322
Views
58
CrossRef citations to date
0
Altmetric
Section A

Hybrid watermarking of medical images for ROI authentication and recovery

, , &
Pages 2057-2071 | Received 05 Apr 2010, Accepted 24 Nov 2010, Published online: 26 Apr 2011

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Nour El Houda Golea, Kamal Eddine Melkemi & Ali Behloul. (2021) Zero-bit fragile watermarking for medical image tamper detection and recovery using RS code and lifting wavelet transform. The Imaging Science Journal 69:5-8, pages 334-349.
Read now
Preeti Garg & R. Rama Kishore. (2020) An improved and secured digital image watermarking technique using DCT, fuzzy entropy and image scrambling in hybrid domain. Journal of Discrete Mathematical Sciences and Cryptography 23:1, pages 177-186.
Read now

Articles from other publishers (56)

S. Prasanth Vaidya. (2022) Fingerprint-based robust medical image watermarking in hybrid transform. The Visual Computer 39:6, pages 2245-2260.
Crossref
Mayssa Tayachi, Laurent Nana, Anca Christine Pascu & Faouzi Benzarti. (2023) A Hybrid Watermarking Approach for DICOM Images Security. Applied Sciences 13:10, pages 6132.
Crossref
Kumari Suniti Singh & Harsh Vikram Singh. 2022. Recent Trends in Electronics and Communication. Recent Trends in Electronics and Communication 569 579 .
Javad Ebrahimnejad & Alireza Naghsh. (2021) Adaptive Removal of high-density salt-and-pepper noise (ARSPN) for robust ROI detection used in watermarking of MRI images of the brain. Computers in Biology and Medicine 137, pages 104831.
Crossref
T. Janani, Y. Darak & M. Brindha. (2021) Secure Similar Image Search and Copyright Protection over Encrypted Medical Image Databases. IRBM 42:2, pages 83-93.
Crossref
Rasha Thabit. (2021) Review of medical image authentication techniques and their recent trends. Multimedia Tools and Applications 80:9, pages 13439-13473.
Crossref
Ahmad Nagm & Mohammed Safy Elwan. (2021) Protection of the patient data against intentional attacks using a hybrid robust watermarking code. PeerJ Computer Science 7, pages e400.
Crossref
Pavithra V. & Jeyamala Chandrasekaran. 2021. Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery. Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery 612 631 .
Ali Alzahrani & Nisar Ahmed Memon. (2021) Blind and Robust Watermarking Scheme in Hybrid Domain for Copyright Protection of Medical Images. IEEE Access 9, pages 113714-113734.
Crossref
Wafa' Hamdan Alshoura, Zurinahni Zainol, Je Sen Teh, Moatsum Alawida & Abdulatif Alabdulatif. (2021) Hybrid SVD-Based Image Watermarking Schemes: A Review. IEEE Access 9, pages 32931-32968.
Crossref
Jiaqi Shi, Gang Wang, Ming Su & Xiaoguang Liu. 2021. Digital Forensics and Cyber Crime. Digital Forensics and Cyber Crime 62 77 .
Mehmet Zeki Konyar & Sıtkı Öztürk. (2020) Reed Solomon Coding-Based Medical Image Data Hiding Method against Salt and Pepper Noise. Symmetry 12:6, pages 899.
Crossref
Anna Egorova & Victor Fedoseev. (2020) An ROI-Based Watermarking Technique for Image Content Recovery Robust Against JPEG. An ROI-Based Watermarking Technique for Image Content Recovery Robust Against JPEG.
Pavithra V. & Jeyamala Chandrasekaran. 2020. Smart Medical Data Sensing and IoT Systems Design in Healthcare. Smart Medical Data Sensing and IoT Systems Design in Healthcare 76 96 .
Nisar Ahmed Memon & Ali Alzahrani. (2020) Prediction-Based Reversible Watermarking of CT Scan Images for Content Authentication and Copyright Protection. IEEE Access 8, pages 75448-75462.
Crossref
S. Thakur, A. K. Singh, Basant Kumar & S. P. Ghrera. 2020. Advances in VLSI, Communication, and Signal Processing. Advances in VLSI, Communication, and Signal Processing 897 905 .
Ashish Khatter, Nitya Reddy & Anita Thakur. 2020. Advances in Data and Information Sciences. Advances in Data and Information Sciences 567 576 .
Alaa H. ElSaadawy, Ahmed S. ELSayed, M. N. Al-Berry & Mohamed Roushdy. 2020. Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2020). Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2020) 750 761 .
Nisar Ahmed Memon & Shakeel Ahmed. 2020. Proceedings of the Future Technologies Conference (FTC) 2019. Proceedings of the Future Technologies Conference (FTC) 2019 737 749 .
Asaad F. Qasim, Rob Aspin & Farid Meziane. (2019) Integration of Digital Watermarking Technique into Medical Imaging Systems. Integration of Digital Watermarking Technique into Medical Imaging Systems.
Sriti Thakur, Amit Kumar Singh, Satya Prakash Ghrera & Mohamed Elhoseny. (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools and Applications 78:3, pages 3457-3470.
Crossref
Luca Brunese, Francesco Mercaldo, Alfonso Reginelli & Antonella Santone. (2019) Formal Modeling for Magnetic Resonance Images Tamper Mitigation. Procedia Computer Science 159, pages 1803-1810.
Crossref
Luca Brunese, Francesco Mercaldo, Alfonso Reginelli & Antonella Santone. (2019) Radiomic Features for Medical Images Tamper Detection by Equivalence Checking. Procedia Computer Science 159, pages 1795-1802.
Crossref
Luca Brunese, Francesco Mercaldo, Alfonso Reginelli & Antonella Santone. (2019) A Blockchain Based Proposal for Protecting Healthcare Systems through Formal Methods. Procedia Computer Science 159, pages 1787-1794.
Crossref
A. Hassani Allaf & M. Ait Kbir. 2019. Innovations in Smart Cities Applications Edition 2. Innovations in Smart Cities Applications Edition 2 472 480 .
Abdehay Hassani Allaf & M'hamed Aït Kbir. (2018) Usage of watermarking techniques in medical imaging. Usage of watermarking techniques in medical imaging.
Joshua C. Dagadu & Jianping Li. (2018) Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimedia Tools and Applications 77:18, pages 24289-24312.
Crossref
S.I. Nipanikar & V. Hima Deepthi. (2018) A Multiple Criteria-Based Cost Function Using Wavelet and Edge Transformation for Medical Image Steganography. Journal of Intelligent Systems 27:3, pages 331-347.
Crossref
Atta Ur Rahman, Kiran Sultan, Dhiaa Musleh, Nahier Aldhafferi, Abdullah Alqahtani & Maqsood Mahmud. (2018) Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories. Journal of Healthcare Engineering 2018, pages 1-11.
Crossref
Alkajith Jyothika & P R Geetharanjin. (2018) Robust Watermarking Scheme and Tamper Detection Using Integer Wavelet Transform. Robust Watermarking Scheme and Tamper Detection Using Integer Wavelet Transform.
Fatima Abbasi & Nisar Ahmed Memon. (2018) Reversible Watermarking for the Security of Medical Image Databases. Reversible Watermarking for the Security of Medical Image Databases.
Rajitha Bakthula, Shivendra Shivani & Suneeta Agarwal. (2017) Self authenticating medical X-ray images for telemedicine applications. Multimedia Tools and Applications 77:7, pages 8375-8392.
Crossref
Asaad F. Qasim, Farid Meziane & Rob Aspin. (2018) Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Computer Science Review 27, pages 45-60.
Crossref
Guzin Ulutas, Arda Ustubioglu, Beste Ustubioglu, Vasif V. Nabiyev & Mustafa Ulutas. (2017) Medical Image Tamper Detection Based on Passive Image Authentication. Journal of Digital Imaging 30:6, pages 695-709.
Crossref
Ashish Khatter, Akshat Browne, Anushikha Singh & Malay Kishore Dutta. (2017) Wavelet based non-informative code for security of fundus images. Wavelet based non-informative code for security of fundus images.
Garima Singh. (2017) A review of secure medical image watermarking. A review of secure medical image watermarking.
M. S. Sreekutty & P. S. Baiju. (2017) Security enhancement in image steganography for medical integrity verification system. Security enhancement in image steganography for medical integrity verification system.
Seyed Mojtaba Mousavi, Alireza Naghsh, Azizah A. Manaf & S. A. R. Abu-Bakar. (2016) A robust medical image watermarking against salt and pepper noise for brain MRI images. Multimedia Tools and Applications 76:7, pages 10313-10342.
Crossref
Falgun N. Thakkar & Vinay Kumar Srivastava. (2016) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools and Applications 76:3, pages 3669-3697.
Crossref
Priyanka & Sushila Maheshkar. (2016) Region-based hybrid medical image watermarking for secure telemedicine applications. Multimedia Tools and Applications 76:3, pages 3617-3647.
Crossref
Fawaz Waselallah. (2016) Watermarking for Content Integrity and Ownership Control of Medical Images. Journal of Artificial Intelligence 10:1, pages 32-41.
Crossref
Hayat Al-Dmour & Ahmed Al-Ani. (2016) Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Computer Methods and Programs in Biomedicine 127, pages 24-43.
Crossref
Fawaz Waselallah Alsaade. (2016) Watermarking System for the Security of Medical Image Databases used in Telemedicine. Research Journal of Information Technology 8:3, pages 88-97.
Crossref
Amit Mehto & Neelesh Mehra. (2016) Adaptive Lossless Medical Image Watermarking Algorithm Based on DCT & DWT. Procedia Computer Science 78, pages 88-94.
Crossref
Rayachoti Eswaraiah & Edara Sreenivasa Reddy. (2015) Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Processing 9:8, pages 615-625.
Crossref
Seyed Mojtaba Mousavi, Alireza Naghsh & S. A. R. Abu-Bakar. (2015) A Heuristic Automatic and Robust ROI Detection Method for Medical Image Warermarking. Journal of Digital Imaging 28:4, pages 417-427.
Crossref
R. Lakshmi Priya & V. Sadasivam. (2015) Protection of Health Imagery by Region Based Lossless Reversible Watermarking Scheme. The Scientific World Journal 2015, pages 1-10.
Crossref
R. Eswaraiah & E. Sreenivasa Reddy. 2015. Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 245 253 .
Eswaraiah Rayachoti & Sreenivasa Reddy Edara. (2014) A novel medical image watermarking technique for detecting tampers inside ROI and recovering original ROI. A novel medical image watermarking technique for detecting tampers inside ROI and recovering original ROI.
Seyed Mojtaba Mousavi, Alireza Naghsh & S. A. R. Abu-Bakar. (2014) Watermarking Techniques used in Medical Images: a Survey. Journal of Digital Imaging 27:6, pages 714-729.
Crossref
R. Eswaraiah & E. Sreenivasa Reddy. (2014) ROI-based fragile medical image watermarking technique for tamper detection and recovery using variance. ROI-based fragile medical image watermarking technique for tamper detection and recovery using variance.
R. Eswaraiah & E. Sreenivasa Reddy. (2014) A Fragile ROI-Based Medical Image Watermarking Technique with Tamper Detection and Recovery. A Fragile ROI-Based Medical Image Watermarking Technique with Tamper Detection and Recovery.
R. Eswaraiah & E. Sreenivasa Reddy. (2014) Medical Image Watermarking Technique for Accurate Tamper Detection in ROI and Exact Recovery of ROI. International Journal of Telemedicine and Applications 2014, pages 1-10.
Crossref
Nisar Ahmed Memon, Zulfiqar Ali Keerio & Fatima Abbasi. 2014. Communication Technologies, Information Security and Sustainable Development. Communication Technologies, Information Security and Sustainable Development 173 183 .
M. Mubeen, S. A. M. Gilani & K. Zafar. (2013) Robust image watermarking in contourlet domain using multi objective genetic algorithm. Robust image watermarking in contourlet domain using multi objective genetic algorithm.
Hussain Nyeem, Wageeh Boles & Colin Boyd. (2012) A Review of Medical Image Watermarking Requirements for Teleradiology. Journal of Digital Imaging 26:2, pages 326-343.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.