Open Access Journal
ISSN : 2394 - 6849 (Online)
International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)
Open Access Journal
International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)
ISSN : 2394-6849 (Online)
Reference :
[1] G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, R. Collorec, “Relevance of watermarking in medical imaging,” in Proc. IEEE EMBS Int. Conf. Inf. Technol. Appl. Biomed., 2000, pp. 250–255.
[2] X. Guo and T. Zhuang, “Lossless Watermarking for Verifying the Integrity of Medical Images with Tamper Localization,” Journal of Digital Imaging, vol. 22, no. 6, pp. 620-628, 2009.
[3] Hyung-Kyo Lee, Hee-Jung Kim, Ki-Ryong Kwon, and Jong-Keuk Lee, “Digital watermarking of medical image using ROI information,” in Proc. IEEE Int. Workshop Healthcom, 2005, pp. 404-407.
[4]COX, I.J., MILLER, M.L. and BLOOM, J.A., 2002. Digital Watermarking. San Francisco, CA: Morgan Kaufmann Publishers.
[5]CAO, F., HUANG, H.K. and ZHOU, X.Q., 2003. Medical image security in a HIPAA mandated PACS environment. Computerized Medical Imaging and Graphics, 27 (2-3), pp. 185-196.
[6] Fridrich.J, Goljan.M “Lossless Data Embedding – New paradigm in digital watermarking” Jornal on Applied Signal Processing 2002.
[7] Van Leest.A, Bruekers.F, Van Der Veen.M “Reversible Watermarking” IEEE international conference on image processing 2004 .
[8] Aggeliki.G, Dimitris.K “Medical Image Watermarking Applied to Health Information Management” IEEE Transaction on Information Technology in Biomedicine, Vol.10, No.4 2006.
[9]Kundur .D, Hatzinakos.D, “Digital watermarking for telltale tamper proofing and authentication,” IEEE vol 87, no 7, pp 1167-1180.
[10]Daubechies.I, Sweldens.W , “Factoring Wavelet into lifting steps” Journal of Fourier analysis and applications” Journal of Fourier analysis and application.Vol 4 ,issue 3 1998
[11]Calderbank, Daubechies. “Wavelet transforms that map integers to integers,Journal on applied and computational harmonic analysis vol.5 no.3 pp 332- 369,1998
[12] H. Farid, “Image forgery detection,” IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16-25, 2009.
[13] H. Huang, G. Coatrieux, H. Z. Shu, L. M. Luo, and C. Roux, “Medical image tamper approximation based on an image moment signature,” in Proc. Int. Conf. Healthcom, pp. 254-259 2010.
[14]A.Giakoumaki, S. Pavlopoulos, D. Koutsouris, "Multiple Image Watermarking Applied to Health Information Management," IEEE Trans. on Inf. Tech. in Biom. vol. 10, no. 4, pp.722-732, 2006