[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Paikaray et al., 2021 - Google Patents

Reversible selective embedding for DICOM image security and integrity using visual cryptography

Paikaray et al., 2021

View PDF
Document ID
18184846943804176017
Author
Paikaray B
Swain D
Chakravarty S
Publication year
Publication venue
International Journal of Electronic Security and Digital Forensics

External Links

Snippet

Information security has been one of the biggest challenges in the era of telemedicine applications. To protect the patient's private records in medical images, several traditional methods are used. One of them is hiding the sensitive part of the image by embedding a …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0061Embedding of the watermark in each block of the image, e.g. segmented watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise

Similar Documents

Publication Publication Date Title
Magdy et al. Security of medical images for telemedicine: a systematic review
Anand et al. Dual watermarking for security of COVID-19 patient record
El-Shafai et al. Robust and efficient multi-level security framework for color medical images in telehealthcare services
Al-Haj et al. Crypto-watermarking of transmitted medical images
Usman et al. Using image steganography for providing enhanced medical data security
Yan et al. A multiwatermarking scheme for verifying medical image integrity and authenticity in the internet of medical things
Pavithra et al. A survey on the techniques of medical image encryption
Pal et al. Biomedical image watermarking in wavelet domain for data integrity using bit majority algorithm and multiple copies of hidden information
Hashim et al. Securing medical data transmission systems based on integrating algorithm of encryption and steganography
Al-Dmour et al. An efficient steganography method for hiding patient confidential information
Thakur et al. Watermarking techniques and its applications in tele-health: A technical survey
Paikaray et al. Reversible selective embedding for DICOM image security and integrity using visual cryptography
Pavithra et al. Developing security solutions for telemedicine applications: medical image encryption and watermarking
Paikaray et al. An improved region-based embedding technique for data hiding and image recovery using multiple ROI and RONI
Lakhani et al. Enhancing robustness and security of medical images through composite watermarking method
El-Shafai et al. Proposed Privacy Preservation Technique for Color Medical Images.
Solanki et al. Roni medical image watermarking using dwt and rsa
Bhagat et al. A survey on medical images for reversible data hiding techniques
Roček et al. Reversible watermarking in medical imaging with zero distortion in ROI
Nithya et al. Watermarking and encryption in medical image through roi-lossless compression
Jasmine Selvakumari Jeya et al. RONI based secured and authenticated indexing of lung CT images
Meng et al. Encryption-then-embedding-based hybrid data hiding scheme for medical images
Chen et al. A secure image authentication scheme for tamper detection and recovery
Gang et al. A fragile watermarking scheme for medical image
Moataz Watermarking medical scans: Saliency filter pixels