37
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

Watermarking Technique for Improved Management of Digital Medical Images

, , &
Pages 785-799 | Received 01 Sep 2014, Published online: 16 Dec 2015

References

  • Cao F., Huang H. K., Zhou X.Q., Medical image security in a HIPAA mandated PACS environment [J]. Computerized Medical Imaging and Graphics, 2003, 27: 185–196.
  • Digital Imaging and Communications in Medicine (DICOM) , (access date: 2014-9-20) http://medical.nema.org
  • Eitan Sharon, Meirav Galun, Dahlia Sharon, et al., Hierarchy and adaptivity in segmenting visual scenes [J]. Nature, August 2006, 442(17): 810–813|doi:10.1038/nature04977.
  • Tsai Jer-Min and Chou Hsia-Hung, A real-time multi-objects track- ing system based on active contour model and motion vector [C]// Proceedings of Information and Management Practice, Taiwan, Dec. 2006.
  • Luc Vincent and Pierre Soille, Watersheds in digital spaces: an ef- ficient algorithm based on immersion simulations [J]. IEEE Transac- tions on Pattern Analysis and Machine Intelligence, 1991, 13(6): 583–598.
  • S.A.E. Peters, H.M. den Ruijter, M K. Palmer, et al., Manual or semi- automated edge detection of the maximal far wall common carotid intima–media thickness: a direct comparison [J]. Journal of Internal Medicine, March 2012, 271(3): 247–256.
  • Oh Guan-Trak, Lee Yun-Bae, and Yeom Soon-Ja, Security mecha- nism for medical image information on PACS using invisible watermark[C]// International Meeting High Performance Computing for Computational Science - VECPAR 2004, LNCS 3402: 315–324.
  • Hong An-Xiang., Chen Gang, Li Jun-Li, et al., A flower image re- trieval method based on ROI feature [J]. Journal of Zhejiang University Science, 2004, 5(7):764–772.
  • Michael Kass, Andrew Witkin and Demetri Terzopoulos, Snakes: ac- tive contour models [J]. International Journal of Computer Vision, 1988: 321–331.
  • T.F. Cootes and C.J. Taylor, Statistical models of appearance for com- puter vision [R] (access date: 2014–9-20) http://www.face-rec.org/algorithms/AAM/app_models.pdf, March 8, 2004.
  • Tang Ying-gan and Guan Xin-ping, Color image segmentation using competitive and cooperative learning approach [J]. International Jour- nal of Applied Mathematics and Computer Sciences, 2004, 2(1): 15–18.
  • Julia A. Schnable and Simon R. Arridge, Active contour models for shape description using multiscale differential invariants [C]// Brit- ish Machine Vision conference, London, 1995, 1(1): 197–206.
  • Dinggang Shen and Christos Davatizikos, An adaptive-focus de- formable model using statistical and geometric information [J]. IEEE Transactions on pattern analysis and machine intelligence, August 2000, 22(8): 906–913.
  • Ingemar Cox, Matthew Miller, Jeffrey Bloom, et al., Digital water- marking and steganography 2nd[M], Morgan Kaufmann, ISBN: 978- 0123725851, November 27, 2007.
  • Red Green Blue color model, (access date: 2014-9-20) http://en.wikipedia.org/wiki/RGB_color_model
  • Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia, et al., Medi- cal image integrity control combining digital signature and lossless watermarking [M]// Data Privacy Management and Autonomous Spon- taneous Security Lecture Notes in Computer Science, 2010, 5939:153–162.
  • Koushik Pal, Goutam Ghosh and Mahua Bhattacharya, A compara- tive study between LSB and modified bit replacement (MBR) water- marking technique in spatial domain for biomedical image security [J]. International Journal of Computer Applications and Technology, 2012, 1(1): 30–39.
  • Hussain Nyeem, Wageeh Boles, Colin Boyd, A review of medical im- age watermarking requirements for teleradiology [J]. Journal of Digit Imaging, 2013, 26(2): 326–343.
  • Rafael C. Gonzalez, Richard E. Woods, and Steven L. Eddins, Digital image processing using MATLAB, 2nd [M], Prentice Hall, ISBN: 9780982085400, 2009.
  • StirMark, (access date: 2014-9-20) http://www.petitcolas.net/fabi-en/watermarking/stirmark

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.