Medical Imaging and its Security in Telemedicine Applications (Record no. 79256)

000 -LEADER
fixed length control field 03722nam a22006375i 4500
001 - CONTROL NUMBER
control field 978-3-319-93311-5
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801221050.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180621s2019 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319933115
-- 978-3-319-93311-5
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
100 1# - AUTHOR NAME
Author Thanki, Rohit.
245 10 - TITLE STATEMENT
Title Medical Imaging and its Security in Telemedicine Applications
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2019.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XI, 57 p. 37 illus., 9 illus. in color.
490 1# - SERIES STATEMENT
Series statement SpringerBriefs in Applied Sciences and Technology,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Chapter 1.Introduction -- Chapter 2. Technical Information -- Chapter 3. Data Hiding Techniques for Security of Medical Images -- Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images -- Chapter 5.Conclusions.
520 ## - SUMMARY, ETC.
Summary, etc This book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding techniques: steganography and watermarking for medical images. The authors show how these techniques are used for security and integrity verification of medical images and designed for various types of medical images such as grayscale image and color image. The implementation of techniques are done using discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), redundant DWT (RDWT), fast discrete curvelet transform (FDCuT), finite ridgelet transform (FRT) and non-subsampled contourlet transform (NSCT). The results of these techniques are also demonstrated after description of each technique. Finally, some future research directions are provided for security of medical images in telemedicine application.
700 1# - AUTHOR 2
Author 2 Borra, Surekha.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-319-93311-5
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
100 1# - AUTHOR NAME
-- (orcid)0000-0002-0645-6266
-- https://orcid.org/0000-0002-0645-6266
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2019.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Signal processing.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Biomedical engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Medical informatics.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer vision.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Biometric identification.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Signal, Speech and Image Processing .
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Biomedical Engineering and Bioengineering.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Health Informatics.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Vision.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Biometrics.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2191-5318
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.