org/10.1109/ACCESS.2020.3010287
Zukal M, Benes R, Cika P, Riha K (2012) Ultrasound image database, Signal processing laboratory. http://splab.cz/en/download/databaze/ultrasound
Linde Y, Buzo A, Gray R (1980) An Algorithm for Vector Quantizer Design. IEEE Transactions on Communications, 28(1):84-95. https://doi.org/10.1109/TCOM.1980.1094577
Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the yeung-mintzer fragile watermarking technique. Journal of Electronic Imaging 11(2):262–275. https://doi.org/10.1117/1.1459449
留言 (0)