Emami et al., 2013 - Google Patents
A low-cost method for reliable ownership identification of medical images using SVM and Lagrange dualityEmami et al., 2013
- Document ID
- 11738055549524723592
- Author
- Emami M
- Omar K
- Publication year
- Publication venue
- Expert systems with applications
External Links
Snippet
Prevention of false positive and false negative errors is a major challenge for ownership identification and proof of ownership applications using digital image watermarking. Such errors are more critical with sensitive data, such as electronic patient records (EPRs) in …
- 238000000034 method 0 abstract description 62
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/10—Image acquisition modality
- G06T2207/10024—Color image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/30—Subject of image; Context of image processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Evsutin et al. | Digital steganography and watermarking for digital images: A review of current research directions | |
Wang et al. | A robust blind color image watermarking in quaternion Fourier transform domain | |
Liu et al. | Neighboring joint density-based JPEG steganalysis | |
Fatahbeygi et al. | A highly robust and secure image watermarking based on classification and visual cryptography | |
Ryu et al. | Detecting trace of seam carving for forensic analysis | |
Laishram et al. | A novel minimal distortion-based edge adaptive image steganography scheme using local complexity: (BEASS) | |
Swaraja et al. | Hierarchical multilevel framework using RDWT-QR optimized watermarking in telemedicine | |
Chakraborty | PRNU-based image manipulation localization with discriminative random fields | |
Hu et al. | Learning-based image steganography and watermarking: A survey | |
Sisaudia et al. | A secure gray-scale image watermarking technique in fractional DCT domain using zig-zag scrambling | |
Emami et al. | A low-cost method for reliable ownership identification of medical images using SVM and Lagrange duality | |
Kumar et al. | WSOmark: An adaptive dual-purpose color image watermarking using white shark optimizer and Levenberg–Marquardt BPNN | |
Sharma et al. | A rotationally invariant texture descriptor to detect copy move forgery in medical images | |
Radha Kumari et al. | Deep learning-based image watermarking technique with hybrid DWT-SVD | |
Rupa et al. | IOMT Privacy Preservation: A Hash-Based DCIWT approach for detecting tampering in medical data | |
CN104156909A (en) | Robust reversible watermark embedding and detecting method on basis of image content | |
Singh et al. | Roi-fuzzy based medical data authentication scheme for smart healthcare system | |
Singh et al. | Recent innovations in computing | |
Zhong et al. | Steganographer detection via multi-scale embedding probability estimation | |
Nataraj et al. | Holistic image manipulation detection using pixel co-occurrence matrices | |
CN116644422A (en) | Malicious code detection method based on malicious block labeling and image processing | |
You et al. | Two-stage watermark removal framework for spread spectrum watermarking | |
Vyas et al. | Study of Image Steganalysis Techniques. | |
Fan et al. | Natias: Neuron Attribution based Transferable Image Adversarial Steganography | |
Chacko et al. | Detection of image forgery in digital images using DCT and DWT |