Author:
Chauhan Digvijay Singh,Singh Amit Kumar,Kumar Basant,Saini J. P.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference27 articles.
1. O M Al-Qershi and B E Khoo (2010) ROI–based tamper detection and recovery for medical images using reversible watermarking technique, in: IEEE International Conference on Information Theory and Information Security, Beijing pp. 151–155
2. MH Alwan, M Singh and HF Mahdi (2015) Performance comparison of turbo codes with LDPC codes and with BCH codes for forward error correcting codes, Kuala Lumpur, pp. 556–560
3. D Bowma (2012) http://www.fiercehealthit.com/story/researchers-use-digital-watermarks-protect- medical-images
4. Dhanalakshmi R, Thaiyalnayaki K (2010) Dual watermarking scheme with encryption. International Journal of Computer Science and Information Security 7:248–253
5. Eswaraiah R, Reddy ES (2015) Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process 9(8):615–625
Cited by
49 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献