• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4643668)   Today's Articles (354)   Subscriber (50597)
For: Das S, Kundu MK. Effective management of medical information through ROI-lossless fragile image watermarking technique. Comput Methods Programs Biomed 2013;111:662-675. [PMID: 23816251 DOI: 10.1016/j.cmpb.2013.05.027] [Citation(s) in RCA: 19] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/09/2012] [Revised: 04/26/2013] [Accepted: 05/26/2013] [Indexed: 06/02/2023]
Number Cited by Other Article(s)
1
Gull S, Parah SA. Advances in medical image watermarking: a state of the art review. MULTIMEDIA TOOLS AND APPLICATIONS 2023:1-41. [PMID: 37362709 PMCID: PMC10161187 DOI: 10.1007/s11042-023-15396-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/07/2022] [Revised: 02/21/2023] [Accepted: 04/18/2023] [Indexed: 06/28/2023]
2
Sinhal R, Ansari IA. Machine learning based multipurpose medical image watermarking. Neural Comput Appl 2023:1-22. [PMID: 37362569 PMCID: PMC10036986 DOI: 10.1007/s00521-023-08457-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/04/2021] [Accepted: 03/03/2023] [Indexed: 03/26/2023]
3
Meng X, Li J, Di X, Sheng Y, Jiang D. An Encryption Algorithm for Region of Interest in Medical DICOM Based on One-Dimensional eλ-cos-cot Map. ENTROPY (BASEL, SWITZERLAND) 2022;24:901. [PMID: 35885124 PMCID: PMC9317079 DOI: 10.3390/e24070901] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/04/2022] [Revised: 06/21/2022] [Accepted: 06/22/2022] [Indexed: 02/01/2023]
4
Boopathiraja S, Punitha V, Kalavathi P, Surya Prasath VB. COMPUTATIONAL 2D and 3D MEDICAL IMAGE DATA COMPRESSION MODELS. ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING 2022;29:975-1007. [PMID: 35342283 PMCID: PMC8942405 DOI: 10.1007/s11831-021-09602-w] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
5
Optimal Medical Image Size Reduction Model Creation Using Recurrent Neural Network and GenPSOWVQ. JOURNAL OF HEALTHCARE ENGINEERING 2022;2022:2354866. [PMID: 35256896 PMCID: PMC8898112 DOI: 10.1155/2022/2354866] [Citation(s) in RCA: 9] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/01/2021] [Accepted: 01/03/2022] [Indexed: 12/19/2022]
6
Sinhal R, Sharma S, Ansari IA, Bajaj V. Multipurpose medical image watermarking for effective security solutions. MULTIMEDIA TOOLS AND APPLICATIONS 2022;81:14045-14063. [PMID: 35233177 PMCID: PMC8874744 DOI: 10.1007/s11042-022-12082-0] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 03/15/2021] [Revised: 11/23/2021] [Accepted: 01/04/2022] [Indexed: 06/14/2023]
7
Janani T, Brindha M. A secure medical image transmission scheme aided by quantum representation. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2021.102832] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
8
ROI-based medical image watermarking for accurate tamper detection, localisation and recovery. Med Biol Eng Comput 2021;59:1355-1372. [PMID: 33990889 DOI: 10.1007/s11517-021-02374-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/27/2020] [Accepted: 04/29/2021] [Indexed: 10/21/2022]
9
Janani T, Darak Y, Brindha M. Secure Similar Image Search and Copyright Protection over Encrypted Medical Image Databases. Ing Rech Biomed 2021. [DOI: 10.1016/j.irbm.2020.02.005] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
10
Secure Exchange of Medical Data Using a Novel Real-Time Biometric-Based Protection and Recognition Method. ELECTRONICS 2020. [DOI: 10.3390/electronics9122013] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
11
An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 2020. [DOI: 10.1016/j.bspc.2019.101665] [Citation(s) in RCA: 43] [Impact Index Per Article: 10.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
12
Zhong X, Shih FY. A High-Capacity Reversible Watermarking Scheme Based on Shape Decomposition for Medical Images. INT J PATTERN RECOGN 2018. [DOI: 10.1142/s0218001419500010] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
13
Nipanikar S, Hima Deepthi V. A Multiple Criteria-Based Cost Function Using Wavelet and Edge Transformation for Medical Image Steganography. JOURNAL OF INTELLIGENT SYSTEMS 2018. [DOI: 10.1515/jisys-2016-0095] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]  Open
14
Ustubioglu A, Ulutas G. A New Medical Image Watermarking Technique with Finer Tamper Localization. J Digit Imaging 2018;30:665-680. [PMID: 28243865 DOI: 10.1007/s10278-017-9960-y] [Citation(s) in RCA: 20] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]  Open
15
Ulutas G, Ustubioglu A, Ustubioglu B, V Nabiyev V, Ulutas M. Medical Image Tamper Detection Based on Passive Image Authentication. J Digit Imaging 2018;30:695-709. [PMID: 28484919 DOI: 10.1007/s10278-017-9961-x] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]  Open
16
Singh A, Dutta MK. A Reversible Data Hiding Scheme for Efficient Management of Tele-Ophthalmological Data. Ophthalmology 2018. [DOI: 10.4018/978-1-5225-5195-9.ch011] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]  Open
17
Singh A, Dutta MK. A Reversible Data Hiding Scheme for Efficient Management of Tele-Ophthalmological Data. INTERNATIONAL JOURNAL OF E-HEALTH AND MEDICAL COMMUNICATIONS 2017. [DOI: 10.4018/ijehmc.2017070103] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
18
Badshah G, Liew SC, Zain JM, Ali M. Watermark Compression in Medical Image Watermarking Using Lempel-Ziv-Welch (LZW) Lossless Compression Technique. J Digit Imaging 2017;29:216-25. [PMID: 26429361 DOI: 10.1007/s10278-015-9822-4] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]  Open
19
Protection of Health Imagery by Region Based Lossless Reversible Watermarking Scheme. ScientificWorldJournal 2016;2015:489348. [PMID: 26649328 PMCID: PMC4663007 DOI: 10.1155/2015/489348] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/22/2015] [Accepted: 10/15/2015] [Indexed: 11/17/2022]  Open
20
Al-Dmour H, Al-Ani A. Quality optimized medical image information hiding algorithm that employs edge detection and data coding. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2016;127:24-43. [PMID: 27000287 DOI: 10.1016/j.cmpb.2016.01.011] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/20/2015] [Revised: 01/09/2016] [Accepted: 01/11/2016] [Indexed: 06/05/2023]
21
Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB. Medical data sheet in safe havens - A tri-layer cryptic solution. Comput Biol Med 2015;62:264-76. [PMID: 25966921 DOI: 10.1016/j.compbiomed.2015.04.031] [Citation(s) in RCA: 50] [Impact Index Per Article: 5.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/02/2014] [Revised: 04/14/2015] [Accepted: 04/16/2015] [Indexed: 11/16/2022]
22
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities. JOURNAL OF INFORMATION PROCESSING SYSTEMS 2015. [DOI: 10.3745/jips.03.0044] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
23
Lee WB, Lee CD, Ho KIJ. A HIPAA-compliant key management scheme with revocation of authorization. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2014;113:809-814. [PMID: 24480372 DOI: 10.1016/j.cmpb.2014.01.003] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/16/2013] [Revised: 12/24/2013] [Accepted: 01/02/2014] [Indexed: 06/03/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA