Secure telemedicine using RONI halftoned visual cryptography without pixel expansion

Journal of Information Security and Applications - Tập 46 - Trang 281-295 - 2019
Arvind Bakshi1, Anoop Kumar Patel1
1National Institute of Technology, Kurukshetra, India

Tài liệu tham khảo

Kay, 2010, 2 Raman, 1997, A strategy for the development of secure telemedicine applications, 344 Hossain, 2014, A review on the security issues of telemedicine network, Int J Innov Res Electr Electron Instrum Control Eng, 2 Kaplan, 2008, Ethical challenges of telemedicine and telehealth, Camb Q Healthcare Ethics, 17, 401, 10.1017/S0963180108080535 Sood, 2007, What is telemedicine? A collection of 104 peer-reviewed perspectives and theoretical underpinnings, Telemed E-Health, 13, 573, 10.1089/tmj.2006.0073 Hersh, 2006, Diagnosis, access and outcomes: update of a systematic review of telemedicine services, J Telemed Telecare, 12, 3, 10.1258/135763306778393117 Garg, 2011, Telemedicine security: a systematic review, J Diabetes Sci Technol, 5, 768, 10.1177/193229681100500331 Bouman, 2017, Course notes on digital halftone, video and image processing program, school of electrical and computer engineering Naor, 1994, Visual cryptography, 1 Ito, 1999, Image size invariant visual cryptography, IEICE Trans Fundam, E82-A, 2172 Lin, 2003, Visual cryptography for gray level images by dithering techniques, Pattern Recognit Lett, 24, 349, 10.1016/S0167-8655(02)00259-3 Bresson, 2007, Provably secure authenticated group Diffie–Hellman key exchange, ACM Trans Inf Syst Secur, 10, 10.1145/1266977.1266979 Al-Haj, 2015, Crypto-based algorithms for secured medical image transmission, IET Inf Secur, 9, 365, 10.1049/iet-ifs.2014.0245 Gunjal, 2012, ROI based embedded watermarking of medical images for secured communication in telemedicine, Int J Comput Commun Eng, 6, 293 Wu, 2009, Arnold transformation algorithm and anti-arnold transformation algorithm, 1164 Guo, 2009, A region-based lossless watermarking scheme for enhancing security of medical data, J Digit Imaging, 22, 53, 10.1007/s10278-007-9043-6 Isac, 2011, Region of non-interest based digital image watermarking using neural networks, ICTACT J Image Video Process, 2, 287, 10.21917/ijivp.2011.0042 Zain, 2007, Reversible region of non-interest watermarking for authentication of DICOM images, Int J Comput Sci Netw Secur, 7, 19 Pan, 2009, Medical image integrity control combining digital signature and lossless watermarking, 153 Ni, 2006, Reversible data hiding, 16, 354 Al-Qershi O.M., Khoo B.E.. ROI-Based tamper detection and recovery for medical images using reversible watermarking technique. Proceedings of the conference on information theory and information security2011;:151–155. 10.1109/ICITIS.2010.5688743. Rivest R.. The MD5 message-digest algorithm. 1992. RFC 1321. 10.17487/RFC1321. Coatrieux, 2011, 169, 611 Tan, 2011, Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability, J Digit Imaging, 24, 528, 10.1007/s10278-010-9295-4 Chen, 2007, Image security system using recursive cellular automata substitution, Pattern Recognit, 40, 1621, 10.1016/j.patcog.2006.11.011 Li, 2007, Protection of mammograms using blind steganography and watermarking, 496 Rohini, 2010, Lossless medical image security, Int J Appl Eng Res Dindigul, 1, 536 Borra, 2016, Visual cryptography based lossless watermarking for sensitive images, 29 Srivastava R.. Performance measurement of image processing algorithms. In: Department of Computer Science & Engineering IIT BHU. India. Wang, 2003, Multi-scale structural similarity for image quality assessment, 2, 1398 Clark, 2013, The cancer imaging archive (TCIA): maintaining and operating a public information repository, J Digit Imaging, 26, 1045, 10.1007/s10278-013-9622-7