메뉴 건너뛰기




Volumn 5275, Issue , 2004, Pages 383-390

Embedded importance watermarking for image verification in radiology

Author keywords

Diagnosis; Fractures; Tumor; Watermarking

Indexed keywords

ALGORITHMS; BIOTECHNOLOGY; CRYPTOGRAPHY; DIAGNOSIS; FRACTURE; IMAGE QUALITY; OPTIMIZATION; QUALITY CONTROL; RADIOLOGY; STANDARDS; TUMORS; WATERMARKING;

EID: 2442457618     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.527308     Document Type: Conference Paper
Times cited : (4)

References (17)
  • 1
    • 0031150291 scopus 로고    scopus 로고
    • Medical image compression with lossless regions of interest
    • J. Strom and P. Cosman, "Medical image compression with lossless regions of interest," Signal Processing 3, pp. 155-171, 1997.
    • (1997) Signal Processing , vol.3 , pp. 155-171
    • Strom, J.1    Cosman, P.2
  • 3
    • 0026142897 scopus 로고
    • The JPEG still picture compression standard
    • April
    • G. K. Wallace, "The JPEG still picture compression standard," Communications of the ACM 34, pp. 30-45, April 1991.
    • (1991) Communications of the ACM , vol.34 , pp. 30-45
    • Wallace, G.K.1
  • 6
    • 0033879938 scopus 로고    scopus 로고
    • Image quality assessment based on a degradation model
    • April
    • N. D.-V. et al, "Image quality assessment based on a degradation model," IEEE Transactions on Image Processing 9, pp. 636-650, April 2000.
    • (2000) IEEE Transactions on Image Processing , vol.9 , pp. 636-650
    • D.-V., N.1
  • 7
    • 85076881189 scopus 로고
    • The visible differences predictor: An algorithm for the assessment of image fidelity
    • Febuary
    • S. Daly, "The visible differences predictor: an algorithm for the assessment of image fidelity," in Proceedings of the SPIE Conference on Human Vision, 1666, pp. 2-15, Febuary 1992.
    • (1992) Proceedings of the SPIE Conference on Human Vision , vol.1666 , pp. 2-15
    • Daly, S.1
  • 8
    • 0029734456 scopus 로고
    • A model of perceptual image fidelity
    • October
    • P. Teo and D. Heeger, "A model of perceptual image fidelity," in Proceedings of the ICIP, 2, pp. 343-345, October 1995.
    • (1995) Proceedings of the ICIP , vol.2 , pp. 343-345
    • Teo, P.1    Heeger, D.2
  • 9
    • 18344410077 scopus 로고    scopus 로고
    • Blind image quality assessment
    • D.V. Department and S.L. of America, September
    • X. Li, D. V. Department, and S. L. of America, "Blind image quality assessment," IEEE International Conference on Image Processing (ICIP) 1, pp. 449-452, September 2002.
    • (2002) IEEE International Conference on Image Processing (ICIP) , vol.1 , pp. 449-452
    • Li, X.1
  • 11
    • 0000525637 scopus 로고    scopus 로고
    • Watermarking medical images with patient information
    • (Hong Kong), October
    • D. Anand and U. C. Niranjan, "Watermarking medical images with patient information," in IEEE/EMBS Conference, pp. 703-706, (Hong Kong), October 1998.
    • (1998) IEEE/EMBS Conference , pp. 703-706
    • Anand, D.1    Niranjan, U.C.2
  • 12
    • 0029223522 scopus 로고
    • On the compression of medical images with regions of interest
    • (Taipei, Taiwan, Bellingham, WA), September
    • M. Kim, Y. Cho, D. Kim, and N. Ha, "On the compression of medical images with regions of interest," in SPIE Visual Communications and Image Processing, 2501, pp. 733-744, (Taipei, Taiwan, Bellingham, WA), September 1995.
    • (1995) SPIE Visual Communications and Image Processing , vol.2501 , pp. 733-744
    • Kim, M.1    Cho, Y.2    Kim, D.3    Ha, N.4
  • 13
    • 0029753060 scopus 로고
    • Compression of digital mammogram databases using a near lossless scheme
    • October
    • H. Wong, L. Guan, and H. Hong, "Compression of digital mammogram databases using a near lossless scheme," IEEE International Conference on Image Processing 2, pp. 21-24, October 1995.
    • (1995) IEEE International Conference on Image Processing , vol.2 , pp. 21-24
    • Wong, H.1    Guan, L.2    Hong, H.3
  • 15
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulations
    • Febuary
    • C.-Y. Lin and S. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulations," IEEE Transactions on Circuits and Systems of Video Technology 11, pp. 153-168, Febuary 2001.
    • (2001) IEEE Transactions on Circuits and Systems of Video Technology , vol.11 , pp. 153-168
    • Lin, C.-Y.1    Chang, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.