Three layer authentications with a spiral block mapping to prove authenticity in medical images
Digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology. Verifying integrity and authenticity have become important issues on the medical image. This paper proposed a self-embedding watermark using a spiral block mapping for tamper det...
| Main Authors: | Ernawan, Ferda, Aminuddin, Afrig, Eh Phon, Danakorn Nincarean, Mohd Faizal, Ab Razak, Ahmad Firdaus, Zainal Abidin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science and Information Organization
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/34937/ http://umpir.ump.edu.my/id/eprint/34937/1/Three%20Layer%20authentications%20with%20a%20spiral%20block%20mapping%20to%20prove%20authenticity%20in%20medical%20images.pdf |
Similar Items
AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
by: Afrig, Aminuddin, et al.
Published: (2023)
by: Afrig, Aminuddin, et al.
Published: (2023)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
by: Afrig, Aminuddin, et al.
Published: (2024)
by: Afrig, Aminuddin, et al.
Published: (2024)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Self-Recovery in Fragile Image Watermarking Using Integer Wavelet Transform
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Fragile watermarking for image authentication using dyadic walsh ordering
by: Adi, Prajanto Wahyu, et al.
Published: (2023)
by: Adi, Prajanto Wahyu, et al.
Published: (2023)
Dual watermarking based on DCT with human visual characteristics for authentication and copyright protection
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Teacher's ICT skills and readiness of integrating augmented reality in education
by: Azrie, Salleh, et al.
Published: (2021)
by: Azrie, Salleh, et al.
Published: (2021)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
Mobile learning application impact towards student performance in programming subject
by: Nurul Farahah, Abdul Halim, et al.
Published: (2020)
by: Nurul Farahah, Abdul Halim, et al.
Published: (2020)
A blind recovery technique with integer wavelet transforms in image watermarking
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Self-organizing map (SOM) for species distribution modelling of birds species at Kenyir landscape
by: Salwana, Mohamad, et al.
Published: (2019)
by: Salwana, Mohamad, et al.
Published: (2019)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019)
by: Eldow, Abdalla, et al.
Published: (2019)
Comparative analysis on raster, spiral, hilbert, and peano mapping pattern of fragile watermarking to address the authentication issue in healthcare system
by: Syifak Izhar, Hisham, et al.
Published: (2019)
by: Syifak Izhar, Hisham, et al.
Published: (2019)
A block-based RDWT-SVD image watermarking method using human visual system characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Two-factor human authentication
by: Liang, Xian Liang
Published: (2018)
by: Liang, Xian Liang
Published: (2018)
Systematic description of the internet of things: A bibliometric analysis
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
EAP-BASED AUTHENTICATION FOR AD HOC NETWORK
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Smart Home Security Using Facial Authentication
by: Rakshitha, M.V., et al.
Published: (2024)
by: Rakshitha, M.V., et al.
Published: (2024)
EAP-based Authentication with EAP Method Selection Mechanism
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
Weighted Watson-crick automata and applications in halal authentication
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Hybrid biometric authentication for automatic teller machine
by: Arokiasamy, Steven R., et al.
Published: (2024)
by: Arokiasamy, Steven R., et al.
Published: (2024)
Multimedia encryption, transmission and authentication
Published: (2011)
Published: (2011)
Behavioral Biometrics for User Authentication Using Self- Refreshing SOM
by: Teh, Chee Siong, et al.
Published: (2017)
by: Teh, Chee Siong, et al.
Published: (2017)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Authentication Mechanism for Ad Hoc Wireless Local Area Network
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
Development of a web-extension for authentication of online hadith texts
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
Enhancement of a simple user authentication scheme for grid computing
by: Ramamoorthy, Viknesh
Published: (2008)
by: Ramamoorthy, Viknesh
Published: (2008)
Augmented reality: Effect on conceptual change of scientific
by: Eh Phon, Danakorn Nincarean, et al.
Published: (2019)
by: Eh Phon, Danakorn Nincarean, et al.
Published: (2019)
Similar Items
-
AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
by: Afrig, Aminuddin, et al.
Published: (2023) -
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016) -
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022) -
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
by: Afrig, Aminuddin, et al.
Published: (2024) -
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)