-
1
-
-
0034450986
-
Relevance of watermarking in medical imaging
-
G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, and R. Collorec, "Relevance of watermarking in medical imaging," in Proc. IEEE EMBS Int. Conf. Inf. Technol. Appl. Biomed., 2000, pp. 250-255. (Pubitemid 32302628)
-
(2000)
Proceedings of the IEEE/EMBS Region 8 International Conference on Information Technology Applications in Biomedicine, ITAB
, pp. 250-255
-
-
Coatrieux, G.1
Maitre, H.2
Sankur, B.3
Rolland, Y.4
Collorec, R.5
-
2
-
-
58849116906
-
Proposal for DICOM multiframe medical image integrity and authenticity
-
L. Kobayashi and S. Furuie, "Proposal for DICOM multiframe medical image integrity and authenticity," J. Digital Imag., vol. 22, no. 1, pp. 71-83, 2009.
-
(2009)
J. Digital Imag.
, vol.22
, Issue.1
, pp. 71-83
-
-
Kobayashi, L.1
Furuie, S.2
-
3
-
-
32644477867
-
A new software tool for removing, storing, and adding abnormalities to medical images for perception research studies
-
DOI 10.1016/j.acra.2005.11.041, PII S1076633205010196
-
M. T. Madsen, K. S. Berbaum, A. N. Ellingson, B. H. Thompson, B. F. Mullan, and R. T. Caldwell, "A new software tool for removing, storing, and adding abnormalities to medical images for perception research studies," Academic Radiol., vol. 13, no. 3, pp. 305-312, 2006. (Pubitemid 43247850)
-
(2006)
Academic Radiology
, vol.13
, Issue.3
, pp. 305-312
-
-
Madsen, M.T.1
Berbaum, K.S.2
Ellingson, A.N.3
Thompson, B.H.4
Mullan, B.F.5
Caldwell, R.T.6
-
4
-
-
0028495791
-
Near-lossless compression of medical images through entropy coded DPCM
-
Sep
-
K. Chen and T. V. Ramabadran, "Near-lossless compression of medical images through entropy coded DPCM," IEEE Trans. Med. Imag., vol. 13, no. 3, pp. 538-548, Sep. 1994.
-
(1994)
IEEE Trans. Med. Imag.
, vol.13
, Issue.3
, pp. 538-548
-
-
Chen, K.1
Ramabadran, T.V.2
-
5
-
-
0032844530
-
Lossy compression should not be used in certain imaging applications such as chest radiography
-
DOI 10.1118/1.598783
-
E. R. Ritenour and A. D. A. Maidment, "Lossy compression should not be used in certain imaging applications such as chest radiography," Med. Phys., vol. 26, pp. 1773-1775, 1999. (Pubitemid 29442257)
-
(1999)
Medical Physics
, vol.26
, Issue.9
, pp. 1773-1775
-
-
Ritenour, E.R.1
Maidment, A.D.A.2
Hendee, W.R.3
-
8
-
-
0041632327
-
MACs and hash functions: State of the art
-
B. Preneel, "MACs and hash functions: State of the art," Inf. Security Tech. Report, vol. 2, no. 2, pp. 33-43, 1997. (Pubitemid 127412875)
-
(1997)
Information Security Technical Report
, vol.2
, Issue.2
, pp. 33-43
-
-
Preneel, B.1
-
9
-
-
72349096815
-
Lossless watermarking for verifying the integrity of medical images with tamper localization
-
X. Guo and T. Zhuang, "Lossless watermarking for verifying the integrity of medical images with tamper localization," J. Digital Imag., vol. 22, no. 6, pp. 620-628, 2009.
-
(2009)
J. Digital Imag.
, vol.22
, Issue.6
, pp. 620-628
-
-
Guo, X.1
Zhuang, T.2
-
10
-
-
85032768213
-
Image forgery detection
-
Mar
-
H. Farid, "Image forgery detection," IEEE Signal Process. Mag., vol. 26, no. 2, pp. 16-25, Mar. 2009.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.2
, pp. 16-25
-
-
Farid, H.1
-
11
-
-
51849136872
-
An image authentication scheme with localization and recovery
-
C. Li and L. Liu, "An image authentication scheme with localization and recovery," in Proc. Int. Conf. Image Signal Proc., 2008, vol. 5, pp. 669-673.
-
(2008)
Proc. Int. Conf. Image Signal Proc.
, vol.5
, pp. 669-673
-
-
Li, C.1
Liu, L.2
-
12
-
-
33947127547
-
Binary image authentication with tampering localization by embedding cryptographic signature and block identifier
-
DOI 10.1109/LSP.2006.879829
-
H. Yang and A. C. Kot, "Binary image authentication with tampering localization by embedding cryptographic signature and block identifier," IEEE Signal Process. Lett., vol. 13, no. 12, pp. 741-744, Dec. 2006. (Pubitemid 46405580)
-
(2006)
IEEE Signal Processing Letters
, vol.13
, Issue.12
, pp. 741-744
-
-
Yang, H.1
Kot, A.C.2
-
13
-
-
0034775562
-
Strict integrity control of biomedical images
-
DOI 10.1117/12.435403
-
G. Coatrieux, H. Maitre, andB. Sankur, "Strict integrity control of biomedical images," in Proc. SPIE Security Watermarking Multimedia Contents III, 2001, vol. 4314, pp. 229-240. (Pubitemid 33012240)
-
(2001)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.4314
, pp. 229-240
-
-
Coatrieux, G.1
Maitre, H.2
Sankur, B.3
-
14
-
-
0035097432
-
Authentication of digital images and video: Generic models and a new contribution
-
DOI 10.1016/S0923-5965(00)00010-2, PII S0923596500000102
-
M. P. Queluz, "Authentication of digital images and video:Generic models and a new contribution," Signal Process.: Image Commun., vol. 16, no. 5, pp. 461-475, Jan. 2001. (Pubitemid 34771334)
-
(2001)
Signal Processing: Image Communication
, vol.16
, Issue.5
, pp. 461-475
-
-
Queluz, M.P.1
-
15
-
-
33847159278
-
A robust content-based digital image watermarking scheme
-
DOI 10.1016/j.sigpro.2006.11.002, PII S0165168406003926
-
X. Qi and J. Qi, "A robust content-based digital image watermarking scheme," Signal Process., vol. 87, no. 6, pp. 1264-1280, Jun. 2007. (Pubitemid 46282985)
-
(2007)
Signal Processing
, vol.87
, Issue.6
, pp. 1264-1280
-
-
Qi, X.1
Qi, J.2
-
16
-
-
58449136543
-
A geometric attack resistant image watermarking scheme based on invariant centroids
-
E. Mwangi, "A geometric attack resistant image watermarking scheme based on invariant centroids," in Proc. IEEE Int. Symp. Signal Proc. Inf. Tech., 2007, pp. 190-193.
-
(2007)
Proc. IEEE Int. Symp. Signal Proc. Inf. Tech.
, pp. 190-193
-
-
Mwangi, E.1
-
17
-
-
1542272402
-
A medical image watermarking scheme based on wavelet transform
-
A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, "A medical image watermarking scheme based on wavelet transform," in Proc. IEEE Int. Conf.Eng. Med. Biol. Soc., 2003, vol. 1, pp. 856-859.
-
(2003)
Proc. IEEE Int. Conf.Eng. Med. Biol. Soc.
, vol.1
, pp. 856-859
-
-
Giakoumaki, A.1
Pavlopoulos, S.2
Koutsouris, D.3
-
18
-
-
63349083498
-
Reversible watermarking for knowledge digest embedding and reliability control in medical images
-
Mar
-
G. Coatrieux, C. Le Guillou, J. M. Cauvin, and C. Roux, "Reversible watermarking for knowledge digest embedding and reliability control in medical images," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 2, pp. 158-165, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Technol. Biomed.
, vol.13
, Issue.2
, pp. 158-165
-
-
Coatrieux, G.1
Le Guillou, C.2
Cauvin, J.M.3
Roux, C.4
-
19
-
-
84948707475
-
Digital watermarking for ROI medical images by using compressed signature image
-
A. Wakatani, "Digital watermarking for ROI medical images by using compressed signature image," in Proc. IEEE Annu. Hawaii Int. Conf. Syst. Sci., 2002, pp. 2043-2048.
-
(2002)
Proc. IEEE Annu. Hawaii Int. Conf. Syst. Sci.
, pp. 2043-2048
-
-
Wakatani, A.1
-
20
-
-
33745266757
-
Digital watermarking of medical image using ROI information
-
H-K. Lee, H-J. Kim, K-R. Kwon, and J-K. Lee, "Digital watermarking of medical image using ROI information," in Proc. IEEE Int. Workshop Healthcom, 2005, pp. 404-407.
-
(2005)
Proc. IEEE Int. Workshop Healthcom
, pp. 404-407
-
-
Lee, H.-K.1
Kim, H.-J.2
Kwon, K.-R.3
Lee, J.-K.4
-
21
-
-
40149104655
-
Tamper detection and restoring system for medical images using wavelet-based reversible data embedding
-
DOI 10.1007/s10278-007-9012-0
-
K-H. Chiang, K-C. Chang-Chien, R-F. Chang, and H-Y. Yen, "Tamper detection and restoring system for medical images using wavelet-based reversible data embedding," J. Digital Imag., vol. 21, no. 1, pp. 77-90, Mar. 2008. (Pubitemid 351326297)
-
(2008)
Journal of Digital Imaging
, vol.21
, Issue.1
, pp. 77-90
-
-
Chiang, K.-H.1
Chang-Chien, K.-C.2
Chang, R.-F.3
Yen, H.-Y.4
-
22
-
-
47349102281
-
A novel semi-fragile image watermarking, authentication and self-restoration technique using the slant transform
-
X. Zhao, A. T. S. Ho, H. Treharne, V. Pankajakshan, C. Culnane, and W. Jiang, "A novel semi-fragile image watermarking, authentication and self-restoration technique using the slant transform," in Proc. Int. Conf. Intel. Inf. Hiding Multimedia Signal Process., 2007, vol. 1, pp. 283-286.
-
(2007)
Proc. Int. Conf. Intel. Inf. Hiding Multimedia Signal Process.
, vol.1
, pp. 283-286
-
-
Zhao, X.1
Ho, A.T.S.2
Treharne, H.3
Pankajakshan, V.4
Culnane, C.5
Jiang, W.6
-
23
-
-
77950386219
-
Dual watermarking method for secure image authentication and recovery
-
R. Chamlawi, I. Usman, and A. Khan, "Dual watermarking method for secure image authentication and recovery," in Proc. IEEE 13th Int. Multitopic Conf., 2009, pp. 1-4.
-
(2009)
Proc. IEEE 13th Int. Multitopic Conf.
, pp. 1-4
-
-
Chamlawi, R.1
Usman, I.2
Khan, A.3
-
24
-
-
70350440468
-
Self-recovery fragile watermarking using block-neighborhood tampering characterization
-
H-J. He, J-S. Zhang, and H-M. Tai, "Self-recovery fragile watermarking using block-neighborhood tampering characterization," in Proc. Inf. Hiding, 2009, pp. 132-145.
-
(2009)
Proc. Inf. Hiding
, pp. 132-145
-
-
He, H.-J.1
Zhang, J.-S.2
Tai, H.-M.3
-
25
-
-
79751538597
-
Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images
-
O. M. Al-Qershi and B. E. Khoo, "Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images," J. Digit Imag., vol. 1, no. 24, pp. 114-25, 2011.
-
(2011)
J. Digit Imag.
, vol.1
, Issue.24
, pp. 114-125
-
-
Al-Qershi, O.M.1
Khoo, B.E.2
-
26
-
-
70350582578
-
Hash-based identification of sparse image tampering
-
Nov
-
M. Tagliasacchi, G. Valenzise, and S. Tubaro, "Hash-based identification of sparse image tampering," IEEE Trans. Imag. Process., vol. 18, no. 11, pp. 2491-2504, Nov. 2009.
-
(2009)
IEEE Trans. Imag. Process.
, vol.18
, Issue.11
, pp. 2491-2504
-
-
Tagliasacchi, M.1
Valenzise, G.2
Tubaro, S.3
-
27
-
-
20444444311
-
A classifier design for detecting image manipulations
-
2004 International Conference on Image Processing, ICIP 2004
-
I. Avcibas, S. Bayram, N. Memon, M. Ramkumar, and B. Sankur, "A classifier design for detecting image manipulations," in Proc. IEEE Int. Conf. Imag. Process., 2004, vol. 4, pp. 2645-2648. (Pubitemid 40820438)
-
(2004)
Proceedings - International Conference on Image Processing, ICIP
, vol.4
, pp. 2645-2648
-
-
Avcibas, I.1
Bayram, S.2
Memon, N.3
Ramkumar, M.4
Sankur, B.5
-
28
-
-
84954462362
-
Higher-order wavelet statistics and their application to digital forensics
-
H. Farid and S. Lyu, "Higher-order wavelet statistics and their application to digital forensics," in Proc. Int. Conf. Comput. Vision Pattern Recognit., 2003, vol. 8, p. 94.
-
(2003)
Proc. Int. Conf. Comput. Vision Pattern Recognit.
, vol.8
, pp. 94
-
-
Farid, H.1
Lyu, S.2
-
29
-
-
33847671791
-
Image manipulation detection
-
041102-1-041102-17 Oct
-
S. Bayram, I. Avcibas, B. Sankur, and N. Memon, "Image manipulation detection," J. Electron. Imag., vol. 15, no. 4, pp. 041102-1-041102-17, Oct. 2006.
-
(2006)
J. Electron. Imag.
, vol.15
, Issue.4
-
-
Bayram, S.1
Avcibas, I.2
Sankur, B.3
Memon, N.4
-
30
-
-
84870867885
-
Blind integrity verification ofmedical images
-
Nov
-
H. Huang, G. Coatrieux, H. Shu, L. Luo, and Ch. Roux, "Blind integrity verification ofmedical images," IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 6, pp. 1122-1126, Nov. 2012.
-
(2012)
IEEE Trans. Inf. Technol. Biomed.
, vol.16
, Issue.6
, pp. 1122-1126
-
-
Huang, H.1
Coatrieux, G.2
Shu, H.3
Luo, L.4
Roux, C.H.5
-
31
-
-
33750216800
-
Multiple image watermarking applied to health information management
-
DOI 10.1109/TITB.2006.875655
-
A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, "Multiple image watermarking applied to health information management," IEEE Trans. Inf. Technol. Biomed., vol. 10, no. 4, pp. 722-732, Oct. 2006. (Pubitemid 44604902)
-
(2006)
IEEE Transactions on Information Technology in Biomedicine
, vol.10
, Issue.4
, pp. 722-732
-
-
Giakoumaki, A.1
Pavlopoulos, S.2
Koutsouris, D.3
-
32
-
-
77957874423
-
Medical image tamper approximation based on an image moment signature
-
H. Huang, G. Coatrieux, H. Z. Shu, L. M. Luo, and C. Roux, "Medical image tamper approximation based on an image moment signature," in Proc. Int. Conf. Healthcom, 2010, pp. 254-259.
-
Proc. Int. Conf. Healthcom
, vol.2010
, pp. 254-259
-
-
Huang, H.1
Coatrieux, G.2
Shu, H.Z.3
Luo, L.M.4
Roux, C.5
-
33
-
-
57649229011
-
Mixed reversible andRONIwatermarking for medical image reliability protection
-
G. Coatrieux, J. Montagner, H. Huang, and C. Roux, "Mixed reversible andRONIwatermarking for medical image reliability protection," in Proc. 29th Int. Conf. IEEE Eng. Med. Biol. Soc., 2007, pp. 5653-5656.
-
(2007)
Proc. 29th Int. Conf. IEEE Eng. Med. Biol. Soc.
, pp. 5653-5656
-
-
Coatrieux, G.1
Montagner, J.2
Huang, H.3
Roux, C.4
-
37
-
-
84937655864
-
Visual pattern recognition by moment invariants
-
M-K. Hu, "Visual pattern recognition by moment invariants," IRE Trans. Inf. Theory, vol. 8, no. 2, pp. 179-187, 1962.
-
(1962)
IRE Trans. Inf. Theory
, vol.8
, Issue.2
, pp. 179-187
-
-
Hu, M.-K.1
-
38
-
-
0027091314
-
A survey of moment-based techniques for unoccluded object representation and recognition
-
R. J. Prokop and A. P. Reeves, "A survey of moment-based techniques for unoccluded object representation and recognition," J. CVGIP: Graphical Models Imag. Process., vol. 54, no. 5, pp. 438-460, 1992. (Pubitemid 23379858)
-
(1992)
CVGIP: Graphical Models & Image Processing
, vol.54
, Issue.5
, pp. 438-460
-
-
Prokop, R.J.1
Reeves, A.P.2
-
40
-
-
0002229304
-
Pairwise classification and support vector machines
-
Cambridge, MA, USA: MIT Press
-
U. H. Kressel, "Pairwise classification and support vector machines," in Advances in Kernel Methods. Cambridge, MA, USA: MIT Press, 1999, pp. 255-268.
-
(1999)
Advances in Kernel Methods
, pp. 255-268
-
-
Kressel, U.H.1
-
42
-
-
38049089912
-
Passive steganalysis using image quality metrics andmulti-class support vectormachine
-
Los Alamitos, CA, USA
-
B. Xu, J. Wang, X. Liu, and Z. Zhang, "Passive steganalysis using image quality metrics andmulti-class support vectormachine," in Proc. Int.Conf. Natural Comput., vol. 3, Los Alamitos, CA, USA, 2007, pp. 215-220.
-
(2007)
Proc. Int.Conf. Natural Comput.
, vol.3
, pp. 215-220
-
-
Xu, B.1
Wang, J.2
Liu, X.3
Zhang, Z.4
-
43
-
-
33845464635
-
Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition
-
Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings
-
D. Fu, Y. Q. Shi, and W. Su, "Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition," Digital Watermarking, vol. 4283, pp. 177-187, 2006. (Pubitemid 44891635)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4283
, pp. 177-187
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
44
-
-
0034323731
-
Support vector machine techniques for nonlinear equalization
-
DOI 10.1109/78.875477
-
D. J. Sebald and J. A. Bucklew, "Support vector machine techniques for nonlinear equalization," IEEE Trans. Signal Process., vol. 48, no. 11, pp. 3217-3226, Nov. 2000. (Pubitemid 32027347)
-
(2000)
IEEE Transactions on Signal Processing
, vol.48
, Issue.11
, pp. 3217-3226
-
-
Sebald, D.J.1
Bucklew, J.A.2
-
45
-
-
79551603135
-
Optimal filter framework for automated, instantaneous detection of lesions in retinal images
-
Feb
-
G. Quellec, S. R. Russell, andM. D. Abramoff, "Optimal filter framework for automated, instantaneous detection of lesions in retinal images," IEEE Trans. Med. Imag., vol. 30, no. 2, pp. 523-533, Feb. 2011.
-
(2011)
IEEE Trans. Med. Imag.
, vol.30
, Issue.2
, pp. 523-533
-
-
Quellec, G.1
Russell, S.R.2
Abramoff, M.D.3
-
46
-
-
4344675264
-
Region filling and object removal by exemplar-based image inpainting
-
Sep
-
A. Criminisi, P. Perez, and K. Toyama, "Region filling and object removal by exemplar-based image inpainting," IEEE Trans. Image Process., vol. 13, no. 9, pp. 1200-1212, Sep. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.9
, pp. 1200-1212
-
-
Criminisi, A.1
Perez, P.2
Toyama, K.3
-
47
-
-
84859845768
-
Topological completeness of function spaces arising in the Hausdorff approximation of functions
-
G. Beer, "Topological completeness of function spaces arising in the Hausdorff approximation of functions," Can. Math. Bull., vol. 35, pp. 439-448, 1992.
-
(1992)
Can. Math. Bull.
, vol.35
, pp. 439-448
-
-
Beer, G.1
|