Stegacryption of DICOM Metadata
read more
Citations
On the Development of a One-Time Pad Generator for Personalising Cloud Security
Secrecy and Randomness: Encoding Cloud data Locally using a One-Time Pad
On the Application of PSpice for Localised Cloud Security
Secured image transmission in medical imaging applications—A survey
Medical image protection in cloud system
References
Reversible data hiding
Analysis Methods for (Alleged) RCA
Analysis methods for (alleged) RC4
Blind image data hiding based on self reference
Medical image watermarking with tamper detection and recovery.
Related Papers (5)
Implementing the DICOM Standard for Digital Pathology.
Frequently Asked Questions (9)
Q2. What is the method for de-noising images?
Bivariate Shrinkage, a method for image thresholding, yields high performance with regard to de-noising images utilising the statistical dependence between wavelet coe - cients and their parent.
Q3. Why is the LL sub-band selected for embedding the watermark?
The LL sub-band of the transformed medical image is selected for embedding the watermark because it is more robust to attacks such as low-pass filtering.
Q4. What is the common method of watermarking medical images?
Other watermarking schemes that focus on applications in medical imaging include those that combine lossless compression and encryption [17] including blind watermarking assuming a DICOM format [18], [19] and [20].
Q5. What is the common method for detecting and restoring image tampering?
A medical image watermarking scheme based on histogram modification and block division di↵erences is considered in [9] and a block-based approach coupled with a histogram shift between the local minimum and maximum frequencies is considered in [10] and [15].
Q6. What is the method for reversible and fragile medical image watermarking?
Specific organ segmentation based approaches are considered in [11] for CT imaging, an LSB modification scheme that detects and recovers image tampering using a Region-of-Interest approach is considered in [12], [13] and [14] and a method for distortion-free, reversible and fragile medical image watermarking is given in [16].
Q7. What are the three algorithms presented in this paper?
From left to right: Original image, Stegocrypted image, MSE and PSNRThe algorithms presented in this paper are an attempt to solve a problem in the area of Telemedicine that has arisen from need to maintain patient confidentiality.
Q8. What is the process of extracting the image?
The extraction process is performed by estimating the appropriate coe cients from the CWT transform of the stego image and resorting the watermark bits.
Q9. What are the main techniques for encrypting and hiding data relating to themedical imaging?
A number of techniques have been proposed for both encrypting and hiding data relating to themedical imaging field using both spatial and transform based techniques.