000 | 03722nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-319-93311-5 | ||
003 | DE-He213 | ||
005 | 20220801221050.0 | ||
007 | cr nn 008mamaa | ||
008 | 180621s2019 sz | s |||| 0|eng d | ||
020 |
_a9783319933115 _9978-3-319-93311-5 |
||
024 | 7 |
_a10.1007/978-3-319-93311-5 _2doi |
|
050 | 4 | _aTK5102.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
072 | 7 |
_aUYS _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aThanki, Rohit. _eauthor. _0(orcid)0000-0002-0645-6266 _1https://orcid.org/0000-0002-0645-6266 _4aut _4http://id.loc.gov/vocabulary/relators/aut _953939 |
|
245 | 1 | 0 |
_aMedical Imaging and its Security in Telemedicine Applications _h[electronic resource] / _cby Rohit Thanki, Surekha Borra. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXI, 57 p. 37 illus., 9 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Applied Sciences and Technology, _x2191-5318 |
|
505 | 0 | _aChapter 1.Introduction -- Chapter 2. Technical Information -- Chapter 3. Data Hiding Techniques for Security of Medical Images -- Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images -- Chapter 5.Conclusions. | |
520 | _aThis book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding techniques: steganography and watermarking for medical images. The authors show how these techniques are used for security and integrity verification of medical images and designed for various types of medical images such as grayscale image and color image. The implementation of techniques are done using discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), redundant DWT (RDWT), fast discrete curvelet transform (FDCuT), finite ridgelet transform (FRT) and non-subsampled contourlet transform (NSCT). The results of these techniques are also demonstrated after description of each technique. Finally, some future research directions are provided for security of medical images in telemedicine application. | ||
650 | 0 |
_aSignal processing. _94052 |
|
650 | 0 |
_aBiomedical engineering. _93292 |
|
650 | 0 |
_aMedical informatics. _94729 |
|
650 | 0 |
_aComputer vision. _953940 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aBiometric identification. _911407 |
|
650 | 1 | 4 |
_aSignal, Speech and Image Processing . _931566 |
650 | 2 | 4 |
_aBiomedical Engineering and Bioengineering. _931842 |
650 | 2 | 4 |
_aHealth Informatics. _931799 |
650 | 2 | 4 |
_aComputer Vision. _953941 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aBiometrics. _932763 |
700 | 1 |
_aBorra, Surekha. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _918089 |
|
710 | 2 |
_aSpringerLink (Online service) _953942 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319933108 |
776 | 0 | 8 |
_iPrinted edition: _z9783319933122 |
830 | 0 |
_aSpringerBriefs in Applied Sciences and Technology, _x2191-5318 _953943 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-93311-5 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c79256 _d79256 |