Page 55 - 2025S
P. 55

48                                                                UEC Int’l Mini-Conference No.54






            References


             [1] D. Nu˜ nez-Ramirez, E. Fragoso-Navarro, D. Mata-Mendoza et al., “Secure management of dicom im-
                 ages via reversible data hiding, contrast enhancement and visible-imperceptible watermarking,” Health
                 Technol., vol. 14, pp. 581–596, 2024.

             [2] A. F. Qasim, F. Meziane, and R. Aspin, “Digital watermarking: Applicability for developing trust in
                 medical imaging workflows state of the art review,” Computer Science Review, vol. 27, pp. 45–60, 2018.
                 [Online]. Available: https://www.sciencedirect.com/science/article/pii/S157401371730148X

             [3] M. Cedillo-Hernandez, A. Cedillo-Hernandez, M. Nakano-Miyatake, and H. Perez-Meana, “Im-
                 proving the management of medical imaging by using robust and secure dual watermarking,”
                 Biomedical Signal Processing and Control, vol. 56, p. 101695, 2020. [Online]. Available:
                 https://www.sciencedirect.com/science/article/pii/S1746809419302769

             [4] M. Barni and F. Bartolini, Applications.  Boca Raton: CRC Press, 2004, pp. 23–44.
             [5] Y. Shi, X. Li, X. Zhang, H. Wu, and B. Ma, “Reversible data hiding: Advances in the past two decades,”
                 IEEE Access, vol. 4, pp. 3210–3237, 2016.

             [6] A. Jose and K. Subramaniam, “Comparative analysis of reversible data hiding schemes,” IET Image Pro-
                 cess., vol. 14, pp. 2064–2073, 2020.

             [7] W. Ding and Y. Wang, “Data hiding in binary image with high payload,” Arabian Journal for Science and
                 Engineering, vol. 43, 03 2018.
             [8] B. B. Pannyagol and A. Prof, “Visual cryptography for color images using jarvis halftone method,” 2014.
                 [Online]. Available: https://api.semanticscholar.org/CorpusID:212442252

             [9] F. Pelcastre et al., “Halftoning: Revisi´ on y an´ alisis,” Revista de Ingenier´ ıa de la Universidad de Medell´ ın,
                 p. 14, 2012.

            [10] S. A. Parah, F. Ahad, J. A. Sheikh, and G. M. Bhat, “Hiding clinical information in medical images: A
                 new high capacity and reversible data hiding technique,” Journal of Biomedical Informatics, vol. 66, pp.
                 214–230, January 2017.

            [11] MathWorks,   “denoisingnetwork,”  https://la.mathworks.com/help/images/ref/denoisingnetwork.html,
                 2024, accessed: 2025-05-12.

            [12] G. S., “A comprehensive halftone image quality evaluation of first- and second-order fm halftones,” Jour-
                 nal of Imaging Science and Technology, 2022.

            [13] J. E. Mosco-Garcia and M. Cedillo-Hernandez, “Data hiding components for solving information secu-
                 rity issues in dicom medical images,” in New Trends in Intelligent Software Methodologies, Tools and
                 Techniques, H. F. et al., Ed. IOS Press, 2024, pp. 119–129.
   50   51   52   53   54   55   56   57   58   59   60