The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2018
DOI: 10.1016/j.compeleceng.2017.08.020
|View full text |Cite
|
Sign up to set email alerts
|

Medical JPEG image steganography based on preserving inter-block dependencies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
53
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 135 publications
(53 citation statements)
references
References 14 publications
0
53
0
Order By: Relevance
“…Though light is less than 5 K lux in Figure 1, some white bright spots still appear in the middle of the image because the light source is located close to the lesion area and the shooting angle is not well selected. 8 This will bring great errors to recognition of medical image.…”
Section: Affected Factors Of Medical Image Qualitymentioning
confidence: 99%
“…Though light is less than 5 K lux in Figure 1, some white bright spots still appear in the middle of the image because the light source is located close to the lesion area and the shooting angle is not well selected. 8 This will bring great errors to recognition of medical image.…”
Section: Affected Factors Of Medical Image Qualitymentioning
confidence: 99%
“…In frequency domain based data hiding techniques, the original image is first transformed into frequency coefficients and then the secret data is embedded as part of transformed frequency coefficients. In compression domain based data hiding techniques, the original image is first compressed into compressed codes using any available image compression methods such as Joint Photographic Experts Group (JPEG) [13], Vector Quantization (VQ) [8], Graphics Interchange Format (GIF) [14], and Block Truncation Coding (BTC) [15] and then the secret data is embedded as part of the compressed codes. The secret data that is hidden as part of the compressed image is not easily visible and hackers or attackers will not usually be wary on stego-images.…”
Section: Introductionmentioning
confidence: 99%
“…Network multimedia comes into fashion in the form of services; there are many methods to protect multimedia data in traditional service mode, such as steganography [1,2] and data embedding [3]. By providing diversified media services, a new service mode, multimedia computing, has become an attractive technology to generate, edit, process, and search various media contents, like images, videos, audios, graphs, and so on [4].…”
Section: Introductionmentioning
confidence: 99%
“…It can guarantee the security and correctness of the data. (2) We study and implement a privacy-preserving set intersection protocol based on GM homomorphic encryption scheme and Bloom filter, and the proposed protocol is proved to be significant. (3) In detail, the protocol has some characteristics as follows:…”
Section: Introductionmentioning
confidence: 99%