000 03722nam a22006375i 4500
001 978-3-319-93311-5
003 DE-He213
005 20220801221050.0
007 cr nn 008mamaa
008 180621s2019 sz | s |||| 0|eng d
020 _a9783319933115
_9978-3-319-93311-5
024 7 _a10.1007/978-3-319-93311-5
_2doi
050 4 _aTK5102.9
072 7 _aTJF
_2bicssc
072 7 _aUYS
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aUYS
_2thema
082 0 4 _a621.382
_223
100 1 _aThanki, Rohit.
_eauthor.
_0(orcid)0000-0002-0645-6266
_1https://orcid.org/0000-0002-0645-6266
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_953939
245 1 0 _aMedical Imaging and its Security in Telemedicine Applications
_h[electronic resource] /
_cby Rohit Thanki, Surekha Borra.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXI, 57 p. 37 illus., 9 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Applied Sciences and Technology,
_x2191-5318
505 0 _aChapter 1.Introduction -- Chapter 2. Technical Information -- Chapter 3. Data Hiding Techniques for Security of Medical Images -- Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images -- Chapter 5.Conclusions.
520 _aThis book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding techniques: steganography and watermarking for medical images. The authors show how these techniques are used for security and integrity verification of medical images and designed for various types of medical images such as grayscale image and color image. The implementation of techniques are done using discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), redundant DWT (RDWT), fast discrete curvelet transform (FDCuT), finite ridgelet transform (FRT) and non-subsampled contourlet transform (NSCT). The results of these techniques are also demonstrated after description of each technique. Finally, some future research directions are provided for security of medical images in telemedicine application.
650 0 _aSignal processing.
_94052
650 0 _aBiomedical engineering.
_93292
650 0 _aMedical informatics.
_94729
650 0 _aComputer vision.
_953940
650 0 _aData protection.
_97245
650 0 _aBiometric identification.
_911407
650 1 4 _aSignal, Speech and Image Processing .
_931566
650 2 4 _aBiomedical Engineering and Bioengineering.
_931842
650 2 4 _aHealth Informatics.
_931799
650 2 4 _aComputer Vision.
_953941
650 2 4 _aData and Information Security.
_931990
650 2 4 _aBiometrics.
_932763
700 1 _aBorra, Surekha.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_918089
710 2 _aSpringerLink (Online service)
_953942
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319933108
776 0 8 _iPrinted edition:
_z9783319933122
830 0 _aSpringerBriefs in Applied Sciences and Technology,
_x2191-5318
_953943
856 4 0 _uhttps://doi.org/10.1007/978-3-319-93311-5
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c79256
_d79256