scispace - formally typeset
Open AccessProceedings ArticleDOI

A Study on the Applications of the Biomedical Image Encryption Methods for Secured Computer Aided Diagnostics

TLDR
In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access and can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.
Abstract
Computer aided diagnostic is one of the most active research area and has huge impact on the health care industry. With the advent of intelligent methods, biomedical data processing becomes easier and less error prone. Moreover, remote health care is also possible using the IoT infrastructure. However, data security over the network is always considered as a challenge. Biomedical data are generally sensitive to external disturbances and small manipulation in the data may cause huge difference in the ultimate result. Wrong diagnosis can be life threatening in some scenarios or can be severe in almost every instance. Therefore, biomedical data security is one of the major challenge and necessary for remote health care. In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access. This work can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.

read more

Citations
More filters
Book ChapterDOI

An Overview of Biomedical Image Analysis From the Deep Learning Perspective

TL;DR: In this chapter, a comprehensive overview of the deep learning-assisted biomedical image analysis methods is presented and can be helpful for the researchers to understand the recent developments and drawbacks of the present systems.
Book ChapterDOI

An Advanced Approach to Detect Edges of Digital Images for Image Segmentation

TL;DR: This chapter proposes a new filter (kernel), and the compass operator is applied on it to detect edges more efficiently, and the results are compared with some of the previously proposed filters both qualitatively and quantitatively.
Book ChapterDOI

Data Security Techniques Based on DNA Encryption

TL;DR: In this work, DNA encryption and its different approaches are discussed to give a brief overview on the data security methods based on DNA encryption.
Book ChapterDOI

Biomedical Image Security Using Matrix Manipulation and DNA Encryption

TL;DR: A secure and lossless encryption method is developed in this work and various numerical parameters are used to evaluate the performance of the proposed method which proves the effectiveness of the algorithm.
Journal ArticleDOI

An Operational DNA Strand Displacement Encryption Approach

TL;DR: The proposed encryption framework provides a potential way to realize DNA-strand-displacement-based encryption via biological experiments and promotes the research on DNA- Strand-Displacement -based encryption.
References
More filters
Journal ArticleDOI

DNA Chaos Blend to Secure Medical Privacy

TL;DR: A hybrid encryption scheme based on deoxyribo nucleic acid and chaotic maps, which can be adaptable for both selective and full medical image encryption is proposed, which uses multiple chaotic maps in single process to generate the highly random keys for encrypting the color digital imaging and communications in medicine image.
Journal ArticleDOI

An efficient and robust image encryption scheme for medical applications

TL;DR: Simulation results demonstrate high performance of the proposed scheme and show its robustness against cryptanalytic attacks, thus confirming its suitability for real-time secure image communication.
Journal Article

Information Hiding and Multimedia Signal Processing

TL;DR: Due to the noise induced during the transmission of data, reliable transmission of compressed multimedia is also an important issue in both academic research and real applications.
Journal ArticleDOI

Medical image security and EPR hiding using Shamir's secret sharing scheme

TL;DR: Shamir's secret sharing scheme is used to address all the security issues in one method which can store longer EPR strings along with better authenticity and confidentiality properties while satisfying all the requirements as shown in the results.
Journal ArticleDOI

Adaptive medical image encryption algorithm based on multiple chaotic mapping.

TL;DR: Experimental results show that the proposed adaptive medical image encryption algorithm overcomes the shortcoming of lack of diffusion in single direction encryption and could effectively resist all kinds of attacks and has better security and robustness.
Related Papers (5)