References
[1]. Deepthi Anand., U. C. Niranjan (1998). “Watermarking Medical Images with Patient Information”,
Int. Conf. of IEEE Engineering in Medicine and Biology, Vol.
20, No. 2, pp. 703 – 706.
[2]. G. Coatrieux, L. Lecornu, B. Sankur, Ch. Roux ( 2006).
“A Review of Image Watermarking Applications in
Healthcare”, Proceedings of the 28th IEEE, pp. 4691-
4694.
[3]. C. S. Lu and H. Y. M. Liao (2001). “Multipurpose
Watermarking For Image Authentication and Protection”,
IEEE Trans. Image Processing, Vol. 10, No. 10, pp.1579-
1592.
[4]. G. Coatrieux, C. Le Guillou, J.M. Cauvin and C. Roux.
(2009). “Reversible Watermarking For Knowledge Digest
Embedding and Reliability Control In Medical Images”,
IEEE Transactions on Information Technology, Vol. 13, No.
2, pp. 158-165.
[5]. JansiMohamadZain,(2010). “Strict Authentication
Watermarking with JPEG Compression For Medical
Images”, European Journal of Scientific Research, Vol.
42, No. 2, pp. 232-241.
[6]. C. D. Schou, J. Frost, W. V. (2004). Maconachy,
"Information Assurance in Biomedical Informatics
Systems", IEEE Engineering in Medicine and Biology
Magazine, Vol. 23, No.1, pp. 110–118.
[7]. Pal, K., G. Ghosh and M. Bhattacharya. (2012).
“Biomedical Image Watermarking in Wavelet Domain for
Data Integrity Using Bit Majority Algorithm and Multiple
Copies of Hidden Information”, American Journal of
Biomedical Engineering, Vol.2, No.2, pp- 29-37.
[8]. X. Luo, Q. Chanag, J. Tun. (2003). "A Lossless Data
Hiding Scheme for Medical Images in Application of ediagnosis",
Proceedings of the 12th Annual International
Conference of IEEE, EMBS, Cancum, Mexico, pp.17-21.
[9]. Y. Wang, J. F. Doherty and R. E. Van Dyck. (2000). “A
Wavelet-Based Watermarking Algorithm for Ownership
Verification of Digital Images”, IEEE Transactions on Image
Processing, Vol.11, No. 2, pp.77-88.
[10]. C. C. Lai, C. C. Tsai, (2010). "Digital image
watermarking using discrete wavelet transform and
singular value decomposition", IEEE Trans .
Instrumentation and Measurement, Vol. 59, No. 11, pp.
3060-3067.
[11]. M. Jiansheng, L. Sukang, and Tan Xiaomei, (2009).
“A digital watermarking algorithm based on DCT and
DWT”, Proceedings of the 2009 International Symposium
on Web Information Systems and Applications (WISA '09),
Nanchang, PR China, pp. 104–107.
[12]. Li, Qiang, Chun Yuan, and Yu-ZhuoZhong., (2007).
"Adaptive DWT-SVD domain image watermarking using
human visual model", Advanced Communication
Technology, The 9th International Conference, Vol. 3.
IEEE.
[13]. W. Sweldens, (1995). "The Lifting Scheme: A New
Philosophy in Biorthogonal Wavelet Constructions",
Proceedings of SPIE, pp.68-79.
[14]. Daubechies and W. Sweldens, (1998). "Factoring
Wavelet Transfroms into Lifting Schemes," The Journal of
Fourier Analysis and Applications, Vol. 4, pp. 247-269.
[15]. N. Venkatram, L.S.S.Reddy, P.V.V.Kishore, (2014). ”
Blind Medical Image Watermarking with LWT – SVD for
Telemedicine Applications”, Wseas Transactions On Signal Processing, Vol.10, pp-288-300.
[16]. R.-S. Run, S.-J. Horng, J.-L. Lai, T.-W. Kao, R.-J. Chen,
(2012). "An improved SVD-based watermarking
technique for copyright protection", Expert Systems with
Applications 39, pp. 673-689.
[17]. A. A. Mohammad, A. Alhaj, S. Shaltaf, (2008). "An
improved SVD-based watermarking scheme for
protecting rightful ownership", Signal Processing, Vol. 88,
No. 9, pp. 2158-2180.
[18]. Liu, T. Tan, (2002). "An SVD-based watermarking
scheme for protecting rightful ownership", IEEE Trans.
Multimedia, Vol. 4, No. 1, pp. 121-128.
[19]. D. V. S. Chandra, (2002). "Digital Image
Watermarking Using Singular Value Decomposition",
Proceedings of 45th IEEE Midwest Symposium on Circuits
and Systems, Tulsa, OK, pp. 264-267.
[20]. Yavuz, Erkan, and ZiyaTelatar. (2007). "Improved
SVD-DWT based digital image watermarking against
watermark ambiguity”, Proceedings of the 2007 ACM
symposium on Applied computing, ACM.
[21]. E. Thambiraja, G. Ramesh, and R. Umarani, (2012). A
survey on various most common encryption techniques,
Int J Adv Res ComputSci Software Eng, Vol. 2, pp.
226–233.
[22]. R. L. Rivest, A. Shamir and L. Adleman, (1978). “A
method for obtaining digital signatures and public-key
cryptosystems”, Communications of the ACM, Vol. 21,
No. 2, pp. 120-126.
[23]. Xin Zhou, Xiaofei Tang, (2011). “Research and
Implementation of RSA Algorithm for Encryption and
Decryption”, 6th International Forum on Strategic
Technology, IEEE, pp.1118 – 1121.
[24]. PKCS #1 v2.2: RSA Cryptography Standard RSA
Laboratories October 27, 2012.
[25]. Advanced Encryption Standard (AES), (2001).
Federal Information Processing Standards Publication
197, November 26, 2001.
[26]. W. Puech, J.M. Rodrigues, (2004). “A new crypto
watermarking method for medical images safe transfer”,
Proceedings of the 12th European signal processing conference, Vienna, Austria, pp. 1481–1484.
[27]. V. Aslantas, (2009). "An optimal robust digital image
watermarking based on SVD using differential evolution
algorithm", Optics Communications 282, pp.769-777.
[28]. R. Storn, K. Price, (1997). "Differential evolution- A
simple and efficient heuristic for global optimization over
continuous spaces", J.of Global Optimization, Vol. 11, No.
4, pp.341-359.
[29]. V. Aslantas, L. A. Dog & abreve;n and S. Ozturk
(2008). "DWT-SVD based image watermarking using
particle swarm optimizer", Proc. IEEE Int. Conf. Multimedia
Expo, pp.241 -244 .
[30]. SivavenkateswaraRao . V., Rajendra S. Shekhawat,
V. K. Srivastava, (2012). “A DWT-DCT-SVD Based Digital
Image Watermarking Scheme Using Particle Swarm Optimization”, IEEE Students' Conference on Electrical,
Electronics and Computer Science.
[31]. Ganic E, Zubair N, Eskicioglu AM. (2003). “An
optimum watermarking scheme based on singular value
decomposition”, International Conference on
Communication Network and Information Security,
Uniondale, Ny, pp.85-90.
[32]. J. Kennedy and R. C. Eberhart (1995). "Particle
Swarm Optimization", Proceedings of IEEE International
Conference on Neural Networks, pp.1942 -8.
[33]. Matlab R 2012 - A Wavelet Tool Box Reference
Manual.
[34]. Matlab R 2012 - An Optimization Tool Box Reference
Manual.