Research Article

[Retracted] A Robust Image Encrypted Watermarking Technique for Neurodegenerative Disorder Diagnosis and Its Applications

Table 1

(a) Comparative analysis of existing transform techniques

Domain transform techniquesRobustnessComplexityTransient signal changesEdge adaptive transformReal-time application

LSB
DWT
DCT
DFT
SVD
GBT

(b) Various encryption and security techniques used in watermarking

SNONameFunctionality

1.Transposition cipherThis type of cipher comes in the category of simple encryption, where the shifting of plain texts is done in some regular pattern to form the ciphertext
2.Rail-fence cipherIt is a form of transposition cipher where plain text is scrambled more straightforwardly, and alphabets are written in a zig-zag manner where individual rows are combined to form the ciphertext
3.AESIt is termed as advanced encryption standard. It is a cipher used to protect classified data and is used on both hardware and software to encrypt sensitive data
4.DESIt is known as data encryption standard. It is a cipher that is used to encrypt data in blocks of size 64 bits each
5.RSAIt is known as Rivest–Shamir–Adleman. It is used for specific security services that enable public-key encryption to secure sensitive data
6.Triple DES3DES is an enhancement of DES; it has 64-bit block size with 192-bit key size. It is the same as DES but is applied three times more to get more encryption
7.Hyperchaotic encryptionThe hyper chaotic encryption is a modified encryption standard applied to images. It works on predefined values