2006 IEEE International Symposium on Circuits and Systems
DOI: 10.1109/iscas.2006.1693705
|View full text |Cite
|
Sign up to set email alerts
|

Low-Complexity Technique for Secure Storage and Sharing of Biomedical Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 12 publications
0
0
0
Order By: Relevance
“…Inmajorityofhospitalsandhealthcarecenters,thepatientrelatedinformationandassociated medicalimagesarestoredindependentlyinlargedatabasesasdifferentfiles.Storageanddistribution oftheseimagesrequireakey,patient'snameoruniqueID,foridentificationofimages.Theimages,if detachedfromrecords,canlosetheiridentity (Goldbaumetal.,1990,Singhetal.,2016.Therefore, patientdetailsandmedicalimagesshouldbeproperlystructured,soastoavoidmistreatmentandloss ofdata.Also,thisdataisnotprotectedfromanyillegalaccessandmaybemanipulatedeasily.So, thereisanurgentnecessitytoprotectandhandlethisdataunfailingly.Forauthenticationpurposes, itisessentialthatsomewatermarkwithidentityofpatientmustbeembeddedintheoriginalimage itself (Meher et al, 2006). This can be achieved by watermarking or data hiding.…”
Section: Introductionmentioning
confidence: 99%
“…Inmajorityofhospitalsandhealthcarecenters,thepatientrelatedinformationandassociated medicalimagesarestoredindependentlyinlargedatabasesasdifferentfiles.Storageanddistribution oftheseimagesrequireakey,patient'snameoruniqueID,foridentificationofimages.Theimages,if detachedfromrecords,canlosetheiridentity (Goldbaumetal.,1990,Singhetal.,2016.Therefore, patientdetailsandmedicalimagesshouldbeproperlystructured,soastoavoidmistreatmentandloss ofdata.Also,thisdataisnotprotectedfromanyillegalaccessandmaybemanipulatedeasily.So, thereisanurgentnecessitytoprotectandhandlethisdataunfailingly.Forauthenticationpurposes, itisessentialthatsomewatermarkwithidentityofpatientmustbeembeddedintheoriginalimage itself (Meher et al, 2006). This can be achieved by watermarking or data hiding.…”
Section: Introductionmentioning
confidence: 99%