2013 IEEE International Conference on Granular Computing (GrC) 2013
DOI: 10.1109/grc.2013.6740392
|View full text |Cite
|
Sign up to set email alerts
|

Ensure privacy and security in the process of medical image analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
8
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…It allows the cloud to carry out specific types of computations on ciphertext and generate an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. For this reason, it can provide security and privacy for outsourced data computation and storage; for example, in [23], the authors proposed a homomorphic encryption method to enable direct operation over the encoded images. However, homomorphic encryption is not applicable for resourcelimited clients because it is usually performed by the client side with heavy computational overhead.…”
Section: Related Workmentioning
confidence: 99%
“…It allows the cloud to carry out specific types of computations on ciphertext and generate an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. For this reason, it can provide security and privacy for outsourced data computation and storage; for example, in [23], the authors proposed a homomorphic encryption method to enable direct operation over the encoded images. However, homomorphic encryption is not applicable for resourcelimited clients because it is usually performed by the client side with heavy computational overhead.…”
Section: Related Workmentioning
confidence: 99%
“…It provides privacy and security to the cloud outsourced data and storage. In [13], homomorphic encryption is used to encode the image with direct operation. It suffers mainly from resource constraints since the encryption is performed mostly on the client side with high computational overhead.…”
Section: Related Workmentioning
confidence: 99%
“…In Gomathisankaran et al [2013], the authors propose the homomorphic encryption scheme based on Residue Number System (RNS) to secure image processing. In fact, the proposed technique allows executing mathematical operations over ciphertext.…”
Section: Related Workmentioning
confidence: 99%