基于DWT-SVD的医学图像秘密数据嵌入可逆水印算法

E. Kumar, Remya Elizabeth Philip, P. S. Kumar, M. Sumithra
{"title":"基于DWT-SVD的医学图像秘密数据嵌入可逆水印算法","authors":"E. Kumar, Remya Elizabeth Philip, P. S. Kumar, M. Sumithra","doi":"10.1109/ICCCNT.2013.6726593","DOIUrl":null,"url":null,"abstract":"There are different ways to protect medical images, most commonly used are steganography, watermarking, encryption etc. Due to the advantages of watermarking it has achieved a great importance in the field of image security. This paper gives a comparative analysis on applying SVD on different sub bands of a Haar wavelet transformed medical image. The experimentation is done using MRI and CT scan medical images.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"181 1","pages":"1-7"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"DWT-SVD based reversible watermarking algorithm for embedding the secret data in medical images\",\"authors\":\"E. Kumar, Remya Elizabeth Philip, P. S. Kumar, M. Sumithra\",\"doi\":\"10.1109/ICCCNT.2013.6726593\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are different ways to protect medical images, most commonly used are steganography, watermarking, encryption etc. Due to the advantages of watermarking it has achieved a great importance in the field of image security. This paper gives a comparative analysis on applying SVD on different sub bands of a Haar wavelet transformed medical image. The experimentation is done using MRI and CT scan medical images.\",\"PeriodicalId\":6330,\"journal\":{\"name\":\"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"volume\":\"181 1\",\"pages\":\"1-7\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCNT.2013.6726593\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2013.6726593","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

医学图像的保护方法有很多,最常用的有隐写、水印、加密等。由于水印技术的优点,它在图像安全领域取得了重要的地位。对Haar小波变换后的医学图像在不同子带上应用奇异值分解进行了对比分析。实验采用核磁共振成像和CT扫描医学图像。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
DWT-SVD based reversible watermarking algorithm for embedding the secret data in medical images
There are different ways to protect medical images, most commonly used are steganography, watermarking, encryption etc. Due to the advantages of watermarking it has achieved a great importance in the field of image security. This paper gives a comparative analysis on applying SVD on different sub bands of a Haar wavelet transformed medical image. The experimentation is done using MRI and CT scan medical images.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
“Multi-tenant SaaS cloud” Reduced order linear functional observers for large scale linear discrete-time control systems Multi pattern matching technique on fragmented and out-of-order packet streams for intrusion detection system Detection and tracking of moving objects by fuzzy textures Evacuation map generation using maze routing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1