2019
DOI: 10.1142/s0219691319500346
|View full text |Cite
|
Sign up to set email alerts
|

Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique

Abstract: Due to the huge advancement in technology, digitizing the multimedia content like text, images and videos has become easier. Everyday huge amounts of multimedia content are shared through the social networks using internet. Sometimes this multimedia content can be hacked by the hackers. This will lead to the misuse of the data. On the other hand, the medical content needs high security and privacy. Motivated by this, joint secured medical image compression–encryption mechanisms are proposed in this paper using… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…The software system directly faces the end users of RFID applications. The human-machine interface converts a single RFID event into an event that can be understood in stages by business users and uses the visual interface to project [ 19 , 20 ].…”
Section: Research and Design Methods Of Image Data Security Mechanimentioning
confidence: 99%
“…The software system directly faces the end users of RFID applications. The human-machine interface converts a single RFID event into an event that can be understood in stages by business users and uses the visual interface to project [ 19 , 20 ].…”
Section: Research and Design Methods Of Image Data Security Mechanimentioning
confidence: 99%
“…e feature extraction process of the symmetric difference algorithm is as follows: First, four time-domain feature definitions [20] are required, and the mean feature is defined as…”
Section: Symmetric Difference Algorithmmentioning
confidence: 99%
“…When a hacker learns, the knowledge is concealed in the cover image, and therefore it is possible to retrieve a medical image specifically. Since multi-scale transformations were compressed in medical pictures, various encryption technologies were employed, such as RSA [51], Blowfish, Concept, and RC5 [52]. There has been suggested a three-layer encryption system for medical files that can be used for encrypting watermarks, images, and file embedding [53].…”
Section: Related Workmentioning
confidence: 99%