Peng et al., 2024 - Google Patents
Medical steganography: Enhanced security and image quality, and new SQ assessmentPeng et al., 2024
- Document ID
- 2662950311411886728
- Author
- Peng Y
- Fu C
- Zheng Y
- Tian Y
- Cao G
- Chen J
- Publication year
- Publication venue
- Signal Processing
External Links
Snippet
Medical diagnosing systems generate sensitive information involving the patient's privacy. Steganography supports securely embedding secrecy, guaranteeing that an adversary cannot distinguish cover images and stego images. However, directly applying natural …
- 230000003044 adaptive effect 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wang et al. | Reversible data hiding scheme based on significant‐bit‐difference expansion | |
| Qin et al. | Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy | |
| Hong | Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique | |
| Yin et al. | Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement | |
| Hameed et al. | A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques | |
| Malik et al. | A reversible data hiding scheme for interpolated images based on pixel intensity range | |
| Peng et al. | Medical steganography: Enhanced security and image quality, and new SQ assessment | |
| CN101976428B (en) | Binary image fragile watermark embedding and extraction method based on topology structure | |
| Malik et al. | Recovery based high capacity reversible data hiding scheme using even-odd embedding | |
| Su et al. | Effective self-recovery and tampering localization fragile watermarking for medical images | |
| US8650402B2 (en) | General data hiding framework using parity for minimal switching | |
| Boujerfaoui et al. | Image watermarking between conventional and learning-based techniques: a literature review | |
| He et al. | A secure image sharing scheme with high quality stego-images based on steganography | |
| Li et al. | Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication | |
| CN107689026A (en) | Reversible steganography method based on optimum code | |
| Gong et al. | A secure image authentication scheme based on dual fragile watermark | |
| Wen et al. | Joint coverless steganography and image transformation for covert communication of secret messages | |
| Wang et al. | Reversible data hiding based on two‐dimensional prediction errors | |
| Swain et al. | An effective watermarking technique using BTC and SVD for image authentication and quality recovery | |
| Pal et al. | Robust watermarking scheme for tamper detection and authentication exploiting CA | |
| Ye et al. | Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift | |
| Lin et al. | Pixel-based fragile image watermarking based on absolute moment block truncation coding | |
| Panchikkil et al. | A pseudo-random pixel mapping with weighted mesh graph approach for reversible data hiding in encrypted image | |
| Gao et al. | Blind reversible authentication based on PEE and CS reconstruction | |
| Yang et al. | Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme |