메뉴 건너뛰기




Volumn , Issue , 2006, Pages 3270-3273

Medical image watermarking with tamper detection and recovery

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; AUTHENTICATION; MEDICAL IMAGING; ULTRASONIC APPLICATIONS;

EID: 34047188118     PISSN: 05891019     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IEMBS.2006.260767     Document Type: Conference Paper
Times cited : (107)

References (13)
  • 1
    • 34047132754 scopus 로고    scopus 로고
    • M.L. Miller, I.J. Cox, J.M.G. Linnartz and T. Kalker, A Review of Watermarking Principles and Practices, in Digital Signal Processing for Multimedia. Syatems, K.K. parhi and T. Nishitani Eds. New York: Marcel Dekker Inc., 1999, pp. 461-485.
    • M.L. Miller, I.J. Cox, J.M.G. Linnartz and T. Kalker, "A Review of Watermarking Principles and Practices," in Digital Signal Processing for Multimedia. Syatems, K.K. parhi and T. Nishitani Eds. New York: Marcel Dekker Inc., 1999, pp. 461-485.
  • 2
    • 0000525637 scopus 로고    scopus 로고
    • Watermarking Medical Images with Patient Information
    • D. Anand and U. Niranjan, "Watermarking Medical Images with Patient Information," in IEEE/EMBS Conference, 1998, pp. 703-706.
    • (1998) IEEE/EMBS Conference , pp. 703-706
    • Anand, D.1    Niranjan, U.2
  • 7
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M. Holliman, N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Trans. Image Processing, 9(2000), pp. 432-441.
    • (2000) IEEE Trans. Image Processing , vol.9 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 9
    • 0033682895 scopus 로고    scopus 로고
    • Secret and public key authentication schemes that resist vector quantization attack
    • P.W. Wong, N. Memon, "Secret and public key authentication schemes that resist vector quantization attack", Proceeding SPIE 3971 (75), 2000, pp. 417-427.
    • (2000) Proceeding SPIE , vol.3971 , Issue.75 , pp. 417-427
    • Wong, P.W.1    Memon, N.2
  • 10
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • M. U. Celik, G. Sharma, E. Saber, A.M. Tekalp, "Hierarchical watermarking for secure image authentication with localization", IEEE Trans. Image Processing, 11(6) 2002, pp.585-594.
    • (2002) IEEE Trans. Image Processing , vol.11 , Issue.6 , pp. 585-594
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 11
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C. Lin, S. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation", IEEE Trans. Circuits and Video Technology, 11(2), pp. 153-168.
    • IEEE Trans. Circuits and Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.1    Chang, S.2
  • 12
    • 0034140535 scopus 로고    scopus 로고
    • Fault resilient and compression tolerant digital signature for image authentication
    • D. C. Lou, J. L. Liu, "Fault resilient and compression tolerant digital signature for image authentication", IEEE Trans. Consumer Electronics, 46(1), pp. 31-39.
    • IEEE Trans. Consumer Electronics , vol.46 , Issue.1 , pp. 31-39
    • Lou, D.C.1    Liu, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.