A Study on the Applications of the Biomedical Image Encryption Methods for Secured Computer Aided Diagnostics
Mousomi Roy,Kalyani Mali,Sankhadeep Chatterjee,Shouvik Chakraborty,Reshmi Debnath,Soumya Sen +5 more
Reads0
Chats0
TLDR
In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access and can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.Abstract:
Computer aided diagnostic is one of the most active research area and has huge impact on the health care industry. With the advent of intelligent methods, biomedical data processing becomes easier and less error prone. Moreover, remote health care is also possible using the IoT infrastructure. However, data security over the network is always considered as a challenge. Biomedical data are generally sensitive to external disturbances and small manipulation in the data may cause huge difference in the ultimate result. Wrong diagnosis can be life threatening in some scenarios or can be severe in almost every instance. Therefore, biomedical data security is one of the major challenge and necessary for remote health care. In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access. This work can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.read more
Citations
More filters
Book ChapterDOI
An Intelligent and Smart Belt for the Blind People
TL;DR: The Intelligent Smart Belt as mentioned in this paper is a belt in which any person can wear around there waist and does not need to hold anything in their hands, many sensors are attached with the belt to sense any type of obstacles that appear in front of the blind people.
Journal ArticleDOI
Medical image integrated possessions assisted soft computing techniques for optimized image fusion with less noise and high contour detection
V. Mithya,B. Nagaraj +1 more
TL;DR: This dual image fusion design uses a fuzzy mid matrix method and a smooth adjustment process which helps to eliminate impulsive noise from extremely distorted images that is included in a smart image agent when fusing image on various image processing environment.
Journal ArticleDOI
Symmetry GAN Detection Network: An Automatic One-Stage High-Accuracy Detection Network for Various Types of Lesions on CT Images
TL;DR: A symmetry GAN detection network based on a one-stage detection network to tackle the challenges in detecting lesions in CT images, and theoretically proven that by adding coefficients to each base activation function and performing a softmax function on all coefficients, parallel multi-activation functions can express a single activation function, which is a unique ability compared to others.
Book ChapterDOI
An Image Security Method Based on Low Dimensional Chaotic Environment and DNA Encoding
TL;DR: In this paper, a new image encryption method is proposed which is based on chaos theory and DNA computing, which is simple to implement and strong enough to resist various types of attacks, and experiments show some promising results both visually and numerically.
Book ChapterDOI
Patient’s Medical Data Security via Bi Chaos Bi Order Fourier Transform
Bharti Ahuja,Rajesh Doriya +1 more
TL;DR: In this article, the authors have combined the two chaotic maps for increasing the complexity level and blend it with the fractional Fourier transform with order m. The simulation is done on MATLAB platform, and the analysis is done through the PSNR, MSE, SSIM, and Correlation Coefficient.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI
Molecular computation of solutions to combinatorial problems
TL;DR: This experiment demonstrates the feasibility of carrying out computations at the molecular level by solving an instance of the directed Hamiltonian path problem with standard protocols and enzymes.
Journal ArticleDOI
Watermarking Techniques used in Medical Images: a Survey
TL;DR: This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.
Journal ArticleDOI
An efficient and secure medical image protection scheme based on chaotic maps
Chong Fu,Wei-hong Meng,Yong-feng Zhan,Zhiliang Zhu,Francis C. M. Lau,Chi K. Tse,Hong-feng Ma +6 more
TL;DR: The proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm to address the efficiency problem encountered by many existing permutation-substitution type image ciphers.
Journal ArticleDOI
Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images
TL;DR: The method has been extensively tested and analyzed against known attacks and is found to be giving superior performance for robustness, capacity and reduced storage and bandwidth requirements compared to reported techniques suggested by other authors.