Page 55 - 2025S
P. 55
48 UEC Int’l Mini-Conference No.54
References
[1] D. Nu˜ nez-Ramirez, E. Fragoso-Navarro, D. Mata-Mendoza et al., “Secure management of dicom im-
ages via reversible data hiding, contrast enhancement and visible-imperceptible watermarking,” Health
Technol., vol. 14, pp. 581–596, 2024.
[2] A. F. Qasim, F. Meziane, and R. Aspin, “Digital watermarking: Applicability for developing trust in
medical imaging workflows state of the art review,” Computer Science Review, vol. 27, pp. 45–60, 2018.
[Online]. Available: https://www.sciencedirect.com/science/article/pii/S157401371730148X
[3] M. Cedillo-Hernandez, A. Cedillo-Hernandez, M. Nakano-Miyatake, and H. Perez-Meana, “Im-
proving the management of medical imaging by using robust and secure dual watermarking,”
Biomedical Signal Processing and Control, vol. 56, p. 101695, 2020. [Online]. Available:
https://www.sciencedirect.com/science/article/pii/S1746809419302769
[4] M. Barni and F. Bartolini, Applications. Boca Raton: CRC Press, 2004, pp. 23–44.
[5] Y. Shi, X. Li, X. Zhang, H. Wu, and B. Ma, “Reversible data hiding: Advances in the past two decades,”
IEEE Access, vol. 4, pp. 3210–3237, 2016.
[6] A. Jose and K. Subramaniam, “Comparative analysis of reversible data hiding schemes,” IET Image Pro-
cess., vol. 14, pp. 2064–2073, 2020.
[7] W. Ding and Y. Wang, “Data hiding in binary image with high payload,” Arabian Journal for Science and
Engineering, vol. 43, 03 2018.
[8] B. B. Pannyagol and A. Prof, “Visual cryptography for color images using jarvis halftone method,” 2014.
[Online]. Available: https://api.semanticscholar.org/CorpusID:212442252
[9] F. Pelcastre et al., “Halftoning: Revisi´ on y an´ alisis,” Revista de Ingenier´ ıa de la Universidad de Medell´ ın,
p. 14, 2012.
[10] S. A. Parah, F. Ahad, J. A. Sheikh, and G. M. Bhat, “Hiding clinical information in medical images: A
new high capacity and reversible data hiding technique,” Journal of Biomedical Informatics, vol. 66, pp.
214–230, January 2017.
[11] MathWorks, “denoisingnetwork,” https://la.mathworks.com/help/images/ref/denoisingnetwork.html,
2024, accessed: 2025-05-12.
[12] G. S., “A comprehensive halftone image quality evaluation of first- and second-order fm halftones,” Jour-
nal of Imaging Science and Technology, 2022.
[13] J. E. Mosco-Garcia and M. Cedillo-Hernandez, “Data hiding components for solving information secu-
rity issues in dicom medical images,” in New Trends in Intelligent Software Methodologies, Tools and
Techniques, H. F. et al., Ed. IOS Press, 2024, pp. 119–129.