Steganography for medical record image

C Hua, Y Wu, Y Shi, M Hu, R Xie, G Zhai… - Computers in Biology …, 2023 - Elsevier
Medical record images in EHR system are users' privacy and an asset, and there is an
urgent need to protect this data. Image steganography can offer a potential solution. A …

Two Robust Perceptual Image Hashing Schemes Based on Discrete Wavelet Transform

C Hu, F Yang, X Xing, H Liu, T Xiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Robustness, discrimination and security are essential characteristics of perceptual image
hashing in cloud computing. In this paper, we propose two image hashing schemes based …

A Shuffling-Steganography Algorithm to Protect Data of Drone Applications

AB Alkodre, NM Bahbouh, S Sendra… - … , Materials & Continua, 2024 - riunet.upv.es
[EN] In Saudi Arabia, drones are increasingly used in different sensitive domains like
military, health, and agriculture to name a few. Typically, drone cameras capture aerial …

High-fidelity reversible data-hiding technique in encrypted images using pixel value ordering and center folding strategy

S Midya, P Chowdhuri, P Pal - Journal of Electronic Imaging, 2024 - spiedigitallibrary.org
We propose a reversible data-hiding approach in encrypted images (RDHEI) to cope with
the new security threats emerging with artificial intelligence and the Industrial Internet of …

Development of a hardware-software solution for detection of complex-shaped objects in video stream

O Laktionov, A Yanko, A Hlushko - Technology audit and …, 2024 - journals.uran.ua
The object of the study is the process of diagnosing complex-shaped objects in a video
stream. The paper investigates the applied problem of creating a hardware-software solution …