Compression-Then-Encryption-Based Secure Watermarking Technique for Smart Healthcare System
Citations
167 citations
49 citations
45 citations
40 citations
References
169 citations
160 citations
"Compression-Then-Encryption-Based S..." refers background or methods in this paper
...PSNR and SSIM are the measures of imperceptibility offered by any hiding technique.(6) However, BER and NC determine the robustness provided by the data Table 1....
[...]
...From the survey, it is established that a combination of watermarking with a suitable encryption scheme is more popular and having great potential.(2,3,6) Encryption converts EPR data into an unreadable code for an unauthorized person to provide significant authentication of the digital form of medical data....
[...]
...Through making use of watermarking approaches with an appropriate compressionthen-encryption (CTE) scheme helps to provide secure and confidential transmission of sensitive data over bandwidth-constrained networks/IoT environments.(3,6,8) In this article, we develop a CTE based dual watermarking to protect the EPR data for the healthcare system....
[...]
...hiding technique.(6) NPCR and UACI estimate the strength of the encryption scheme....
[...]
122 citations
78 citations
76 citations