2017 8th International Conference on Information Technology (ICIT) 2017
DOI: 10.1109/icitech.2017.8079950
|View full text |Cite
|
Sign up to set email alerts
|

Medical imaging security using partial encryption and histogram shifting watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…This method enhances the security of the image, but it is difficult to retrieve the image. The second method we evaluated was that of Abdel-Nabi and Al-Haj [20] who proposed another information embedding algorithm, where the hidden information is embedded into the image. Table 4 shows comparisons of figure size, type, and PSNR.…”
Section: Comparison Between Image Protection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This method enhances the security of the image, but it is difficult to retrieve the image. The second method we evaluated was that of Abdel-Nabi and Al-Haj [20] who proposed another information embedding algorithm, where the hidden information is embedded into the image. Table 4 shows comparisons of figure size, type, and PSNR.…”
Section: Comparison Between Image Protection Methodsmentioning
confidence: 99%
“…For this application, trying to hide what is in the sensitive areas, a low PSNR means more distortion, which makes it harder to visualize what is present. In a somewhat different approach, Abdel-Nabi et al [20] divides the image into two segments; one segment has a watermark embedded first and then is encrypted, while the second segment is encrypted and then has a watermark applied. The second watermark can be used to allow verification that the encrypted file has not been modified (tampered); the first watermark allows the end user to know that the image itself hasn't been modified during encryption/decryption.…”
Section: Introductionmentioning
confidence: 99%
“…Abdmouleh and coauthors [18] presented a new approach of partial encryption based on the Discrete Wavelet Transform (DWT). Abdel-Nabi and coauthors [19] implemented a simple and efficient joint reversible data hiding and encryption algorithm. Rajendra and coauthors [20] presented a diverse approach that interleaves patient information with medical images to reduce storage and transmission overheads.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As a result of the rapid development in the field of image processing and the high ability to change some of the information is only discovered by specialists. There was a need to encrypt the medical information sent to be preserved [2][3][4].…”
Section: Introductionmentioning
confidence: 99%