scispace - formally typeset
Open AccessProceedings ArticleDOI

A Study on the Applications of the Biomedical Image Encryption Methods for Secured Computer Aided Diagnostics

Reads0
Chats0
TLDR
In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access and can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.
Abstract
Computer aided diagnostic is one of the most active research area and has huge impact on the health care industry. With the advent of intelligent methods, biomedical data processing becomes easier and less error prone. Moreover, remote health care is also possible using the IoT infrastructure. However, data security over the network is always considered as a challenge. Biomedical data are generally sensitive to external disturbances and small manipulation in the data may cause huge difference in the ultimate result. Wrong diagnosis can be life threatening in some scenarios or can be severe in almost every instance. Therefore, biomedical data security is one of the major challenge and necessary for remote health care. In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access. This work can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.

read more

Citations
More filters
Book ChapterDOI

An Intelligent and Smart Belt for the Blind People

TL;DR: The Intelligent Smart Belt as mentioned in this paper is a belt in which any person can wear around there waist and does not need to hold anything in their hands, many sensors are attached with the belt to sense any type of obstacles that appear in front of the blind people.
Journal ArticleDOI

Medical image integrated possessions assisted soft computing techniques for optimized image fusion with less noise and high contour detection

TL;DR: This dual image fusion design uses a fuzzy mid matrix method and a smooth adjustment process which helps to eliminate impulsive noise from extremely distorted images that is included in a smart image agent when fusing image on various image processing environment.
Journal ArticleDOI

Symmetry GAN Detection Network: An Automatic One-Stage High-Accuracy Detection Network for Various Types of Lesions on CT Images

TL;DR: A symmetry GAN detection network based on a one-stage detection network to tackle the challenges in detecting lesions in CT images, and theoretically proven that by adding coefficients to each base activation function and performing a softmax function on all coefficients, parallel multi-activation functions can express a single activation function, which is a unique ability compared to others.
Book ChapterDOI

An Image Security Method Based on Low Dimensional Chaotic Environment and DNA Encoding

TL;DR: In this paper, a new image encryption method is proposed which is based on chaos theory and DNA computing, which is simple to implement and strong enough to resist various types of attacks, and experiments show some promising results both visually and numerically.
Book ChapterDOI

Patient’s Medical Data Security via Bi Chaos Bi Order Fourier Transform

TL;DR: In this article, the authors have combined the two chaotic maps for increasing the complexity level and blend it with the fractional Fourier transform with order m. The simulation is done on MATLAB platform, and the analysis is done through the PSNR, MSE, SSIM, and Correlation Coefficient.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Molecular computation of solutions to combinatorial problems

TL;DR: This experiment demonstrates the feasibility of carrying out computations at the molecular level by solving an instance of the directed Hamiltonian path problem with standard protocols and enzymes.
Journal ArticleDOI

Watermarking Techniques used in Medical Images: a Survey

TL;DR: This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.
Journal ArticleDOI

An efficient and secure medical image protection scheme based on chaotic maps

TL;DR: The proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm to address the efficiency problem encountered by many existing permutation-substitution type image ciphers.
Journal ArticleDOI

Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images

TL;DR: The method has been extensively tested and analyzed against known attacks and is found to be giving superior performance for robustness, capacity and reduced storage and bandwidth requirements compared to reported techniques suggested by other authors.
Related Papers (5)