Secure telemedicine using RONI halftoned visual cryptography without pixel expansion
Tài liệu tham khảo
Kay, 2010, 2
Raman, 1997, A strategy for the development of secure telemedicine applications, 344
Hossain, 2014, A review on the security issues of telemedicine network, Int J Innov Res Electr Electron Instrum Control Eng, 2
Kaplan, 2008, Ethical challenges of telemedicine and telehealth, Camb Q Healthcare Ethics, 17, 401, 10.1017/S0963180108080535
Sood, 2007, What is telemedicine? A collection of 104 peer-reviewed perspectives and theoretical underpinnings, Telemed E-Health, 13, 573, 10.1089/tmj.2006.0073
Hersh, 2006, Diagnosis, access and outcomes: update of a systematic review of telemedicine services, J Telemed Telecare, 12, 3, 10.1258/135763306778393117
Garg, 2011, Telemedicine security: a systematic review, J Diabetes Sci Technol, 5, 768, 10.1177/193229681100500331
Bouman, 2017, Course notes on digital halftone, video and image processing program, school of electrical and computer engineering
Naor, 1994, Visual cryptography, 1
Ito, 1999, Image size invariant visual cryptography, IEICE Trans Fundam, E82-A, 2172
Lin, 2003, Visual cryptography for gray level images by dithering techniques, Pattern Recognit Lett, 24, 349, 10.1016/S0167-8655(02)00259-3
Bresson, 2007, Provably secure authenticated group Diffie–Hellman key exchange, ACM Trans Inf Syst Secur, 10, 10.1145/1266977.1266979
Al-Haj, 2015, Crypto-based algorithms for secured medical image transmission, IET Inf Secur, 9, 365, 10.1049/iet-ifs.2014.0245
Gunjal, 2012, ROI based embedded watermarking of medical images for secured communication in telemedicine, Int J Comput Commun Eng, 6, 293
Wu, 2009, Arnold transformation algorithm and anti-arnold transformation algorithm, 1164
Guo, 2009, A region-based lossless watermarking scheme for enhancing security of medical data, J Digit Imaging, 22, 53, 10.1007/s10278-007-9043-6
Isac, 2011, Region of non-interest based digital image watermarking using neural networks, ICTACT J Image Video Process, 2, 287, 10.21917/ijivp.2011.0042
Zain, 2007, Reversible region of non-interest watermarking for authentication of DICOM images, Int J Comput Sci Netw Secur, 7, 19
Pan, 2009, Medical image integrity control combining digital signature and lossless watermarking, 153
Ni, 2006, Reversible data hiding, 16, 354
Al-Qershi O.M., Khoo B.E.. ROI-Based tamper detection and recovery for medical images using reversible watermarking technique. Proceedings of the conference on information theory and information security2011;:151–155. 10.1109/ICITIS.2010.5688743.
Rivest R.. The MD5 message-digest algorithm. 1992. RFC 1321. 10.17487/RFC1321.
Coatrieux, 2011, 169, 611
Tan, 2011, Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability, J Digit Imaging, 24, 528, 10.1007/s10278-010-9295-4
Chen, 2007, Image security system using recursive cellular automata substitution, Pattern Recognit, 40, 1621, 10.1016/j.patcog.2006.11.011
Li, 2007, Protection of mammograms using blind steganography and watermarking, 496
Rohini, 2010, Lossless medical image security, Int J Appl Eng Res Dindigul, 1, 536
Borra, 2016, Visual cryptography based lossless watermarking for sensitive images, 29
Srivastava R.. Performance measurement of image processing algorithms. In: Department of Computer Science & Engineering IIT BHU. India.
Wang, 2003, Multi-scale structural similarity for image quality assessment, 2, 1398
Clark, 2013, The cancer imaging archive (TCIA): maintaining and operating a public information repository, J Digit Imaging, 26, 1045, 10.1007/s10278-013-9622-7