References
- A. Giakoumaki, S, Pavlopoulus, D. Koutsouris, "Multiple Watermarking applied to Health Information Management," IEEE Transactions on Information Technology in Biomedicine, Vol.10, No.4, pp.722-732, 2006. https://doi.org/10.1109/TITB.2006.875655
- F. Y. Shih, and Y.-T. Wu, "Robust Watermarking and Compression for Medical Images based on Genetic Algorithms," International Journal of Information Sciences, Vol.175, No.3, pp.200-216, 2005. https://doi.org/10.1016/j.ins.2005.01.013
- M. Lia, R. Poovendrana, and S. Narayananb, "Protecting Patient Privacy against Unauthorized Release of Medical Images in a Group Communication Environment," International Journal of Computerized Medical Imaging and Graphics, Vol.29, No.5, pp.367-383, 2005. https://doi.org/10.1016/j.compmedimag.2005.02.003
- R. Acharya U.P. S. Bhatb, S. Kumar, and L. C. Mina, "Transmission and Storage of Medical Images with Patient Information," International Journal of Computers in Biology and Medicine, Vol.33, No.4, pp.303-310, 2002.
- G. Coatrieux, L. Lecornu, B.Sankur, Ch. Roux, "A Review of Image Watermarking Applications in Healthcare," in 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vol.8, pp.4691-4694, 2006.
- G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, and R. Collorec, "Relevance of Watermarking in Medical Imaging," in IEEE EMBS International Conference on Information Technology Applications in Biomedicine, pp.250-255, 2000.
- V.S. Jabade and S.R. Gengaje, "Literature Review of Wavelet Based Digital Image Watermarking Techniques," International Journal of Computer Applications, Vol.31, No.1, pp.28-35, 2011. https://doi.org/10.5120/3790-5218
- O.M. Al-Qershi and B.E. Khoo, "ROI-based Tamper Detection and Recovery for Medical Images using Reversible Watermarking Technique," in IEEE International Conference on Information Theory and Information Security (ICITIS), pp.151-155, 2010.
- H. M. Chao, C. M. Hsu, and S. G. Miaou, "A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records," IEEE Transaction on Information Technology on Biomedicine, Vol.6, No.1, pp.46-53, 2002. https://doi.org/10.1109/4233.992161
- X. Q. Zhou, H. K. Huang, and S. L. Lou, "Authenticity and Integrity of Digital Mammography Images," IEEE Transaction on Medical Imaging, Vol.20, No.8, pp.784-791, 2001. https://doi.org/10.1109/42.938246
- A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, "A Medical Image Watermarking Scheme based on Wavelet Transform," in Proceedings of the 25th Annual International Conference of the IEEE EMBS, pp.856-859, 2003.
- S. Amirgholipour and A.R. Naghsh-Nilchi, "Robust Digital Image Watermarking Based on Joint DWT-DCT," International Journal on Digital Content Technology and its Applications, Vol.3, No.2, pp.3531-3546, 2009.
- J. Wu and J. Xie, "Adaptive Image Watermarking Scheme based on HVS and Fuzzy Clustering Theory," in International Conference on Neural Networks and Signal Processing, Vol.2, pp.1493-1496, 2003.
- N. ALamgir, M. Kang, Y. K. Kwon, C. H. Kim, and J. M. Kim, "A Hybrid Technique for Medical Image Segmentation," Journal of Biomedicine and Biotechnology, vol. 2012, Article ID 830252, 7 pages, 2012.
- B. Ganeshan, K. A. Miles, R.C. Young, C. R. Chatwin, H. M. D. Gurling, and H. D. Critchley, "Three-Dimensional Textural Analysis of Brain Images Reveals Distributed Gray-Matter Abnormalities in Schizophrenia," Eur Radiol, pp.941-949, 2010.
- M. J. Shensa, "The Discrete Wavelet Transform: Wedding the Trous and Mallat Algorithms," IEEE Trans. Signal Processing, Vol.40, No.10, pp.2464-2482, 1993.
- G. Strang, "The Discrete Cosine Transform," J. Acoustical Society of America, Vol.41, No.1, pp.135-147, 1999.
- J. C. Bezdek, J. Keller, R. Krisnapuram, and N. Pal, "Fuzzy Models and Algorithms for Pattern Recognition and Image Processing," Springer, 2005.
- S. Voloshynovskiy, S. Pereira, T. Pun, J.J. Eggers, and J.K. Su, "Attacks and Benchmarking," IEEE Communication Magazine, Vol.39, No.8, 11 pages, 2001.
Cited by
- A GPU-based (8, 4) Hamming decoder for secure transmission of watermarked medical images vol.18, pp.1, 2015, https://doi.org/10.1007/s10586-014-0392-x