Ogundokun et al., 2020 - Google Patents
Modified least significant bit technique for securing medical imagesOgundokun et al., 2020
View PDF- Document ID
- 3818236707035210368
- Author
- Ogundokun R
- Abikoye O
- Misra S
- Awotunde J
- Publication year
- Publication venue
- European, Mediterranean, and Middle Eastern Conference on Information Systems
External Links
Snippet
The confidentiality and safety of patient records is a significant concern for medical professionals. So protections must be placed to guarantee that illegal individuals do not have access to medical images (Patient's description). Hence, the objective of this study is to …
- 238000000034 method 0 title abstract description 54
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | High capacity reversible data hiding in encrypted image based on intra-block lossless compression | |
Patel et al. | Secure and authentic DCT image steganography through DWT-SVD based digital watermarking with RSA encryption | |
Lin et al. | Public-key-based optical image cryptosystem based on data embedding techniques | |
Evsutin et al. | The adaptive algorithm of information unmistakable embedding into digital images based on the discrete Fourier transformation | |
Ogundokun et al. | Modified least significant bit technique for securing medical images | |
Nassar et al. | Content verification of encrypted images transmitted over wireless AWGN channels | |
Prasad et al. | An RGB color image steganography scheme by binary lower triangular matrix | |
Wang et al. | Multiuser-based shadow watermark extraction system | |
Kittawi et al. | Reversible data hiding using bit flipping and histogram shifting | |
Fkirin et al. | Two-level security approach combining watermarking and encryption for securing critical colored images | |
Panigrahi et al. | An effective steganographic technique for hiding the image data using the LSB technique | |
Bhandari et al. | A new model of M-secure image via quantization | |
Vybornova | A new watermarking method for video authentication with tamper localization | |
Agarwal et al. | Selective bin model for reversible data hiding in encrypted images | |
Lu et al. | Dual-image based high image quality reversible hiding scheme with multiple folding zones | |
Kaur et al. | Xor-edge based video steganography and testing against chi-square steganalysis | |
Hung et al. | Secure discrete cosine transform based technique for recoverable tamper proofing | |
Gohil et al. | Content watermarking and data hiding in multimedia security | |
Xu et al. | Content security protection for remote sensing images integrating selective content encryption and digital fingerprint | |
Xu et al. | Completely separable reversible data hiding in encrypted images | |
Yuvaraja et al. | Dual tree complex wavelet transform-based image security using steganography | |
Trivedi et al. | User data privacy in multimedia domain using 3–3 LSB-based color image steganography with RC4 and Bernoulli map protection | |
Krishnan et al. | Approach to secret content tagging on color images with a Sudoku-based scrambling principle | |
LaxmiKanth et al. | Enhanced Security and Robustness of Data Using Steganography | |
Lou et al. | Spatial database with each picture self-contained multiscape and access control in a hierarchy |