2008 First Workshops on Image Processing Theory, Tools and Applications 2008
DOI: 10.1109/ipta.2008.4743800
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption and Compression for Medical Image Security

Abstract: This tutorial presents the problem of protecting the transmission of medical images. The presented algorithms will be applied to images, videos and 3D objects. The main keywords are compression, encryption, watermarking and data hiding.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…In [29], the authors developed various medical image cryptosystems. These cryptosystems can be employed for any form of multimedia data.…”
Section: Related Workmentioning
confidence: 99%
“…In [29], the authors developed various medical image cryptosystems. These cryptosystems can be employed for any form of multimedia data.…”
Section: Related Workmentioning
confidence: 99%
“…Step 2 Generating a prediction error histogram for each image block then calling pixel points with a prediction error of [− 2, 2] for embedding points. Next, translation resolves embedded space and embedded secret information [24,25], the formula of this translation is as follows:…”
Section: Prediction Error Expansionmentioning
confidence: 99%
“…Step 3 The prediction error [24,25] histogram is generated. Excepting that the value within the selected error range remains unchanged, the other values are shifted to the left and right sides to leave a certain space then the error within the selected error range is moved according to the embedded information.…”
Section: Prediction Error Expansionmentioning
confidence: 99%
“…This verification step essentially solves the false positive detection problem that arises in SVD based watermarking. The experimental results of proposed scheme shows that it is imperceptible and robust against different kinds of attacks [8][9]. For improved security using image compression, watermarking using DCT technique is used which has been combined with image compression technique by using improved adaptive Huffman encoding.…”
Section: Literature Surveymentioning
confidence: 99%
“…For example, in the medical field the necessity of safe identification and rapid diagnosis is crucial. Visual data transmission is considered as the routine work and therefore the necessity for finding out the proper way of transmission of data in different networks [9].…”
Section: Introductionmentioning
confidence: 99%