Securing Medical Images for Mobile Health Systems Using a Combined Approach of Encryption and Steganography
暂无分享,去创建一个
[1] Jinshan Tang,et al. A mobile system for skin cancer diagnosis and monitoring , 2014, Sensing Technologies + Applications.
[2] Safya Belghith,et al. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms , 2017 .
[3] Zhilin Feng,et al. A multiscale contrast enhancement algorithm for breast cancer detection using Laplacian Pyramid , 2009, 2009 International Conference on Information and Automation.
[4] Samir Kumar Bandyopadhyay,et al. Secret Sharing Using 3 Level DWT Method of Image Steganography Based on Lorenz Chaotic Encryption and Visual Cryptography , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).
[5] G A Sathish Kumar,et al. A secure triple level encryption method using cryptography and steganography , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.
[6] N. Xuan,et al. Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[7] Jinshan Tang,et al. Comparison of several speckle reduction techniques for 3D ultrasound images , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[8] Zengqiang Chen,et al. A new image encryption algorithm based on hyper-chaos , 2008 .
[9] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[10] Jinshan Tang,et al. Cluster driven anisotropic diffusion for speckle reduction in ultrasound images , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[11] Jun Liu,et al. A contrast enhancement algorithm in the DCT domain with reduced artifacts for cancer detection , 2009, International Symposium on Multispectral Image Processing and Pattern Recognition.
[12] K. Thangadurai,et al. An analysis of LSB based image steganography techniques , 2014, 2014 International Conference on Computer Communication and Informatics.
[13] Mohsen Rahmani,et al. A new modified version of Advanced Encryption Standard based algorithm for image encryption , 2010, 2010 International Conference on Electronics and Information Engineering.
[14] Olivia R. Liu Sheng,et al. Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology , 1999, J. Manag. Inf. Syst..
[15] Lu Xu,et al. A novel bit-level image encryption algorithm based on chaotic maps , 2016 .
[16] Sattar Mirzakuchaki,et al. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..
[17] Suvranu De,et al. Telehealth innovations in health education and training. , 2010, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.
[18] A. Nag,et al. Image encryption using affine transform and XOR operation , 2011, 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies.
[19] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[20] K. S. Seethalakshmi,et al. Security enhancement in image steganography using neural networks and visual cryptography , 2016, 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS).
[21] Shaohua Tang,et al. A secure image sharing scheme with high quality stego-images based on steganography , 2017, Multimedia Tools and Applications.
[22] Ing Widya,et al. An Ontology for Telemedicine Systems Resiliency to Technological Context Variations in Pervasive Healthcare , 2015, IEEE Journal of Translational Engineering in Health and Medicine.
[23] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[24] Jinshan Tang,et al. 3D cluster-driven trilateral filter for speckle reduction in ultrasound images , 2015, Commercial + Scientific Sensing and Imaging.
[25] Jinshan Tang,et al. Content based image retrieval from chest radiography databases , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.
[26] Michael J. Holcomb,et al. Telemedicine, telehealth, and mobile health applications that work: opportunities and barriers. , 2014, The American journal of medicine.
[27] Abdul Hanan Abdullah,et al. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .
[28] S. Sastry,et al. Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[29] P. John Clarkson,et al. An Integrated Model of Patient and Staff Satisfaction Using Queuing Theory , 2015, IEEE Journal of Translational Engineering in Health and Medicine.
[30] Xiaoming Liu,et al. A multiscale image enhancement method for calcification detection in screening mammograms , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[31] Jinshan Tang,et al. Normalized wavelet diffusion for speckle reduction on 3D ultrasound image , 2009, International Symposium on Multispectral Image Processing and Pattern Recognition.