Judy et al., 2024 - Google Patents
Enhancing medical image security through steganography and ensemble deep authenticationJudy et al., 2024
View PDF- Document ID
- 17652555761381346607
- Author
- Judy S
- Khilar R
- Publication year
- Publication venue
- 2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)
External Links
Snippet
Medicalimages often contain personally identifiable information (PII) of patients. Safeguarding the privacy and preventing unauthorized access to PII of patients is paramount as it involves sensitive data that demands protection. Steganography can contribute to …
- 230000002708 enhancing effect 0 title abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ansari et al. | A comparative study of recent steganography techniques for multiple image formats | |
| Khamrui et al. | A genetic algorithm based steganography using discrete cosine transformation (GASDCT) | |
| Abdel-Aziz et al. | Improved data hiding method for securing color images | |
| Lin et al. | Efficient electronic patient information hiding scheme with tamper detection function for medical images | |
| Kumar et al. | Copyright protection of medical images: A view of the state-of-the-art research and current developments | |
| Chinniyan et al. | Image Steganography Using Deep Neural Networks. | |
| Anusha et al. | Secured communication of text and audio using image steganography | |
| Abd Aziz et al. | Image steganography:: Comparative analysis of their techniques, complexity and enhancements | |
| Judy et al. | Enhancing medical image security through steganography and ensemble deep authentication | |
| Hussein et al. | Design and simulation a video steganography system by using FFTturbo code methods for copyrights application | |
| Rajput et al. | A novel approach for image steganography based on LSB technique | |
| Datta et al. | A dual-image based robust reversible data hiding scheme based on weighted matrix and LZW algorithm | |
| Hakim et al. | Enhancing Data Security through Digital Image Steganography: An Implementation of the Two Least Significant Bits (2LSB) Method | |
| Ahmed et al. | Comprehensive Review of Cryptography and Steganography Algorithms | |
| Hung et al. | Secure discrete cosine transform based technique for recoverable tamper proofing | |
| Santhi et al. | A survey on medical image protection using various steganography techniques | |
| Kanzariya et al. | Security of digital images using steganography techniques based on LSB, DCT and Huffman encoding | |
| Victoria et al. | A study on spatial domain and transform domain steganography techniques used in image hiding | |
| Mu’azu et al. | Hybrid of least significant bits and most significant bits for improving security and quality of digital image steganography | |
| Ayoob et al. | A new method for watermarking color images using virtual hiding and El-Gamal ciphering | |
| Allwadhi et al. | A Hybrid Approach Towards Image Steganography Using LSB and Shannon–Fano Encoding Technique | |
| Nagarajegowda et al. | An adaptive approach for multi-media steganography using improved chaotic map and discrete cosine transform | |
| Kuldiwar et al. | Reversible color transmission of compressed fragment-visible mosaic image | |
| Arwasaputra et al. | Multi-Layer Hiding Scheme for Image Data Using Crypto-Stego with Compression Technique | |
| Dharwadkar | Unveiling the Hidden Pixels: A Comprehensive Exploration of Digital Image Steganography Schemes |