scispace - formally typeset
Open AccessProceedings ArticleDOI

A Study on the Applications of the Biomedical Image Encryption Methods for Secured Computer Aided Diagnostics

TLDR
In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access and can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.
Abstract
Computer aided diagnostic is one of the most active research area and has huge impact on the health care industry. With the advent of intelligent methods, biomedical data processing becomes easier and less error prone. Moreover, remote health care is also possible using the IoT infrastructure. However, data security over the network is always considered as a challenge. Biomedical data are generally sensitive to external disturbances and small manipulation in the data may cause huge difference in the ultimate result. Wrong diagnosis can be life threatening in some scenarios or can be severe in almost every instance. Therefore, biomedical data security is one of the major challenge and necessary for remote health care. In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access. This work can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.

read more

Citations
More filters
Book ChapterDOI

Security Algorithms for Cloud Based Applications

TL;DR: The main concern of this paper is to analyze which encryption algorithm will be most efficient and convenient to be used in cloud computing to secure data as well as less time consuming algorithm.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Molecular computation of solutions to combinatorial problems

TL;DR: This experiment demonstrates the feasibility of carrying out computations at the molecular level by solving an instance of the directed Hamiltonian path problem with standard protocols and enzymes.
Journal ArticleDOI

Watermarking Techniques used in Medical Images: a Survey

TL;DR: This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.
Journal ArticleDOI

An efficient and secure medical image protection scheme based on chaotic maps

TL;DR: The proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm to address the efficiency problem encountered by many existing permutation-substitution type image ciphers.
Journal ArticleDOI

Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images

TL;DR: The method has been extensively tested and analyzed against known attacks and is found to be giving superior performance for robustness, capacity and reduced storage and bandwidth requirements compared to reported techniques suggested by other authors.
Related Papers (5)