Li et al., 2022 - Google Patents
Medical images lossless recovery based on POB number system and image compressionLi et al., 2022
View HTML- Document ID
- 12391377624380838120
- Author
- Li Q
- Fu Y
- Zhang Z
- Fofanah A
- Gao T
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
To protect the information integrity of the medical images, this paper proposes a secure lossless recovery scheme for medical images based on image block compression and permutation ordered binary (POB) number system, which includes two parts: share …
- 238000011084 recovery 0 title abstract description 71
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/60—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Anand et al. | An improved DWT-SVD domain watermarking for medical information security | |
| Ayubi et al. | A new chaotic complex map for robust video watermarking | |
| Chen et al. | An asymmetric image encryption scheme based on hash SHA-3, RSA and compressive sensing | |
| Yu et al. | Reversible data hiding in encrypted images with secret sharing and hybrid coding | |
| Bao et al. | A secure and robust image encryption algorithm based on compressive sensing and DNA coding | |
| Parah et al. | A new secure and robust watermarking technique based on logistic map and modification of DC coefficient | |
| Selva Mary et al. | Secure grayscale image communication using significant visual cryptography scheme in real time applications | |
| Kannammal et al. | Two level security for medical images using watermarking/encryption algorithms | |
| Li et al. | Distortion less secret image sharing scheme for Internet of Things system | |
| Ponuma et al. | Visually meaningful image encryption using data hiding and chaotic compressive sensing | |
| Pavithra et al. | A survey on the techniques of medical image encryption | |
| Li et al. | Medical images lossless recovery based on POB number system and image compression | |
| Xiao et al. | High capacity data hiding in encrypted image based on compressive sensing for nonequivalent resources | |
| Musanna et al. | A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher images | |
| Yang et al. | Dual embedding model: a new framework for visually meaningful image encryption | |
| Meng et al. | Reversible data hiding in encrypted images based on IWT and chaotic system | |
| Mukherjee et al. | An efficient multi-bit steganography algorithm in spatial domain with two-layer security | |
| Xiao et al. | A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance | |
| Ren et al. | Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering | |
| Gao et al. | A secure lossless recovery for medical images based on image encoding and data self-embedding | |
| Ren et al. | A visually secure image encryption scheme based on compressed sensing and Chebyshev-dynamics coupled map lattices in cloud environment | |
| Ma et al. | A secure multi-party hybrid encryption sharing scheme with a new 2D sine-cosine chaotic system and compressed sensing | |
| Liu et al. | Image processing method based on chaotic encryption and wavelet transform for planar design | |
| Nazari et al. | Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT | |
| Yang et al. | A visually secure image encryption algorithm based on block compressive sensing and deep neural networks |