55
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

A robust and high embedding capacity watermarking technique for telemedicine

Pages 537-548 | Received 22 Nov 2021, Accepted 27 Feb 2023, Published online: 20 Mar 2023

References

  • Fidakar MZ, Anwer AA. Thresholding-based white blood cells segmentation from microscopic blood images. UHD J Sci Technol. 2020;4(1):9–17.
  • Islam M, Roy A, Laskar RH. SVM-based robust image watermarking technique in LWT domain using different sub-bands. Neural Comput Appl. 2020;32:1–25.
  • Lee T-Y, Lin SD. Dual watermark for image tamper detection and recovery. Pattern Recognit. 2008;41(11):3497–3506.
  • Qi X, Xin X. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent. 2015;30:312–327.
  • Tai W-L, Liao Z-J. Image self-recovery with watermark self-embedding. Signal Process, Image Commun. 2018;65:11–25.
  • Wang C, Zhang H, Zhou X. A self-recovery fragile image watermarking with variable watermark capacity. Applied Sciences. 2018;8(4):548.
  • Loan NA, Hurrah NN, Parah SA, et al. Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access. 2018;6:19876–19897.
  • Azeroual A, Afdel K. Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet. AEU-Int J Electron Commun. 2017;79:207–218.
  • Hurrah NN, Parah SA, Loan NA, et al. Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gener Comput Syst. 2019;94:654–673.
  • Gull S, Loan NA, Parah SA, et al. An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput. 2018;11:1799–1808.
  • Abdulaziz S, Mohamed E, Muhammad K, et al. Secure and robust fragile watermarking scheme for medical images. IEEE Access. 2018;6:10269–10278.
  • Gouenou C, Guillou CL, Cauvin JM, et al. Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed. 2009;13(2):158–165.
  • Luiz OMK, Sergio SF, Paulo SLMB. Providing integrity and authenticity in DICOM images: A novel approach. IEEE Trans Inf Technol Biomed. 2009;13(4):582–589.
  • Kamran M, Farooq M. An information-preserving watermarking scheme for right protection of EMR systems. IEEE Trans Knowl Data Eng. 2012;24(11):1950–1962.
  • Al-Haj A, Mohammad A, Amer A. Crypto-watermarking of transmitted medical images. J Digit Imaging. 2016;30(1):26–38.
  • Badshah G, Liew SC, Zain JM, et al. Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J Digit Imaging. 2016;29:216–225.
  • Hui LK, Siau CL, Jasni MZ. Region of interest-based tamper detection and lossless recovery watermarking scheme (ROI-DR) on ultrasound medical images. J Digit Imaging. 2017;30(3):328–349.
  • Rasha T, Bee EK. Medical image authentication using SLT and IWT schemes. Multimed Tools Appl. 2017;76:309–332.
  • Priyanka SM. Region-based hybrid medical image watermarking for secure telemedicine applications. Multimed Tools Appl. 2017;76:3617–3647.
  • Rajitha B, Shivendra S, Suneeta A. Self-authenticating medical X-ray images for telemedicine applications. Multimed Tools Appl. 2018;77:8375–8392.
  • Xiyao L, Jieting L, Hui F, et al. A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images. IEEE Access. 2019;7:76580–76598.
  • Shaozhang X, Zhengwei Z, Yue Z, et al. Multipurpose watermarking algorithm for medical images, Hindawi Scientific Programming; 2020.
  • Hanan SA. Medical image watermarking for ownership & tamper detection. Multimed Tools Appl. 2020;80:16549–16564.
  • Jessie O, Hui LK, Siau CL. Region of interest-based tamper detection and lossless recovery watermarking scheme on MRI and X-ray medical images. IOP Conf Ser: Mater Sci Eng. 2020;769:012068.
  • Swaraja K, Meenakshi K, Padmavathi K. An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control. 2020;55:101665.
  • Dhivya R, Padmapriya P, Sundararaman R, et al. ROI-based medical image watermarking for accurate tamper detection, localisation and recovery. Med Biol Eng Comput. 2021;59:1355–1372.
  • Zhaoning Y, Yan L, Tiegang G. A lossless self-recovery watermarking scheme with JPEG-LS compression. J Inf Secur Appl. 2021;58:102733.
  • Ahmed AM, Mohammed AMA, Sohaib RA, et al. A novel FDCT-SVD based watermarking with radon transform for telemedicine applications. Int J Intell Eng Syst. 2022;15:64–74.
  • Li Q, Fu Y, Zhang Z, et al. Medical images lossless recovery based on POB number system and image compression. Multimed Tools Appl. 2022;81:11415–11440.
  • Sinhal R, Sharma S, Ansari IA, et al. Multipurpose medical image watermarking for effective security solutions. Multimed Tools Appl. 2022;81:14045–14063.
  • Gao H, Gao T. A secure lossless recovery for medical images based on image encoding and data self-embedding. Cluster Comput. 2022;25:707–725.
  • Donoho DL. Ridge functions and orthonormal ridgelets. J Approx Theory. 2001;111(2):143–179.
  • Alzubi S, Islam N, Abbod M. Multiresolution analysis using wavelet, ridgelet, and curvelet transforms for medical image segmentation. Int J Biomed Imaging. 2011: 18.
  • He J. A characterization of inverse radon transform on the Laguerre hypergroup. J Math Anal Appl. 2006;318(1):387–395.
  • Dettori L, Semler L. A comparison of wavelet, ridgelet and curvelet-based texture classification algorithms in computed tomography. Comput Biol Med. 2007;37(4):486–498.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.