Crypto-based algorithms for secured medical image transmission
暂无分享,去创建一个
[1] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[2] C.-C. Jay Kuo,et al. Digital Image Watermarking in Regions of Interest , 1999, PICS.
[3] Ed Dawson,et al. PKI, elliptic curve cryptography, and digital signatures , 1999, Comput. Secur..
[4] R. Collorec,et al. Relevance of watermarking in medical imaging , 2000, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS International Conference on Information Technol.
[5] Bülent Sankur,et al. Strict integrity control of biomedical images , 2001, IS&T/SPIE Electronic Imaging.
[6] Andreas Thiel,et al. A JAVA-based DICOM server with integration of clinical findings and DICOM-conform data encryption , 2001, Int. J. Medical Informatics.
[7] H. K. Huang,et al. Authenticity and integrity of digital mammography images , 2001, IEEE Transactions on Medical Imaging.
[8] Johannes A. Buchmann,et al. Introduction to Cryptography , 2001 .
[9] Chin-Ming Hsu,et al. A data-hiding technique with authentication, integration, and confidentiality for electronic patient records , 2002, IEEE Transactions on Information Technology in Biomedicine.
[10] Wullianallur Raghupathi,et al. Strategic IT applications in health care , 2002, CACM.
[11] Ruthe C Ashley,et al. Telemedicine: legal, ethical, and liability considerations. , 2002, Journal of the American Dietetic Association.
[12] U. Rajendra Acharya,et al. Reliable and robust transmission and storage of medical images with patient information , 2004, 2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04..
[13] Vincent Rijmen,et al. The WHIRLPOOL Hashing Function , 2003 .
[14] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[15] William Puech,et al. A new crypto-watermarking method for medical images safe transfer , 2004, 2004 12th European Signal Processing Conference.
[16] J. Craig,et al. Introduction to the Practice of Telemedicine , 2005, Journal of telemedicine and telecare.
[17] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[18] Sotiris Pavlopoulos,et al. Secure and efficient health data management through multiple watermarking on medical images , 2006, Medical and Biological Engineering and Computing.
[19] G. Coatrieux,et al. A Review of Image Watermarking Applications in Healthcare , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[20] Sotiris Pavlopoulos,et al. Multiple Image Watermarking Applied to Health Information Management , 2006, IEEE Transactions on Information Technology in Biomedicine.
[21] A. Murat Tekalp,et al. Lossless watermarking for image authentication: a new framework and an implementation , 2006, IEEE Transactions on Image Processing.
[22] Morris J. Dworkin,et al. SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC , 2007 .
[23] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[24] Tian-ge Zhuang,et al. A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data , 2009, Journal of Digital Imaging.
[25] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[26] Fintan J. McEvoy,et al. Security of Patient and Study Data Associated with DICOM Images when Transferred Using Compact Disc Media , 2009, Journal of Digital Imaging.
[27] Sérgio Shiguemi Furuie,et al. Proposal for DICOM Multiframe Medical Image Integrity and Authenticity , 2008, Journal of Digital Imaging.
[28] Tian-ge Zhuang,et al. Lossless Watermarking for Verifying the Integrity of Medical Images with Tamper Localization , 2009, Journal of Digital Imaging.
[29] Osamah M. Al-Qershi,et al. Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images , 2011, Journal of Digital Imaging.
[30] Paulo S. L. M. Barreto,et al. Providing Integrity and Authenticity in DICOM Images: A Novel Approach , 2009, IEEE Transactions on Information Technology in Biomedicine.
[31] Jasni Mohamad Zain,et al. Tamper Localization and Lossless Recovery Watermarking Scheme , 2011, ICSECS.
[32] Oleg S. Pianykh,et al. Digital Imaging and Communications in Medicine (DICOM) , 2017, Radiopaedia.org.
[33] A. M. Natarajan,et al. A Comparative Study on Digital Signatures Based on Elliptic Curves in High Speed Ad Hoc Networks , 2014 .
[34] Ali Al-Haj,et al. Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images , 2015, Journal of Digital Imaging.