Security of medical images for telemedicine: a systematic review

M Magdy, KM Hosny, NI Ghali, S Ghoniemy - Multimedia Tools and …, 2022 - Springer
Recently, there has been a rapid growth in the utilization of medical images in telemedicine
applications. The authors in this paper presented a detailed discussion of different types of …

[Retracted] Enhanced Lorenz‐Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare

P Rashmi, MC Supriya, Q Hua - Security and Communication …, 2022 - Wiley Online Library
Image encryption is highly required in the big data healthcare cloud to improve the security
of the medical image for remote access. Data hiding method is the process of storing the …

4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos

S Kacar, MZ Konyar, Ü Çavuşoğlu - Journal of Information Security and …, 2022 - Elsevier
Chaotic systems are used in various applications due to their high security and complexity.
Because minor changes in parameters have a significant effect on the output values and the …

High embedding capacity data hiding technique based on EMSD and LSB substitution algorithms

S Solak - IEEE Access, 2020 - ieeexplore.ieee.org
Data hiding called steganography is a security technique to protect secret data throughout
the transmission from malicious attackers. The purposes of steganography are to obtain …

Adaptive Removal of high-density salt-and-pepper noise (ARSPN) for robust ROI detection used in watermarking of MRI images of the brain

J Ebrahimnejad, A Naghsh - Computers in Biology and Medicine, 2021 - Elsevier
This paper presents a novel window-based method to remove high-density salt-and-pepper
noise for optimal ROI (Region Of Interest) detection of brain MRI (Magnetic Resonance …

Efficient data hiding method for videos based on adaptive inverted LSB332 and secure frame selection with enhanced Vigenere cipher

MZ Konyar, S Solak - Journal of Information Security and Applications, 2021 - Elsevier
In recent years, the importance of information security has increased due to the growth in
digital communication and steganography has come to the fore for secure communication …

Optimal semi-fragile watermarking based on maximum entropy random walk and swin transformer for tamper localization

P Aberna, L Agilandeeswari - IEEE Access, 2024 - ieeexplore.ieee.org
In the multimedia arena, image tampering is an uncontrollable process that necessitates
content authentication and tamper detection in a variety of applications. One method that is …

Advancing data privacy in color images through pixel-specific data hiding techniques

M Uzun, S Solak - Computers and Electrical Engineering, 2024 - Elsevier
Recently, it has become important to ensure data privacy, both when communicating and
storing data. Data hiding studies used to provide this privacy have become popular in recent …

A robust watermarking approach against high‐density salt and pepper noise (RWSPN) to enhance medical image security

J Ebrahimnejad, A Naghsh… - IET Image …, 2024 - Wiley Online Library
This paper proposes a robust watermarking method against high‐density salt and pepper
noise attacks. Automatic region of interest (ROI) detection, embedding encoded data …

A high-capacity reversible data-hiding scheme for medical image transmission using modified elias gamma encoding

VM Manikandan, KSR Murthy, B Siddineni, N Victor… - Electronics, 2022 - mdpi.com
Reversible data hiding (RDH) is a recently emerged research domain in the field of
information security domain with broad applications in medical images and meta-data …