[go: up one dir, main page]

Judy et al., 2024 - Google Patents

Enhancing medical image security through steganography and ensemble deep authentication

Judy et al., 2024

View PDF
Document ID
17652555761381346607
Author
Judy S
Khilar R
Publication year
Publication venue
2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)

External Links

Snippet

Medicalimages often contain personally identifiable information (PII) of patients. Safeguarding the privacy and preventing unauthorized access to PII of patients is paramount as it involves sensitive data that demands protection. Steganography can contribute to …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation

Similar Documents

Publication Publication Date Title
Ansari et al. A comparative study of recent steganography techniques for multiple image formats
Khamrui et al. A genetic algorithm based steganography using discrete cosine transformation (GASDCT)
Abdel-Aziz et al. Improved data hiding method for securing color images
Lin et al. Efficient electronic patient information hiding scheme with tamper detection function for medical images
Kumar et al. Copyright protection of medical images: A view of the state-of-the-art research and current developments
Chinniyan et al. Image Steganography Using Deep Neural Networks.
Anusha et al. Secured communication of text and audio using image steganography
Abd Aziz et al. Image steganography:: Comparative analysis of their techniques, complexity and enhancements
Judy et al. Enhancing medical image security through steganography and ensemble deep authentication
Hussein et al. Design and simulation a video steganography system by using FFTturbo code methods for copyrights application
Rajput et al. A novel approach for image steganography based on LSB technique
Datta et al. A dual-image based robust reversible data hiding scheme based on weighted matrix and LZW algorithm
Hakim et al. Enhancing Data Security through Digital Image Steganography: An Implementation of the Two Least Significant Bits (2LSB) Method
Ahmed et al. Comprehensive Review of Cryptography and Steganography Algorithms
Hung et al. Secure discrete cosine transform based technique for recoverable tamper proofing
Santhi et al. A survey on medical image protection using various steganography techniques
Kanzariya et al. Security of digital images using steganography techniques based on LSB, DCT and Huffman encoding
Victoria et al. A study on spatial domain and transform domain steganography techniques used in image hiding
Mu’azu et al. Hybrid of least significant bits and most significant bits for improving security and quality of digital image steganography
Ayoob et al. A new method for watermarking color images using virtual hiding and El-Gamal ciphering
Allwadhi et al. A Hybrid Approach Towards Image Steganography Using LSB and Shannon–Fano Encoding Technique
Nagarajegowda et al. An adaptive approach for multi-media steganography using improved chaotic map and discrete cosine transform
Kuldiwar et al. Reversible color transmission of compressed fragment-visible mosaic image
Arwasaputra et al. Multi-Layer Hiding Scheme for Image Data Using Crypto-Stego with Compression Technique
Dharwadkar Unveiling the Hidden Pixels: A Comprehensive Exploration of Digital Image Steganography Schemes