2015
DOI: 10.1016/j.procs.2015.08.070
|View full text |Cite
|
Sign up to set email alerts
|

A Cryptographic Technique for Security of Medical Images in Health Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(12 citation statements)
references
References 4 publications
0
12
0
Order By: Relevance
“…Moreover, the proposed method shows outstanding performance in case of MRI and Ultrasound images. Arithmetic mean of Kester and coauthors [22] differs with image type and proposed CCE method produces the same mean irrespective of image type. As the proposed method uses RC4 encryption, the results depend on smoothened key image.…”
Section: Quantitative Analysismentioning
confidence: 89%
See 3 more Smart Citations
“…Moreover, the proposed method shows outstanding performance in case of MRI and Ultrasound images. Arithmetic mean of Kester and coauthors [22] differs with image type and proposed CCE method produces the same mean irrespective of image type. As the proposed method uses RC4 encryption, the results depend on smoothened key image.…”
Section: Quantitative Analysismentioning
confidence: 89%
“…Similarly, Bouslimi and coauthors [21] proposed another joint encryption/watermarking system for protecting medical images. Kester and coauthors [22] implemented fully recoverable encrypted and watermarked image technique.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…The aim of our study is to perform image encryption and decryption in a health information system, as shown in the infrastructure in Figure 2. Health information systems are utility infrastructures consisting of tele-medical procedures, remote health care services, and cloud storage [35]. Medical imaging data are important information for further diagnostic, digital health, and artificial intelligence applications, such as the establishment of surgical operation guidelines and advanced diagnostic tools.…”
Section: B Plain Image Encryption With Hash Transformationmentioning
confidence: 99%