scispace - formally typeset
Open Access

A self recovery approach using halftone images for medical imagery system

TLDR
An overview of the emerging Visual Cryptography techniques used in the secure transfer of the medical images over in the internet using a binary logo which is used to represent the ownership of the host image which generates shadows by visual cryptography algorithms.
Abstract
Security has become an inseparable issue even in the field of medical applications. Communication in medicine and healthcare is very important. The fast growth of the exchange traffic in medical imagery on the Internet justifies the creation of adapted tools guaranteeing the quality and the confidentiality of the information while respecting the legal and ethical constraints, specific to this field. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by several different shares of binary images. It is hard to perceive any clues about a secret image from individual shares. The secret message is revealed when parts or all of these shares are aligned and stacked together. In this paper we provide an overview of the emerging Visual Cryptography (VC) techniques used in the secure transfer of the medical images over in the internet. The related work is based on the recovering of secret image using a binary logo which is used to represent the ownership of the host image which generates shadows by visual cryptography algorithms.

read more

Citations
More filters

International journal of graphics and multimedia (ijgm)

TL;DR: A new approach for face recognition using wavelet features is presented, where the test face image is processed to obtain wavelet energy features and recognized using neural network classifier.

Multimodality medical image fusion using improved contourlet transformation with log gabor filters

TL;DR: Improved contourlet transformation technique with modifying DFBs using log gabor filters will not only provide good quality of images but also localizes an image more accuratly and minimizes the DC component(noise in image).

Generation of cda/xml schema from dicom images using hl7 standard

TL;DR: A set of specifications is produced that allows free communication and exchange of data between medical software applications in order to eliminate or reduce incompatibility among different applications and to convert the standard patient data to XML/HL7 messaging using CDA for interoperability of HIS.

A novel technique in spiht for medical image compression

TL;DR: This paper considers that multi wavelet with Region of Interest (ROI) on the selecting portion will not only give the quality but also reduce the loss of information from image and implements the multi wavelets transformation with Modified Fast Haar Wavelet Transform in Set Partitioning in Hierarchical Trees algorithm.

TECHNOLOGY Novel Fast Haar Wavelet Transform for Brain Image Compression Using Spiht Algorithm

Ramesh Kumar, +1 more
TL;DR: In this article, a combination of Modified Fast Haar Wavelet Transform (MFHWT) and Set Partitioning in Hierarchical Trees (SPIHT) method is developed for compression of Brain images.
References
More filters

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI

Comparison of Interpolating Methods for Image Resampling

TL;DR: In this paper, the authors compared the performance of linear and cubic B-spline interpolation, linear interpolation and high-resolution cubic spline with edge enhancement with respect to the initial coordinate system.
Journal ArticleDOI

Visual cryptography for gray-level images by dithering techniques

TL;DR: A (k, n)-threshold visual cryptography scheme is proposed to encode a secret image into n shadow images, where any k or more of them can visually recover the secret image, but any k - 1 or fewer of them gain no information about it.
Journal ArticleDOI

Contrast Optimal Threshold Visual Cryptography Schemes

TL;DR: An upper bound on the contrast of any (3,n)-threshold VCS is proved and a scheme in the described family has optimal contrast and is completely characterize a contrast optimal (n-1,n) VCS in canonical form.
Journal ArticleDOI

Cheating Prevention in Visual Cryptography

TL;DR: A generic method that converts a VCS to another VCS that has the property of cheating prevention is proposed and the overhead of the conversion is near optimal in both contrast degression and pixel expansion.
Related Papers (5)