These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
190 related articles for article (PubMed ID: 18255501)
1. Secret and public key image watermarking schemes for image authentication and ownership verification. Wong PW; Memon N IEEE Trans Image Process; 2001; 10(10):1593-601. PubMed ID: 18255501 [TBL] [Abstract][Full Text] [Related]
2. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images. Zeng W; Liu B IEEE Trans Image Process; 1999; 8(11):1534-48. PubMed ID: 18267429 [TBL] [Abstract][Full Text] [Related]
3. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. Holliman M; Memon N IEEE Trans Image Process; 2000; 9(3):432-41. PubMed ID: 18255414 [TBL] [Abstract][Full Text] [Related]
4. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. Hernández JR; Amado M; Pérez-González F IEEE Trans Image Process; 2000; 9(1):55-68. PubMed ID: 18255372 [TBL] [Abstract][Full Text] [Related]
5. RST invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes. Zheng D; Wang S; Zhao J IEEE Trans Image Process; 2009 May; 18(5):1055-68. PubMed ID: 19336302 [TBL] [Abstract][Full Text] [Related]
6. A fragile watermarking scheme for medical image. Gang W; Ni-Ni R Conf Proc IEEE Eng Med Biol Soc; 2005; 2005():3406-9. PubMed ID: 17280954 [TBL] [Abstract][Full Text] [Related]
7. [A medical image authentication method based on restorable watermarking]. Gong J; Zhong XY; Feng QJ Nan Fang Yi Ke Da Xue Xue Bao; 2008 Jun; 28(6):959-62. PubMed ID: 18583238 [TBL] [Abstract][Full Text] [Related]
8. A RONI Based Visible Watermarking Approach for Medical Image Authentication. Thanki R; Borra S; Dwivedi V; Borisagar K J Med Syst; 2017 Aug; 41(9):143. PubMed ID: 28795315 [TBL] [Abstract][Full Text] [Related]
9. A robust color image watermarking technique using modified Imperialist Competitive Algorithm. Moghaddam ME; Nemati N Forensic Sci Int; 2013 Dec; 233(1-3):193-200. PubMed ID: 24314520 [TBL] [Abstract][Full Text] [Related]
10. Machine learning based multipurpose medical image watermarking. Sinhal R; Ansari IA Neural Comput Appl; 2023 Mar; ():1-22. PubMed ID: 37362569 [TBL] [Abstract][Full Text] [Related]
11. A buyer-seller watermarking protocol. Memon N; Wong PW IEEE Trans Image Process; 2001; 10(4):643-9. PubMed ID: 18249653 [TBL] [Abstract][Full Text] [Related]
12. A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication. Agilandeeswari L; Prabukumar M; Alenizi FA Multimed Tools Appl; 2023 Apr; ():1-53. PubMed ID: 37362657 [TBL] [Abstract][Full Text] [Related]
13. Imperceptible reversible watermarking of radiographic images based on quantum noise masking. Pan W; Bouslimi D; Karasad M; Cozic M; Coatrieux G Comput Methods Programs Biomed; 2018 Jul; 160():119-128. PubMed ID: 29728239 [TBL] [Abstract][Full Text] [Related]
14. A noval fragile watermarking method for medical images using quadtree structure. Chen L; Feng Q; Yang F; Chen W Conf Proc IEEE Eng Med Biol Soc; 2005; 2005():6258-61. PubMed ID: 17281697 [TBL] [Abstract][Full Text] [Related]
15. Pinpoint authentication watermarking based on a chaotic system. Ni R; Ruan Q; Zhao Y Forensic Sci Int; 2008 Jul; 179(1):54-62. PubMed ID: 18541396 [TBL] [Abstract][Full Text] [Related]
16. Watermark Compression in Medical Image Watermarking Using Lempel-Ziv-Welch (LZW) Lossless Compression Technique. Badshah G; Liew SC; Zain JM; Ali M J Digit Imaging; 2016 Apr; 29(2):216-25. PubMed ID: 26429361 [TBL] [Abstract][Full Text] [Related]