4
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      ECDSA-based tamper detection in medical data using a watermarking technique

      , , ,
      International Journal of Cognitive Computing in Engineering
      Elsevier BV

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references44

          • Record: found
          • Abstract: not found
          • Article: not found

          Watermarking techniques for medical data authentication: a survey

            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found
            Is Open Access

            Digital Image Watermarking Techniques: A Review

            Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern. However, it is tough to achieve a watermarking system that is simultaneously robust and secure. This paper gives details of standard watermarking system frameworks and lists some standard requirements that are used in designing watermarking techniques for several distinct applications. The current trends of digital image watermarking techniques are also reviewed in order to find the state-of-the-art methods and their limitations. Some conventional attacks are discussed, and future research directions are given.
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A Robust Image Watermarking Technique Based on DWT, APDCBT, and SVD

                Bookmark

                Author and article information

                Contributors
                Journal
                International Journal of Cognitive Computing in Engineering
                International Journal of Cognitive Computing in Engineering
                Elsevier BV
                26663074
                2024
                2024
                : 5
                : 78-87
                Article
                10.1016/j.ijcce.2024.01.003
                b44582ca-d145-4fbf-b56d-204c2bb71830
                © 2024

                https://www.elsevier.com/tdm/userlicense/1.0/

                https://www.elsevier.com/legal/tdmrep-license

                http://creativecommons.org/licenses/by-nc-nd/4.0/

                History

                Comments

                Comment on this article