2023
DOI: 10.1155/2023/6758406
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Protection Framework for Medical Image Security without Key Dependency Based on Visual Cryptography and Trusted Computing

Abstract: The development of mobile Internet and the popularization of intelligent sensor devices greatly facilitate the generation and transmission of massive multimedia data including medical images and pathological models on the open network. The popularity of artificial intelligence (AI) technologies has greatly improved the efficiency of medical image recognition and diagnosis. However, it also poses new challenges to the security and privacy of medical data. The leakage of medical images related to users’ privacy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 42 publications
(45 reference statements)
0
3
0
Order By: Relevance
“…For an image with dimensions M × N, the complexity of the algorithm is O (MN), as each pixel is processed once per iteration. However, the total complexity may increase depending on the number of iterations required for the RL to converge to an optimal policy [27] Policy Optimization (PPO) or Deep Deterministic Policy Gradients (DDPG) can enhance learning efficiency, but at the cost of increased computational overhead [24].…”
Section: Complexity Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…For an image with dimensions M × N, the complexity of the algorithm is O (MN), as each pixel is processed once per iteration. However, the total complexity may increase depending on the number of iterations required for the RL to converge to an optimal policy [27] Policy Optimization (PPO) or Deep Deterministic Policy Gradients (DDPG) can enhance learning efficiency, but at the cost of increased computational overhead [24].…”
Section: Complexity Analysismentioning
confidence: 99%
“…(b) Filtering Attacks: These involve applying filters to degrade image quality. The EER's use of RL allows the system to learn from various instances of filtered images, enabling it to reverse-engineer the effects and restore the image to its original state [27]. (c) Compression Attacks: Compression can introduce artifacts that degrade image integrity.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation