MIWET: Medical image watermarking using encryption and fusion technique

A Anand, J Bedi, I Rida - Computers and Electrical Engineering, 2024 - Elsevier
Digital augmentation of contemporary healthcare has directed the expansion of ICT-based
systems. At this stage, a variety of telemedical support has been implemented to ensure the …

High-capacity data hiding for medical images based on the mask-RCNN model

H Saidi, O Tibermacine, A Elhadad - Scientific Reports, 2024 - nature.com
This study introduces a novel approach for integrating sensitive patient information within
medical images with minimal impact on their diagnostic quality. Utilizing the mask region …

A comparative analysis of chaos theory based medical image steganography to enhance data security

S Ghosh, A Saha, T Pal, AK Jha - Procedia Computer Science, 2024 - Elsevier
The security of patient data is a critical problem for health networks due to the rising
popularity of telehealth services and the requirements for clinical data sharing between …

Image watermarking scheme employing Gerchberg–Saxton algorithm and integer wavelet transform

C Zhang, K Liang, S Zhang… - Journal of Electronic …, 2024 - spiedigitallibrary.org
Image watermarking technology plays a key role in the protection of intellectual property
rights. In addition to digital watermarking, optical watermarking has also been widely …

Steganography Approach to Image Authentication Using Pulse Coupled Neural Network

R Forgáč, M Očkay, M Javurek, B Badidová - Computing and Informatics, 2023 - cai.sk
This paper introduces a model for the authentication of large-scale images. The crucial
element of the proposed model is the optimized Pulse Coupled Neural Network. This neural …

Electronic Medical Images Security and Privacy Techniques

D Sharma, C Prabha - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The Internet of Medical Things has gained focus in recent years. To protect medical data
being generated and transmitted securely without third-party intervention over shared …

[PDF][PDF] Enhanced security of EMI using an edge-based steganography with four-layered cryptography

D Sharma, C Prabha, A Goyal, M Malik, R Kumar - … .s3.ap-south-1.amazonaws.com
Security and privacy of EMI images while being transmitted over an insecure medium or
when stored on third-party storage. In this paper, an enhancement of the EBS …