메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Data hiding scheme for medical images

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA COMPRESSION; IMAGE QUALITY; MEDICAL IMAGING; METHOD OF MOMENTS;

EID: 34547233140     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CONIELECOMP.2007.14     Document Type: Conference Paper
Times cited : (62)

References (14)
  • 4
    • 0000525637 scopus 로고    scopus 로고
    • Watermarking Medical Images with Patient Information
    • Hong Kong, China, October
    • D. Anand and U. C. Niranjan. "Watermarking Medical Images with Patient Information". In Proceedings IEEE/EMBS Conference, Hong Kong, China, October 1998, pp. 703-706.
    • (1998) Proceedings IEEE/EMBS Conference , pp. 703-706
    • Anand, D.1    Niranjan, U.C.2
  • 5
    • 0002964056 scopus 로고    scopus 로고
    • A Secure Data Hiding Technique with Heterogeneous Data-Combining Capability for Electronic Patient Record
    • Session Electronic Healthcare Records, USA, July
    • S. G. Miaou et al. "A Secure Data Hiding Technique with Heterogeneous Data-Combining Capability for Electronic Patient Record". In Proceedings of the World Congress on Medical Physics and Biomedical Engineering, Session Electronic Healthcare Records, USA, July 2000.
    • (2000) Proceedings of the World Congress on Medical Physics and Biomedical Engineering
    • Miaou, S.G.1
  • 6
    • 0005156794 scopus 로고    scopus 로고
    • Trusted Headers for Medical Images
    • Erlangen, Germany, October
    • Macq B. and Dewey F.: Trusted Headers for Medical Images. In DFG VIII-DII Watermarking Workshop, Erlangen, Germany, October (1999).
    • (1999) DFG VIII-DII Watermarking Workshop
    • Macq, B.1    Dewey, F.2
  • 8
    • 28844467650 scopus 로고    scopus 로고
    • Digital Watermarking Robust to Geometric Distortions
    • December
    • P. Dong et al. "Digital Watermarking Robust to Geometric Distortions". In IEEE Transactions on Image Processing, Vol. 4, No. 12, December 2005.
    • (2005) In IEEE Transactions on Image Processing , vol.4 , Issue.12
    • Dong, P.1
  • 9
    • 5644253212 scopus 로고    scopus 로고
    • Blind image data hiding based on self reference
    • November
    • Y. Wang, A. Pearmain. "Blind image data hiding based on self reference". In Pattern Recognition Letters, Vol. 2 No. 15 November 2004, pp. 1681-1689.
    • (2004) In Pattern Recognition Letters , vol.2 , Issue.15 , pp. 1681-1689
    • Wang, Y.1    Pearmain, A.2
  • 13
    • 0035369792 scopus 로고    scopus 로고
    • Attack modelling: Towards a second generation watermarking benchmark
    • June
    • S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun. "Attack modelling: Towards a second generation watermarking benchmark". Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking, 81(6), June 2001.
    • (2001) Signal Processing , vol.81 , Issue.6
    • Voloshynovskiy, S.1    Pereira, S.2    Iquise, V.3    Pun, T.4
  • 14
    • 84944076741 scopus 로고    scopus 로고
    • Analysis Methods for (Alleged) RC4
    • Advances in Cryptology-ASIACRYPT Proceedings, of Springer Verlag
    • L. Knudsen et al. "Analysis Methods for (Alleged) RC4". Advances in Cryptology-ASIACRYPT Proceedings, Vol. 1514 of LNCS Springer Verlag, 1998, pp. 327-341.
    • (1998) LNCS , vol.1514 , pp. 327-341
    • Knudsen, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.