[go: up one dir, main page]

Ogundokun et al., 2020 - Google Patents

Modified least significant bit technique for securing medical images

Ogundokun et al., 2020

View PDF
Document ID
3818236707035210368
Author
Ogundokun R
Abikoye O
Misra S
Awotunde J
Publication year
Publication venue
European, Mediterranean, and Middle Eastern Conference on Information Systems

External Links

Snippet

The confidentiality and safety of patient records is a significant concern for medical professionals. So protections must be placed to guarantee that illegal individuals do not have access to medical images (Patient's description). Hence, the objective of this study is to …
Continue reading at eprints.lmu.edu.ng (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators

Similar Documents

Publication Publication Date Title
Wang et al. High capacity reversible data hiding in encrypted image based on intra-block lossless compression
Patel et al. Secure and authentic DCT image steganography through DWT-SVD based digital watermarking with RSA encryption
Lin et al. Public-key-based optical image cryptosystem based on data embedding techniques
Evsutin et al. The adaptive algorithm of information unmistakable embedding into digital images based on the discrete Fourier transformation
Ogundokun et al. Modified least significant bit technique for securing medical images
Nassar et al. Content verification of encrypted images transmitted over wireless AWGN channels
Prasad et al. An RGB color image steganography scheme by binary lower triangular matrix
Wang et al. Multiuser-based shadow watermark extraction system
Kittawi et al. Reversible data hiding using bit flipping and histogram shifting
Fkirin et al. Two-level security approach combining watermarking and encryption for securing critical colored images
Panigrahi et al. An effective steganographic technique for hiding the image data using the LSB technique
Bhandari et al. A new model of M-secure image via quantization
Vybornova A new watermarking method for video authentication with tamper localization
Agarwal et al. Selective bin model for reversible data hiding in encrypted images
Lu et al. Dual-image based high image quality reversible hiding scheme with multiple folding zones
Kaur et al. Xor-edge based video steganography and testing against chi-square steganalysis
Hung et al. Secure discrete cosine transform based technique for recoverable tamper proofing
Gohil et al. Content watermarking and data hiding in multimedia security
Xu et al. Content security protection for remote sensing images integrating selective content encryption and digital fingerprint
Xu et al. Completely separable reversible data hiding in encrypted images
Yuvaraja et al. Dual tree complex wavelet transform-based image security using steganography
Trivedi et al. User data privacy in multimedia domain using 3–3 LSB-based color image steganography with RC4 and Bernoulli map protection
Krishnan et al. Approach to secret content tagging on color images with a Sudoku-based scrambling principle
LaxmiKanth et al. Enhanced Security and Robustness of Data Using Steganography
Lou et al. Spatial database with each picture self-contained multiscape and access control in a hierarchy