Nothing Special   »   [go: up one dir, main page]

Priyanka et al., 2024 - Google Patents

HIDDEn: Robust Data Hiding for Medical Images with Encryption and Local Binary Pattern

Priyanka et al., 2024

Document ID
14524448643354756410
Author
Priyanka
Baranwal N
Singh K
Singh O
Singh A
Publication year
Publication venue
Circuits, Systems, and Signal Processing

External Links

Snippet

The secure transmission of medical images and related digital patient records on untrusted channels has recently become a focus in healthcare industries. Data hiding and encryption are important tools for this goal. This paper proposes a data-hiding method for medical …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods

Similar Documents

Publication Publication Date Title
Anand et al. Watermarking techniques for medical data authentication: a survey
Hurrah et al. Dual watermarking framework for privacy protection and content authentication of multimedia
Begum et al. Digital image watermarking techniques: a review
Thakur et al. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications
Hamidi et al. Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform
Sharma et al. Robust and secure multiple watermarking for medical images
Priya et al. A novel visual medical image encryption for secure transmission of authenticated watermarked medical images
Faragallah et al. Secure color image cryptosystem based on chaotic logistic in the FrFT domain
Begum et al. Analysis of digital image watermarking techniques through hybrid methods
Viswanathan et al. A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology
Balasamy et al. An adaptive neuro-fuzzy based region selection and authenticating medical image through watermarking for secure communication
Hurrah et al. Embedding in medical images: an efficient scheme for authentication and tamper localization
Zhang et al. A novel encryption frame for medical image with watermark based on hyperchaotic system
Xu et al. Separable reversible data hiding in encrypted images based on two‐dimensional histogram modification
Shivani Multi secret sharing with unexpanded meaningful shares
Prasad et al. A secure fragile watermarking scheme for protecting integrity of digital images
Garg et al. A robust technique for biometric image authentication using invisible watermarking
Lakrissi et al. Novel dynamic color image watermarking based on DWT-SVD and the human visual system
Ashour et al. Security of multimedia contents: a brief
Ajili et al. Crypto‐Watermarking Algorithm Using Weber’s Law and AES: A View to Transfer Safe Medical Image
Fkirin et al. Two-level security approach combining watermarking and encryption for securing critical colored images
Lakhani et al. Enhancing robustness and security of medical images through composite watermarking method
Priyanka et al. HIDDEn: Robust Data Hiding for Medical Images with Encryption and Local Binary Pattern
Maji et al. Cover independent image steganography in spatial domain using higher order pixel bits
Vaidya et al. Adaptive medical image watermarking system for e-health care applications