References
[1]. GouenouCoatrieux., Clara le Guillou., J. Cauvin and
Ch, Roux. (2009). Reversible watermarking for knowledge
digest embedding and reliability control in medical
images. IEEE Transaction on information technology in
biomedicine, Vol.13,No.2,March.
[2]. G.Coatrieux., M. lamard., W. Daccache., j. Puentes.,
and C. Roux. (2005). A low distortion and reversible
watermark application in angiographic images of the
retina. In Proc. IEEE-EMBC, Shanghai, China, pp.2224-
2227.
[3]. W.Pan., G. Coatrieux., N. Cuppens-Boulahia., F.
Cuppens and Ch. Roux. (2009). Medical image integrity
control combining digital signature and lossless
watermarking, published in 2nd SSETOP International
Workshop On Autonomous And Spontaneous Security,
Saint Malo: France, 2009, Version 1-14 Jan.
[4]. Micheal W. Marcellin., micheal J. Garmish., Ali Bilgin
and Martin p.bolick. (2000). An overview of JPEG-2000,”
in Proc IEEE data compression conference, pp.523-541.
[5].Joshua Raines., William Tolli., Joseph Holmes.
(2004).VHDL Implementation of JPEG-LS Algorithm, SJBVHDL,
October.
[6]. Changjiang Zhang et al (2008). Digital Image
watermarking with Double encryption by Arnold Transform
and Logistic, Fourth International Conference On
Networked Computing & Advanced Information
Management, pp. 329-334.
[7]. C.Y.Lin and S.F. Chang. (2001). Arobust image
authentication method distinguishing jpeg compression
from malicious manipulation, IEEE Trans. On Circuits and
Systems of Video Technology, 11:153--168, Feb.
[8]. F.A. Petitcolas, R.Anderson, and M. Kuhn (1999).
Information hiding: A survey. Proceedings of the IEEE, July,
Vol. 87, pp. 1062—1078.
[9]. Minati Mishra., Ashanta Ranjan Routary and Sunil
kumar. (2012). High Security Image Steganography with
modified Arnold's cat map method, International Journal
Of Computer Application (0975-8887), Vol 37-No9, Jan.
[10]. Shima Ramesh Maniyath and Supriya. M. (2011). An
uncompressed Image encryption algorithm based on
DNA Sequencesin CCSEA, CS &IT-CSCP.
[11]. G. C. Langelaar., I. Setyawan., and R. I. Lagendijk.
(2000). Watermarking Digital Image and Video Data, in
IEEE Signal Processing Magazine, pp. 20- 46, September.
[12]. Gcoatrieux., Clara le Guillou., J. Cauvin., L. locarnu
and Ch, Roux. (2006). Enhancing shared medical image
functionalities with image knowledge digest and
watermarking, presented in the IEEE EMBCconf.Int.Technol.
Appl.Biomed.Joannina, Greece, Oct
[13]. Digital imaging and Communication in Medicine
( DICOM)Standard.(2007)[online] .
Available:www.nema.org.
[14]. C.C.Chang and I.C.Lin.(2004).Remarks in
fingerprint-based remote user authentication scheme
using smart cards, ACM operating system review, Vol.38,
no.3, pp.91-100, Oct.
[15]. C.C. Chang., W.L. Tai and M.H. Lin. (2005). A
reversible data hiding scheme with modified side match
vector quantization, in Proc Of The International
Conference On Advanced Information Networking And
Applications, Vol.1,pp.947-952, Tai-Wan,March.
[16]. Mohammad Reza Keyvanpour., FarnooshMerrikh-
Bayat (2010). A new encryption method for secure
embedding in image watermarking, in Proc Third
International Conference On Advanced Computer
Theory And Engineering, Vol2, pp.402-407.
[17]. GCoatrieux., Catherin Quantin., JulienMontagner.,
Manianne Fazza Francois-Andre Allert and Ch. Roux
(2008). Water marking medical images with anonymous
patient identification to verify authenticity. in the Health
beyond the horizon, pp.667-672.
[18]. A. Umamageswari., M. FerniUkrit., Dr. G.R. Suresh
(2011). A survey on security in medical image
communication. International Journal Of Computer
Application, Vol. 3, September, pp. 41-45.
[19]. RC Gonzalez, RE Wood (2006). Digital Image
Processing, 2nd Ed, PHI, New Delhi.
[20]. Ma Li, XiaoshiZheng., yanlingZhao., huiminwu,
Shifeng l. (2008). Robust algorithm of Digital Image water
marking based on Discrete Wavelet Transform, Electronic
Commerce and Security, International Symposium, on
Volume, Issue, 3-5 August, pp.942-945.
[ 2 1 ] . Saied Qamirg h o l i p o u r k a s m a n i ,
Ahmadrezanaghsh-Nilchi (2008). A new Robust Digital
Image Water marking technique based on Joint DWT-DCT
transformation, Convergence and hybrid Information
technology, ICCIT'08, Third International Conference, on
1113, Vol:2, pp.539-544.
[22]. William stallings. (2010). Cryptography and network
security.