{"id":"https://openalex.org/W4401114041","doi":"https://doi.org/10.1109/tsp63128.2024.10605971","title":"Improving the Security of Medical Imaging via DFT-Based Reversible Watermarking and Deep Learning-Based Zero-watermarking","display_name":"Improving the Security of Medical Imaging via DFT-Based Reversible Watermarking and Deep Learning-Based Zero-watermarking","publication_year":2024,"publication_date":"2024-07-10","ids":{"openalex":"https://openalex.org/W4401114041","doi":"https://doi.org/10.1109/tsp63128.2024.10605971"},"language":"en","primary_location":{"id":"doi:10.1109/tsp63128.2024.10605971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp63128.2024.10605971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 47th International Conference on Telecommunications and Signal Processing (TSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092119549","display_name":"Rodrigo Eduardo Arevalo-Ancona","orcid":"https://orcid.org/0000-0002-4851-8728"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rodrigo Eduardo Arevalo-Ancona","raw_affiliation_strings":["SEPI-ESIME Culhuac&#x00E1;n, Instituto Polit&#x00E9;cnico Nacional,M&#x00E9;xico City,M&#x00E9;xico"],"affiliations":[{"raw_affiliation_string":"SEPI-ESIME Culhuac&#x00E1;n, Instituto Polit&#x00E9;cnico Nacional,M&#x00E9;xico City,M&#x00E9;xico","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102011836","display_name":"Manuel Cedillo-Hern\u00e1ndez","orcid":"https://orcid.org/0000-0002-9149-9841"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Manuel Cedillo-Hernandez","raw_affiliation_strings":["SEPI-ESIME Culhuac&#x00E1;n, Instituto Polit&#x00E9;cnico Nacional,M&#x00E9;xico City,M&#x00E9;xico"],"affiliations":[{"raw_affiliation_string":"SEPI-ESIME Culhuac&#x00E1;n, Instituto Polit&#x00E9;cnico Nacional,M&#x00E9;xico City,M&#x00E9;xico","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092119549"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7873,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72226166,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"10","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.924088716506958},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.612859845161438},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.5741786360740662},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5100639462471008},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4971514046192169},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.4300433397293091},{"id":"https://openalex.org/keywords/medical-imaging","display_name":"Medical imaging","score":0.4187663197517395},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3765953779220581},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34862565994262695},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3347555100917816},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.32712018489837646},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.26739826798439026}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.924088716506958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.612859845161438},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.5741786360740662},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5100639462471008},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4971514046192169},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.4300433397293091},{"id":"https://openalex.org/C31601959","wikidata":"https://www.wikidata.org/wiki/Q931309","display_name":"Medical imaging","level":2,"score":0.4187663197517395},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3765953779220581},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34862565994262695},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3347555100917816},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.32712018489837646},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.26739826798439026},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsp63128.2024.10605971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp63128.2024.10605971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 47th International Conference on Telecommunications and Signal Processing (TSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1159302035","https://openalex.org/W2897680621","https://openalex.org/W2915126261","https://openalex.org/W2920745624","https://openalex.org/W2950418934","https://openalex.org/W2982205826","https://openalex.org/W3146745841","https://openalex.org/W3175361357","https://openalex.org/W4214924350","https://openalex.org/W4225708286","https://openalex.org/W4280580011","https://openalex.org/W4311434074","https://openalex.org/W4319312611","https://openalex.org/W4360858595","https://openalex.org/W4376645480","https://openalex.org/W4380590548","https://openalex.org/W4381304581","https://openalex.org/W4381487433","https://openalex.org/W4383600382","https://openalex.org/W4385192655","https://openalex.org/W6759274242"],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W1568204688","https://openalex.org/W2952570804","https://openalex.org/W3024479225","https://openalex.org/W3171371563","https://openalex.org/W2995680918","https://openalex.org/W3133954817","https://openalex.org/W3003847115"],"abstract_inverted_index":{"This":[0],"paper":[1],"introduces":[2],"a":[3,23,35,40,65,136],"hybrid":[4],"image":[5,29,37,63,112,126],"verification":[6],"and":[7,31,111,128,141],"authentication":[8],"technique,":[9],"integrating":[10],"reversible-watermarking":[11],"with":[12,34,52],"zero-watermarking":[13],"to":[14,38,115],"improve":[15],"the":[16,45,47,53,62,75,79,83,88,92,100,103,116,130,147],"security":[17],"of":[18,71,91,102,135],"medical":[19],"images.":[20],"In":[21],"zero-watermarking,":[22],"convolutional":[24],"neural":[25],"network":[26],"extracts":[27],"specific":[28],"features":[30],"merges":[32],"them":[33],"patient's":[36],"create":[39],"master":[41,54],"share.":[42,55],"To":[43],"increase":[44],"robustness,":[46],"QR":[48,57,84],"code":[49,58,85],"is":[50,59],"fused":[51],"The":[56,96,119,133],"embedded":[60],"into":[61,69,87],"using":[64],"reversible":[66],"watermarking":[67],"technique":[68],"Regions":[70],"Non-Interest":[72],"detected":[73],"by":[74],"K-means":[76],"algorithm,":[77],"ensuring":[78],"optimal":[80],"region":[81],"for":[82],"embedding":[86],"middle-frequency":[89],"coefficients":[90],"Discrete":[93],"Fourier":[94],"Transform.":[95],"experimental":[97],"results":[98,120],"validate":[99],"robustness":[101],"proposed":[104],"scheme":[105],"despite":[106],"applying":[107],"different":[108],"ge-ometric":[109],"transformations":[110],"processing":[113],"distortions":[114],"watermarked":[117],"image.":[118],"demonstrate":[121],"that":[122],"our":[123],"method":[124],"preserves":[125],"quality":[127],"recovers":[129],"watermark":[131],"efficiently.":[132],"obtention":[134],"low":[137],"bit":[138],"error":[139],"rate":[140],"high":[142],"normalized":[143],"cross-correlation":[144],"values":[145],"evidences":[146],"efficiency.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
