Priyanka et al., 2024 - Google Patents
HIDDEn: Robust Data Hiding for Medical Images with Encryption and Local Binary PatternPriyanka et al., 2024
- Document ID
- 14524448643354756410
- Author
- Priyanka
- Baranwal N
- Singh K
- Singh O
- Singh A
- Publication year
- Publication venue
- Circuits, Systems, and Signal Processing
External Links
Snippet
The secure transmission of medical images and related digital patient records on untrusted channels has recently become a focus in healthcare industries. Data hiding and encryption are important tools for this goal. This paper proposes a data-hiding method for medical …
- 238000000034 method 0 abstract description 110
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Anand et al. | Watermarking techniques for medical data authentication: a survey | |
Hurrah et al. | Dual watermarking framework for privacy protection and content authentication of multimedia | |
Begum et al. | Digital image watermarking techniques: a review | |
Thakur et al. | Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications | |
Hamidi et al. | Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform | |
Sharma et al. | Robust and secure multiple watermarking for medical images | |
Priya et al. | A novel visual medical image encryption for secure transmission of authenticated watermarked medical images | |
Faragallah et al. | Secure color image cryptosystem based on chaotic logistic in the FrFT domain | |
Begum et al. | Analysis of digital image watermarking techniques through hybrid methods | |
Viswanathan et al. | A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology | |
Balasamy et al. | An adaptive neuro-fuzzy based region selection and authenticating medical image through watermarking for secure communication | |
Hurrah et al. | Embedding in medical images: an efficient scheme for authentication and tamper localization | |
Zhang et al. | A novel encryption frame for medical image with watermark based on hyperchaotic system | |
Xu et al. | Separable reversible data hiding in encrypted images based on two‐dimensional histogram modification | |
Shivani | Multi secret sharing with unexpanded meaningful shares | |
Prasad et al. | A secure fragile watermarking scheme for protecting integrity of digital images | |
Garg et al. | A robust technique for biometric image authentication using invisible watermarking | |
Lakrissi et al. | Novel dynamic color image watermarking based on DWT-SVD and the human visual system | |
Ashour et al. | Security of multimedia contents: a brief | |
Ajili et al. | Crypto‐Watermarking Algorithm Using Weber’s Law and AES: A View to Transfer Safe Medical Image | |
Fkirin et al. | Two-level security approach combining watermarking and encryption for securing critical colored images | |
Lakhani et al. | Enhancing robustness and security of medical images through composite watermarking method | |
Priyanka et al. | HIDDEn: Robust Data Hiding for Medical Images with Encryption and Local Binary Pattern | |
Maji et al. | Cover independent image steganography in spatial domain using higher order pixel bits | |
Vaidya et al. | Adaptive medical image watermarking system for e-health care applications |