References
- M. Abo-Zahhad, S. M. Ahmed and O. Elnahas, "A wireless emergency telemedicine system for patients monitoring and diagnosis," International Journal of Telemedicine and Applications, vol. 2014, pp. 1-11, 2014.
- Y. C. Weng and S.L. Hsieh, "Design and implementation of a web-based medical drawing management system," Journal of Intelligent Information Systems, vol. 49, no. 3, pp. 391-405, 2017. https://doi.org/10.1007/s10844-017-0452-9
- T. Y. Fan, B. C. Chieu and H. C. Chao, "Robust copyright-protection scheme based on visual secret sharing and Bose-Chaudhuri-Hocquenghem code techniques," Journal of Electronic Imaging, vol. 21, no. 4, pp. 043018, 2012. https://doi.org/10.1117/1.JEI.21.4.043018
- M. P. Turuk and A. P. Dhande, "A novel reversible multiple medical image watermarking for health information system," Journal of Medical Systems, vol. 40, pp. 269, 2016. https://doi.org/10.1007/s10916-016-0608-0
- H. Nyeem, W. Boles and C. Boyd, "A review of medical image watermarking requirements for teleradiology," Journal of Digital Imaging, vol. 26, no. 2, pp. 326-343, 2013. https://doi.org/10.1007/s10278-012-9527-x
- S. A. Parah, F. Ahad, J. A. Sheikh and G. M. Bhat, "Hiding clinical information in medical images: a new high capacity and reversible data hiding technique," Journal of Biomedical Informatics, vol. 66, pp. 214-230, 2017. https://doi.org/10.1016/j.jbi.2017.01.006
- R. G. van Schyndel, A. Z. Tirkel and C. F. Osborne, "A digital watermark," in Proc. IEEE Int. Conf. Image Process., vol. 2, pp. 86-90, 1994.
- C. C. Chang and P. Y. Lin, "Adaptive watermark mechanism for rightful ownership protection," Journal of Systems and Software, vol. 81, no. 7, pp. 1118-1129, 2008. https://doi.org/10.1016/j.jss.2007.07.036
- V. Solachidis and I. Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain," IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1741-1753, 2011.
- I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997. https://doi.org/10.1109/83.650120
- X. G. Xia, C. G. Boncelet and G. R. Arce, "A multiresolution watermark for digital images," in Proc. IEEE Int. Conf. Image Process., vol. 1, pp. 548-551, 1997.
- O. Lafe, Cellular Automata Transforms: Theory and Applications in Multimedia Compression, Encryption and Modeling, Kluwer Academic Publishers, Norwell, MA, 2000.
- R. J. Chen, C. F. Tai and J. L. Lai, "Novel CAT Wavelets-based image coding system," in Proc. IEEE Int. Symp. Consum. Electron., pp. 1-6, 2007.
- Z. Eslami, S. H. Razzaghi and J. Z. Ahmadabadi, "Secret image sharing based on cellular automata and steganography," Pattern Recognition, vol. 43, no. 1, pp. 397-404, 2010. https://doi.org/10.1016/j.patcog.2009.06.007
- R. Shiba, S. Kang and Y. Aoki, "An image watermarking technique using cellular automata transform," in TENCON 2004. 2004 IEEE Region 10 Conf., pp. 303-306, 2004.
- X. W. Li, S. J. Cho and S. T. Kim, "2-D CAT-based medical image watermarking algorithm," International Journal of Computer Theory and Engineering, vol. 4, no. 5, pp. 722-725, 2012.
- X. W. Li, S. T. Kim and I. K. Lee, "3D image copyright protection based on cellular automata transform and direct smart pixel mapping," Optics Communications, vol. 329, pp. 92-102, 2014. https://doi.org/10.1016/j.optcom.2014.05.006
- M. Sung, X. Li and I. K. Lee, "Visual perception based robust watermarking with integral imaging," Optik-International Journal for Light and Electron Optics, vol. 127, no. 24, pp. 11828-11839, 2016. https://doi.org/10.1016/j.ijleo.2016.09.098
- W. H. Lin, S. J. Horng, T. W. Kao, P. Fan, C. L. Lee and Y. Pan, "An efficient watermarking method based on significant difference of wavelet coefficient quantization," IEEE Transactions on Multimedia, vol. 10, no. 5, pp. 746-757, 2008. https://doi.org/10.1109/TMM.2008.922795
- S. A. Parah, J. A. Sheikh, N. A. Loan and G. M. Bhat, "Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing," Digital Signal Processing, vol. 53, pp. 11-24, 2016. https://doi.org/10.1016/j.dsp.2016.02.005
- C. Kavitha and S. Sakthivel, "An effective mechanism for medical images authentication using quick response code," Cluster Computing, pp. 1-8, 2018.
- F. Rahimi and H. Rabbani, "A dual adaptive watermarking scheme in contourlet domain for DICOM images," Biomedical Engineering Online, vol. 10, no. 1, pp. 53, 2011. https://doi.org/10.1186/1475-925X-10-53
- M. Cedillo-Hernandez, F. Garcia-Ugalde, M. Nakano-Miyatake and H. Perez-Meana, "Robust watermarking method in DFT domain for effective management of medical imaging," Signal, Image and Video Processing, vol. 9, no. 5, pp. 1163-1178, 2015. https://doi.org/10.1007/s11760-013-0555-x
- M. S. Wang and W. C. Chen, "Robust copyright protection scheme based on discrete cosine transform and secret sharing techniques," Journal of Electronic Imaging, vol. 17, no. 2, pp. 023006, 2008. https://doi.org/10.1117/1.2912065
- S. Rawat and B. Raman, "A blind watermarking algorithm based on fractional Fourier transform and visual cryptography," Signal Processing, vol. 92, no. 6, pp. 1480-1491, 2012. https://doi.org/10.1016/j.sigpro.2011.12.006
- T. M. Thanh and K. Tanaka, "An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information," Multimedia Tools and Applications, vol. 76, no. 11, pp. 13455-13471, 2017. https://doi.org/10.1007/s11042-016-3750-2
- T. Amiri and M. E. Moghaddam, "A new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover images," Multimedia Tools and Applications, vol. 75, no. 14, pp. 8527-8543, 2016. https://doi.org/10.1007/s11042-015-2770-7
- J. Dong and J. Li, "A robust zero-watermarking algorithm for encrypted medical images in the DWT-DFT encrypted domain," in Innov. in Med. Healthc., pp. 197-208, 2016.
- Z. Shao, Y. Shang, R. Zeng, H. Shu, G. Coatrieux and J. Wu, "Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography," Signal Processing: Image Communication, vol. 48, pp. 12-21, 2016. https://doi.org/10.1016/j.image.2016.09.001
- X. Wu and W. Sun, "Robust copyright protection scheme for digital images using overlapping DCT and SVD," Applied Soft Computing, vol. 13, no. 2, pp. 1170-1182, 2013. https://doi.org/10.1016/j.asoc.2012.09.028
- M. Naor and A. Shamir, "Visual cryptography," in Advances in Cryptology-EuroCrypt94, Lect. Notes in Comput. Sci., vol. 950, pp. 1-12, 1995.
- H. C. Chao and T. Y. Fan, "XOR-based progressive visual secret sharing using generalized random grids," Displays, vol. 49, pp. 6-15, 2017. https://doi.org/10.1016/j.displa.2017.05.004
- G. Voyatzis and I. Pitas, "Digital image watermarking using mixing systems," Computer & Graphics, vol. 22, no. 4, pp. 405-416, 1998. https://doi.org/10.1016/S0097-8493(98)00030-2