2015
DOI: 10.1016/j.future.2014.07.001
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-based adaptive compression and secure management services for 3D healthcare data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 102 publications
(28 citation statements)
references
References 13 publications
0
28
0
Order By: Relevance
“…With the improvement of Internet technology, these images can be transmitted and exchanged in a variety of ways, so it is crucial to ensure the integrity and authenticity of 3D medical images. Castiglione et al [4] proposed a virtual infrastructure-less Cloud solution for secure management of 3D medical images, combining with the secure watermarking technique to generate a lossless dynamic and adaptive compression engine, and the scheme performs well in terms of invisibility, complexity, compression ratio, adaptability, scalability, and energy efficiency. Furthermore, in the process of image storage and spread, due to the large amount of data, people often choose to compress an image, which limits the application of fragile watermarking technology.…”
Section: Introductionmentioning
confidence: 99%
“…With the improvement of Internet technology, these images can be transmitted and exchanged in a variety of ways, so it is crucial to ensure the integrity and authenticity of 3D medical images. Castiglione et al [4] proposed a virtual infrastructure-less Cloud solution for secure management of 3D medical images, combining with the secure watermarking technique to generate a lossless dynamic and adaptive compression engine, and the scheme performs well in terms of invisibility, complexity, compression ratio, adaptability, scalability, and energy efficiency. Furthermore, in the process of image storage and spread, due to the large amount of data, people often choose to compress an image, which limits the application of fragile watermarking technology.…”
Section: Introductionmentioning
confidence: 99%
“…We will make further experiments with other extensive optimization problems such as securityrelated problems and some other real world problems like scheduling, services computing,cluster analysis in ambient network, etc. (Li et al 2010(Li et al , 2014D'Apiec et al 2014;Mokryani et al 2013;Castiglione et al 2015;Esposito et al 2013;Habib and Marimuthu 2011) to certify the feasibility of this approach.…”
Section: • Mechanical Transformationmentioning
confidence: 99%
“…If the attributes could be provided by dynamic biometric keys, the outsourcing encryption would use more flexible keys in a more natural way. Castiglione et al (2015) proposed a cloud-based adaptive compression and secure management services for 3D healthcare data. If the services could bind user's identity in a more subtle way, the healthcare data would possess more security privacy.…”
Section: Introductionmentioning
confidence: 99%