Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
With the rapid development of technology in digital multimedia, manipulation and misconduct of digital data are soaring. The watermarking procedure is seen as helpful to protect the security of digital images which are highly confidential such as medical images. In this study, an efficient watermark...
| Main Authors: | Syifak Izhar, Hisham, Afifah Nailah, Muhammad, Gran, Badshah, Nasrul Hadi, Johari, Jasni, Mohamad Zain |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2016
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/14695/ http://umpir.ump.edu.my/id/eprint/14695/1/Numbering%20with%20spiral%20pattern%20to%20prove%20authenticity%20and%20integrity%20in%20medical%20images.pdf |
Similar Items
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Authentication System for Medical Images Using Hilbert Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2014)
by: Syifak Izhar, Hisham, et al.
Published: (2014)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Comparative analysis on raster, spiral, hilbert, and peano mapping pattern of fragile watermarking to address the authentication issue in healthcare system
by: Syifak Izhar, Hisham, et al.
Published: (2019)
by: Syifak Izhar, Hisham, et al.
Published: (2019)
Enhanced LSB watermarking methods based on scanning patterns for authentication of medical images
by: Syifak Izhar, Hisham
Published: (2016)
by: Syifak Izhar, Hisham
Published: (2016)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Using Spiral Scan Technique for Medical Image Watermarking with Tamper Detection and Recovery
by: Afifah Nailah, Muhamad, et al.
Published: (2007)
by: Afifah Nailah, Muhamad, et al.
Published: (2007)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)
by: Tiew, Boon Li, et al.
Published: (2022)
HILBERT-LSB-C as Authentication System for Color Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2015)
by: Syifak Izhar, Hisham, et al.
Published: (2015)
Watermarking of single and multi frame ultrasound medical images
by: Gran, Badshah
Published: (2016)
by: Gran, Badshah
Published: (2016)
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)
by: Gran, Badshah, et al.
Published: (2016)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
Watermark Compression in Medical Image Watermarking Using
Lempel-Ziv-Welch (LZW) Lossless Compression Technique
by: Badshah, Gran, et al.
Published: (2016)
by: Badshah, Gran, et al.
Published: (2016)
A Quick Glance at Digital Watermarking in Medical Images Technique Classification, Requirements, Attacks and Application of Tamper Localization
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Intrusion detection system using autoencoder based deep neural network for SME cybersecurity
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
A Quick Glance at Numerical Modeling in Obstructed Human Airway
by: Nasrul Hadi, Johari, et al.
Published: (2012)
by: Nasrul Hadi, Johari, et al.
Published: (2012)
Low-Energy Plasma Focus Proves Medical Grade Radioactivity Production
by: Roshan, M.V, et al.
Published: (2018)
by: Roshan, M.V, et al.
Published: (2018)
Galaxy Zoo: star formation versus spiral arm number
by: Hart, Ross E., et al.
Published: (2017)
by: Hart, Ross E., et al.
Published: (2017)
Galaxy Zoo and SPARCFIRE: constraints on spiral arm formation mechanisms from spiral arm number and pitch angles
by: Hart, Ross E., et al.
Published: (2017)
by: Hart, Ross E., et al.
Published: (2017)
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
by: Liew, Siau-Chuin, et al.
Published: (2015)
by: Liew, Siau-Chuin, et al.
Published: (2015)
Malaysian varsities prove their worth
by: Mustafa, Zulita
Published: (2018)
by: Mustafa, Zulita
Published: (2018)
An improved mapping pattern for Digital Watermarking using Hilbert-Peano Pattern
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
A Quick Glance at Digital Watermarking in PACS
by: Syifak Izhar, Hisham, et al.
Published: (2012)
by: Syifak Izhar, Hisham, et al.
Published: (2012)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile cloud computing & mobile's battery efficiency approaches: A review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Green concrete proves more durable to fire
by: Sarker, Prabir, et al.
Published: (2015)
by: Sarker, Prabir, et al.
Published: (2015)
A jurisprudential study: proving witchcraft in Africa
by: Mosaka, Tshepo Bogosiboile
Published: (2021)
by: Mosaka, Tshepo Bogosiboile
Published: (2021)
Covid-19 Embedded with Aerosol Particles Travel Simulation Inside a Mosque
by: Mohd Rezan, Hamji Ajirun, et al.
Published: (2023)
by: Mohd Rezan, Hamji Ajirun, et al.
Published: (2023)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
Digital Watermarking in Medical Images
by: Jasni, Mohamad Zain
Published: (2005)
by: Jasni, Mohamad Zain
Published: (2005)
Design of a cavity backed spiral antenna with improved pattern symmetry
by: Mohamad, Sarah Yasmin, et al.
Published: (2013)
by: Mohamad, Sarah Yasmin, et al.
Published: (2013)
A modified PEC-backed spiral antenna with improved pattern symmetry
by: Sulong, Nurul Iffarina, et al.
Published: (2017)
by: Sulong, Nurul Iffarina, et al.
Published: (2017)
Similar Items
-
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013) -
Authentication System for Medical Images Using Hilbert Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2014) -
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013) -
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022) -
Comparative analysis on raster, spiral, hilbert, and peano mapping pattern of fragile watermarking to address the authentication issue in healthcare system
by: Syifak Izhar, Hisham, et al.
Published: (2019)