2017
DOI: 10.1007/s11277-017-4795-x
|View full text |Cite
|
Sign up to set email alerts
|

Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…Discrete Gould Transform (DGT) was generally employed in hiding secret data bits providing high withstanding capacity. In the proposed methodology, it helps in identifying the unauthorized access or any manipulation done by the third party users [5]. This feature helps in authentication of the proposed algorithm.…”
Section: Dgtmentioning
confidence: 99%
See 1 more Smart Citation
“…Discrete Gould Transform (DGT) was generally employed in hiding secret data bits providing high withstanding capacity. In the proposed methodology, it helps in identifying the unauthorized access or any manipulation done by the third party users [5]. This feature helps in authentication of the proposed algorithm.…”
Section: Dgtmentioning
confidence: 99%
“…To conserve the concealment of the information new proficiency was developed to make high authentication in communication, one such developed is encryption. Encryption techniques are very optimistic for digital images and should be used to disappoint opponent attacks from unintended users [4], [5].…”
Section: Introductionmentioning
confidence: 99%