Normal view MARC view ISBD view

Medical Imaging and its Security in Telemedicine Applications [electronic resource] / by Rohit Thanki, Surekha Borra.

By: Thanki, Rohit [author.].
Contributor(s): Borra, Surekha [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: SpringerBriefs in Applied Sciences and Technology: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019.Description: XI, 57 p. 37 illus., 9 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319933115.Subject(s): Signal processing | Biomedical engineering | Medical informatics | Computer vision | Data protection | Biometric identification | Signal, Speech and Image Processing | Biomedical Engineering and Bioengineering | Health Informatics | Computer Vision | Data and Information Security | BiometricsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 621.382 Online resources: Click here to access online
Contents:
Chapter 1.Introduction -- Chapter 2. Technical Information -- Chapter 3. Data Hiding Techniques for Security of Medical Images -- Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images -- Chapter 5.Conclusions.
In: Springer Nature eBookSummary: This book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding techniques: steganography and watermarking for medical images. The authors show how these techniques are used for security and integrity verification of medical images and designed for various types of medical images such as grayscale image and color image. The implementation of techniques are done using discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), redundant DWT (RDWT), fast discrete curvelet transform (FDCuT), finite ridgelet transform (FRT) and non-subsampled contourlet transform (NSCT). The results of these techniques are also demonstrated after description of each technique. Finally, some future research directions are provided for security of medical images in telemedicine application.
    average rating: 0.0 (0 votes)
No physical items for this record

Chapter 1.Introduction -- Chapter 2. Technical Information -- Chapter 3. Data Hiding Techniques for Security of Medical Images -- Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images -- Chapter 5.Conclusions.

This book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding techniques: steganography and watermarking for medical images. The authors show how these techniques are used for security and integrity verification of medical images and designed for various types of medical images such as grayscale image and color image. The implementation of techniques are done using discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), redundant DWT (RDWT), fast discrete curvelet transform (FDCuT), finite ridgelet transform (FRT) and non-subsampled contourlet transform (NSCT). The results of these techniques are also demonstrated after description of each technique. Finally, some future research directions are provided for security of medical images in telemedicine application.

There are no comments for this item.

Log in to your account to post a comment.