2019 Amity International Conference on Artificial Intelligence (AICAI) 2019
DOI: 10.1109/aicai.2019.8701382
|View full text |Cite
|
Sign up to set email alerts
|

A Study on the Applications of the Biomedical Image Encryption Methods for Secured Computer Aided Diagnostics

Abstract: Computer aided diagnostic is one of the most active research area and has huge impact on the health care industry. With the advent of intelligent methods, biomedical data processing becomes easier and less error prone. Moreover, remote health care is also possible using the IoT infrastructure. However, data security over the network is always considered as a challenge. Biomedical data are generally sensitive to external disturbances and small manipulation in the data may cause huge difference in the ultimate r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(8 citation statements)
references
References 38 publications
0
8
0
Order By: Relevance
“…Moreover, among the fields mentioned above, the medical industry is one of the most vibrant research areas based on the application of CNNs, which has been developed, employed in computational biomedical domains, and significantly contributed [33]. Doctors can effectively analyze medical images for lesion detection and diagnosis decision-making using the CADe/CADx system.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, among the fields mentioned above, the medical industry is one of the most vibrant research areas based on the application of CNNs, which has been developed, employed in computational biomedical domains, and significantly contributed [33]. Doctors can effectively analyze medical images for lesion detection and diagnosis decision-making using the CADe/CADx system.…”
Section: Related Workmentioning
confidence: 99%
“…Watermarking scheme uses different domain such as spatial domain and frequency domain. Spatial domain is simple and straight forward to use but not robust and also faces difficulty in surviving attacks [6,15]. Transform domain or frequency domain is robust in nature, and information is embedded in transform co-efficient.…”
Section: Different Security Techniques Used For Medical Imagesmentioning
confidence: 99%
“…The proposed method shows the result in terms of higher PSNR and high EPR with weighted peak signal to noise ratio (WPSNR). Roy et al [6] give a brief review about different aspects of biomedical image security and different methods to provide medical image security. Jero et al [7] proposed a method using DWT and SVD.…”
Section: Introductionmentioning
confidence: 99%
“…Image encryption has received much attention in the last few years [18,23,24]. This is more needed for biomedical images, since they are part of human information [25,26]. A review on medical image encryption has been proposed in refs [27][28][29].…”
Section: Introductionmentioning
confidence: 99%