Manikandan et al., 2019 - Google Patents
A novel entropy-based reversible data hiding during encryptionManikandan et al., 2019
- Document ID
- 15988326364796973933
- Author
- Manikandan V
- Masilamani V
- Publication year
- Publication venue
- 2019 IEEE 1st International Conference on Energy, Systems and Information Processing (ICESIP)
External Links
Snippet
Recent advances in telemedicine services involve frequent communication and analysis of medical images. Confidentiality of medical images is a major concern in medical image transmission which can be achieved through image encryption. In this paper, we propose a …
- 230000002441 reversible 0 title abstract description 29
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Puteaux et al. | An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images | |
| El-Shafai et al. | Robust and efficient multi-level security framework for color medical images in telehealthcare services | |
| Zhang et al. | A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations | |
| Usman et al. | Using image steganography for providing enhanced medical data security | |
| US9773120B1 (en) | Forensic investigation tool | |
| Manikandan et al. | A novel entropy-based reversible data hiding during encryption | |
| Bouarroudj et al. | Secure and reversible fragile watermarking for accurate authentication and tamper localization in medical images | |
| Manikandan et al. | An adaptive pixel mapping based approach for reversible data hiding in encrypted images | |
| Njoum et al. | High-secured image LSB steganography using AVL-tree with random RGB channel substitution | |
| Arora et al. | Image steganography using enhanced LSB substitution technique | |
| Kareem | Hide text in an image using Blowfish algorithm and development of least significant bit technique | |
| Yi et al. | An improved reversible data hiding in encrypted images | |
| Sultana et al. | A new approach to hide data in color image using LSB steganography technique | |
| Wazery et al. | A hybrid technique based on RSA and data hiding for securing handwritten signature | |
| Vignesh et al. | An improved method for sharing medical images for privacy preserving machine learning using multiparty computation and steganography | |
| Prabhu et al. | Secured image transmission in medical imaging applications—a survey | |
| Bhagat et al. | A survey on medical images for reversible data hiding techniques | |
| Abhinav et al. | An improved reversible data hiding on encrypted images by selective pixel flipping technique | |
| Manikandan | A reversible data hiding scheme through encryption using rotated stream cipher | |
| Karakus et al. | Application of similarity-based image steganography method to computerized tomography images | |
| Anand et al. | Dicom compatible, 3d multimodality image encryption using hyperchaotic signal | |
| Kumar | A new encryption and decryption for 3D MRT images | |
| Leelavathi et al. | Securing telehealth electronic health records with adaptive chaotic encryption and dynamic key generation | |
| Nithya et al. | Watermarking and encryption in medical image through roi-lossless compression | |
| Ediriweera et al. | Web-Based Data Hiding: A Hybrid Approach Using Steganography and Visual Cryptography |