2015
DOI: 10.1007/978-3-319-13728-5_7
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of Compression Techniques and Feature Extraction for Implementing Medical Image Privacy Using Searchable Encryption

Abstract: Abstract. The secure preservation of biomedical image data is a primary concern in today's technology enabled medical world. The new advancements in the technology are insisting us to outsource our digital data to a third party server and bring as and when needed. In this regard, efficient storage and transmission of this large medical data set becomes an important concern. In this paper we studied different compression techniques as a significant step of data preparation for implementing searchable encryption… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…In fact, our result is better than the result in 13 and 14 for CR value. and as seen as the obtained image in [17] (Fig. 8.…”
Section: Comparison Between Other Compression Methodsmentioning
confidence: 54%
“…In fact, our result is better than the result in 13 and 14 for CR value. and as seen as the obtained image in [17] (Fig. 8.…”
Section: Comparison Between Other Compression Methodsmentioning
confidence: 54%
“…The Local Sensitive Hash (LSH) algorithm was used to improve the retrieval efficiency. Hyma et al [23] resented a set of secure image retrieval schemes for biometric images. This scheme mainly compresses the image texture features and uses wavelet transform and Contourlet transform to maximize the Peak Signal-to-Noise Ratio(PSNR) of the image to reduce communication overhead.…”
Section: Introductionmentioning
confidence: 99%
“…The traditional access control like ,DAC(discretionary Access control),MAC(Mandatory Access Control),RBAC(Role based access control) and ABAC(Attribute Based Access Control )are not enough for the high security so that various Attribute based Encryption Scheme are proposed. [3] The data must be encrypted before uploading to the cloud by using some cryptographic algorithms [13]. Attribute Based Encryption (ABE) model was proposed by Sahai and Waters [7] in 2005.…”
Section: Introductionmentioning
confidence: 99%