Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference30 articles.
1. Akhavan A et al (2015) Cryptanalysis of “an improvement over an image encryption method based on total shuffling.” Opt Commun 350(2015):77–82
2. Akkus Z, Sedlar J, Coufalova L, Korfiatis P, Kline TL, Warner JD, Agrawal J, Erickson BJ (2015) Semi-automated segmentation of preoperative low grade gliomas in magnetic resonance imaging. Cancer Imaging 15(1):1–12
3. Al-Haj A (2015) Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images. J Digit Imaging 28:179–187
4. Ales R et al (2017) Reversible watermarking in medical imaging with zero distortion in ROI. 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS), Batumi, Georgia, December 5–8, pp 356–359
5. Atta UR et al (2018) Robust and fragile medical image watermarking: a joint venture of coding and chaos theories. J Healthc Eng 2018:1–11