2021
DOI: 10.32604/cmc.2021.017064
|View full text |Cite
|
Sign up to set email alerts
|

Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications

Abstract: Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image quality, attackers could easily hack the secret data. Therefore, the hidden data quantity should be improved, while keeping stego-image quality high. The main aim of this study is combining several steganography tech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…Though, since these satellites are over a few minutes late, they mayn't have enough time to send all of their observations to a Low Earth Orbit (LEO) satellite's ground station [20]. Many recent approaches have presented feature extraction processes based on deep learning, which are used in this paper [21][22][23][24][25][26][27][28][29][30][31][32][33][34]. Two thin covers detect the coarse resolution of images acquired at different times with land changes, and the excellent spatial and temporal resolution of the image resolution change identifies new super-resolution methods [35].…”
Section: Literature Surveymentioning
confidence: 99%
“…Though, since these satellites are over a few minutes late, they mayn't have enough time to send all of their observations to a Low Earth Orbit (LEO) satellite's ground station [20]. Many recent approaches have presented feature extraction processes based on deep learning, which are used in this paper [21][22][23][24][25][26][27][28][29][30][31][32][33][34]. Two thin covers detect the coarse resolution of images acquired at different times with land changes, and the excellent spatial and temporal resolution of the image resolution change identifies new super-resolution methods [35].…”
Section: Literature Surveymentioning
confidence: 99%
“…Malware evasion methods were analyzed, while classifications for automated and manual analysis were presented. The summarized advantages and limitations can be used by researchers to improve the efficiency of IoT malware detection systems [54][55][56][57]. The evasion attempts can be categorized as detection independent and detection dependent.…”
Section: Various Malware Attacks In Iotmentioning
confidence: 99%
“…Other examples of steganography include combinations with cryptography [47,48], watermarking [27,49] or secret sharing [50][51][52], multi-secret steganography used for concealing more than one message in a single container [53], techniques that do not require a predefined medium but generate the carrier from scratch [54,55], format-specific methods destined for particular files [36,56,57], the creation of subliminal channels in existing schemes to achieve better undetectability [58,59], systems that use biometric authentication for data hiding [60,61], combining various techniques to obtain secure data transmission in telemedicine applications [62,63], and many more.…”
Section: Introductionmentioning
confidence: 99%