2016
DOI: 10.1007/s10278-016-9901-1
|View full text |Cite
|
Sign up to set email alerts
|

Crypto-Watermarking of Transmitted Medical Images

Abstract: Telemedicine is a booming healthcare practice that has facilitated the exchange of medical data and expertise between healthcare entities. However, the widespread use of telemedicine applications requires a secured scheme to guarantee confidentiality and verify authenticity and integrity of exchanged medical data. In this paper, we describe a region-based, crypto-watermarking algorithm capable of providing confidentiality, authenticity, and integrity for medical images of different modalities. The proposed alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(25 citation statements)
references
References 31 publications
(38 reference statements)
0
24
0
1
Order By: Relevance
“…Research established that the combinations of these two security techniques are providing dual-level security for secret/personal information in various applications. 1,4 (A) (B)…”
Section: Framework Of the Proposed Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Research established that the combinations of these two security techniques are providing dual-level security for secret/personal information in various applications. 1,4 (A) (B)…”
Section: Framework Of the Proposed Workmentioning
confidence: 99%
“…Digitization of modern health care has led to the development and growth of communication and information systems. Nowadays, we find great surge in telehealth applications, such as teleconsulting, telediagnosis, and telesurgery, which are being utilized for providing effective health care facilities 1–4 . This involves the exchange of vital health data among physicians, hospital personnel, and patients, which need to be secured against any form of malicious and unintentional attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Images are now widely used in modern clinic diagnosis. The diagnostic images with confidential information related to patients’ privacy are stored and transmitted via public networks (Cao et al, 2016, Al-Haj et al, 2017). With the rapid development of the internet and new communication technologies, sharing of information such as image information and position information (Chen and Zou, 2017) has become easier and faster (Kwok and Tang, 2007).…”
Section: Introductionmentioning
confidence: 99%
“…Number of lossless compression techniques is available like Huffman coding, Shannon-Fano algorithm, dictionary coding, run length coding etc., [17]. In Al-Haj, Ahmad Mohammad [18], the medical image is divided into ROI and RONI and applied Discrete Wavelet Transform (DWT) to the medical image, where hash value of watermark is embedded in sub-bands. The disadvantage of this method is that, it is only used for authentication of ROI but it fails in recovering the ROI in case of tampering of ROI.…”
Section: Introductionmentioning
confidence: 99%