223
Views
34
CrossRef citations to date
0
Altmetric
Articles

A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory

ORCID Icon, , ORCID Icon &
Pages 457-467 | Received 28 Mar 2017, Accepted 07 Jul 2017, Published online: 24 Aug 2017

References

  • Thakkar F, Srivastava, V. A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl; 2016 Nov; 76(3):3669–3697.
  • Nagpal S, Bhushan S, Mahajan M. An enhanced digital image watermarking scheme for medical images using neural network, DWT and RSA. Int J Mod Educ Comput Sci. 2016 Apr;8:46–56. doi: 10.5815/ijmecs.2016.04.06
  • Kishore P, Rao M, Prasad C, et al. Medical image watermarking: run through review. ARPN J Eng Appl Sci. 2016 Mar;11(5):2882–2899.
  • Singh A. Some new techniques of improved wavelet domain watermarking for medical images [Ph.D. Thesis]. India: NIT Kurukshetra; 2015 May.
  • Singh A, Dave M, Mohan A. Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. Int J Electron Secur Digit Forensics. 2014 Nov;6(4):285–305. doi: 10.1504/IJESDF.2014.065739
  • Venkatram N, Reddy L, Kishore P. Blind medical image watermarking with LWT – SVD for telemedicine applications. WSEAS Trans Signal Process. 2014 Aug;10:288–300.
  • Sreedhanya A, Soman K. Ensuring security to the compressed sensing data using a steganographic approach. Bonfring Int J Adv Image Process. 2013 Mar;3(1):1–7. doi: 10.9756/BIJAIP.10137
  • Candes E, Demanet L, Donoho D. Fast discrete curvelet transforms. Appl Comput Math-Bak. 2005;3:1433–1452.
  • Candes E. Compressive sampling. Proceedings of the International Congress of Mathematicians; 2006; Madrid, Spain.
  • Surekha B, Swamy G. Security analysis of ‘A novel copyright protection scheme using Visual Cryptography. 2014 International Conference on Computer and Communications Technologies (ICCCT); 2014. p. 1–5.
  • Surekha B, Swamy G. Visual secret sharing based digital image watermarking. Int J Comput Sci. 2012;9(3):312–317.
  • Tropp J, Gilbert A. Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inform Theory. 2007 Dec;53(12):4655–4666. doi: 10.1109/TIT.2007.909108
  • Vidakovic B. Statistical modelling by wavelets. New York: Wiley; 1999. p. 115–116.
  • Yan, J. Wavelet matrix. Victoria (BC), Canada: Department of Electrical and Computer Engineering, University of Victoria; 2009 Nov.
  • Jain A. Fundamentals of digital image processing. New Jersey (NJ): Prentice Hall Inc; 1999.
  • Zhang X, Kan L. Comments on an SVD based watermarking scheme for protection rightful ownership. IEEE Trans Multimedia. 2005;7(2):593–594. doi: 10.1109/TMM.2005.843357
  • Simoncelli E. Least Squares Optimization. Lecture Notes. 2003. Available from: http://www.cns.nyu.edu/~eero/math-tools/Handouts/leastSquares.pdf.
  • MedPixTM Medical Image Database. Available from: http://rad.usuhs.mil/medpix/medpix.html, https://medpix.nlm.nih.gov/home.
  • Kutter M, Petitcolas F. A fair benchmark for image watermarking systems. Electron Imaging’ 99, Security Watermarking of Multimedia Contents. 1999 Jan;3657:1–14.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.