2011
DOI: 10.1016/j.jss.2010.11.928
|View full text |Cite
|
Sign up to set email alerts
|

Medical image security and EPR hiding using Shamir's secret sharing scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
53
0
2

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 88 publications
(55 citation statements)
references
References 18 publications
0
53
0
2
Order By: Relevance
“…10(a) [24]. The recovery of EPR in both of the forms on the extraction side is evident in the Figs 9(b) and 10(b), respectively [29][21]. Fig.…”
Section: Embedding and Extraction Of Electronic Patient Record (Epr)mentioning
confidence: 99%
“…10(a) [24]. The recovery of EPR in both of the forms on the extraction side is evident in the Figs 9(b) and 10(b), respectively [29][21]. Fig.…”
Section: Embedding and Extraction Of Electronic Patient Record (Epr)mentioning
confidence: 99%
“…Keeping necessary medical information (e.g., EPR including demographic data, diagnostic results, treatment procedures, etc.) hidden in medical images may provide a better security against malicious tampering, assuming medical images would not be of people's interest without the patient information [15,57]. Even that which is tampered intentionally or in an unintended manner can be detected and possibly recovered by using an appropriate watermarking scheme [58,59].…”
Section: Advantages Of Digital Watermarkingmentioning
confidence: 99%
“…Semi-fragile and fragile watermarks are being used to carry much information about itself, its owner's metadata, its distribution, etc., and are thus used for annotation (e.g., hiding ETR or EPR, etc.) [15,55,57,61,65,87] and integrity control (e.g., tamper detection and recovery) [8,59,[88][89][90].…”
Section: Choice Of Design and Evaluation Parametersmentioning
confidence: 99%
See 1 more Smart Citation
“…In this communication system, an application that uses image steganography implants the secret message bits into an official image like a person's photograph, forensic evidence, satellite image, medical image and scanned document [1,2]. After the bit implantation task, the official image, known as the cover image, is termed as the stego image.…”
Section: Introductionmentioning
confidence: 99%