Welcome![Sign In][Sign Up]
Location:
Search - medical image watermarking

Search list

[Documentshash

Description: 这是一篇基于Hash函数敏感性的医学图像精确认证.本文提出了一种基于提升格式的整数小波变换和Hash函数敏感性相结合的易碎水印方法-This is a Hash Function Based on the sensitivity of the medical image accurate authentication. In this paper, a lifting scheme based on integer wavelet transform and Hash function that combines the sensitivity of fragile watermarking method
Platform: | Size: 616448 | Author: hj | Hits:

[JSP/JavaMEDICALIMAGESEGMENTATION

Description: medical segmentation (image processing) implementation in Java-medical segmentation (image processing) implementation in Java
Platform: | Size: 257024 | Author: rajan | Hits:

[hospital software systemmedicalimagesROI

Description: 摘 要: 提出了一种基于医学图像中感兴趣区域(ROI)的盲检测水印算法, 将包含重要病理信息的灰度图像作为数字水印, 经置乱后在混沌序列的控制下嵌入到宿主小波域非感兴趣区域中。实验结果表明, 该算法在保护医学 ROI 的同时提高了水印抗 JPEG 压缩的鲁棒性, 并对篡改、 几何剪切、 滤波等均具有良好的鲁棒性和透明性, 而且混沌序列增强了系统的安全性。-Abstract: This paper presents a region of interest based on medical images (ROI) of the blind detection watermarking algorithm will contain important pathological information of gray image as digital watermark, after scrambling after the chaotic sequence embedded into the host under the control of wavelet-domain Non-interest area. The experimental results show that the algorithm in the protection of medical ROI while increasing watermark robustness against JPEG compression, and tampering, cropping, filtering Dengjun has good robustness and transparency, but also enhanced the system chaotic sequence security.
Platform: | Size: 418816 | Author: 还都 | Hits:

[Special EffectsMedical-Information

Description: 这是国外最新的医学图像的数字水印,contourlet变换,不错的学校资料,本人在学习中-This is the latest foreign medical image digital watermarking, contourlet transform, a good school information I learn ...
Platform: | Size: 601088 | Author: linzi | Hits:

[OtherRDH-BY-RRBE

Description: Nowadays, with the rapid growth in formation technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.-Nowadays, with the rapid growth in information technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.
Platform: | Size: 313344 | Author: Devarapu ChakraRao | Hits:

CodeBus www.codebus.net