{"id":"https://openalex.org/W2081315000","doi":"https://doi.org/10.1145/1741906.1742173","title":"DCT based watermarking of medical images with least perceptual error","display_name":"DCT based watermarking of medical images with least perceptual error","publication_year":2010,"publication_date":"2010-02-26","ids":{"openalex":"https://openalex.org/W2081315000","doi":"https://doi.org/10.1145/1741906.1742173","mag":"2081315000"},"language":"en","primary_location":{"id":"doi:10.1145/1741906.1742173","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1741906.1742173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference and Workshop on Emerging Trends in Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024229373","display_name":"Janani Natarajan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Janani Natarajan","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035088849","display_name":"Smita Jangale","orcid":"https://orcid.org/0000-0001-7448-6072"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Smita Jangale","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013955627","display_name":"Triupatiraju Kanumuri","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Triupatiraju Kanumuri","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110496953","display_name":"Vijay R. Rathod","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vijay R. Rathod","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024229373"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15984401,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1006","last_page":"1007"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10481","display_name":"Computer Graphics and Visualization Techniques","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1704","display_name":"Computer Graphics and Computer-Aided Design"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9183536171913147},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.875659704208374},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.7653318643569946},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7306873202323914},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6692267656326294},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6534289121627808},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.550002932548523},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.4286425709724426},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4266306757926941},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.38669833540916443},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08089601993560791}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9183536171913147},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.875659704208374},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.7653318643569946},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7306873202323914},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6692267656326294},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6534289121627808},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.550002932548523},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.4286425709724426},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4266306757926941},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.38669833540916443},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08089601993560791},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1741906.1742173","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1741906.1742173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference and Workshop on Emerging Trends in Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"Transfer":[0],"of":[1,11,34,43,59,76,84,99,104,134,147,153,162,169],"digital":[2],"medical":[3,49,60,85,102],"images":[4,50,61,86,103,177],"between":[5],"multiple":[6,90],"parties":[7],"requires":[8],"the":[9,52,77,126,132,145,160],"assurance":[10],"image":[12,21,35,127],"identity":[13],"and":[14,41,51,70,82,87,97,159,175],"integrity,":[15],"which":[16,140],"can":[17],"be":[18],"achieved":[19],"through":[20],"watermarking.":[22],"This":[23,37],"raises":[24],"concerns":[25],"for":[26,48,95],"loss":[27],"in":[28,55,80,101],"viewer":[29],"performance":[30],"due":[31,64],"to":[32,65,116,121,173],"degradation":[33,58],"quality.":[36],"paper":[38],"presents":[39],"Analysis":[40],"assessment":[42],"robust":[44,163],"watermarking":[45,72,91,164],"scheme":[46,73],"suited":[47],"techniques":[53],"involved":[54],"minimizing":[56],"perceptual":[57],"that":[62,123],"result":[63],"payload":[66,100,154],"embedding.":[67],"The":[68,137],"efficient":[69],"reliable":[71],"is":[74,129],"one":[75],"important":[78],"tasks":[79],"storage":[81],"transmission":[83],"patient":[88],"data,":[89],"methods":[92],"are":[93,144],"available":[94],"embedding":[96],"extraction":[98],"different":[105],"modalities.":[106],"Discrete":[107],"Cosine":[108],"Transform":[109],"(DCT)":[110],"technique":[111],"has":[112],"been":[113],"widely":[114],"known":[115],"serve":[117],"as":[118],"powerful":[119],"tool":[120],"ensure":[122],"impact":[124],"on":[125,139,155],"quality":[128],"well":[130],"below":[131],"threshold":[133],"visual":[135],"perceptibility.":[136],"principle":[138],"this":[141,170],"approach":[142,171],"rests":[143],"choice":[146],"a":[148],"suitably":[149],"light":[150],"payload,":[151],"distribution":[152],"least":[156],"significant":[157],"area":[158],"use":[161],"method.":[165],"We":[166],"provide":[167],"examples":[168],"applied":[172],"MR":[174],"CT":[176]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
