Medical Imaging and its Security in Telemedicine Applications

This book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding t...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Thanki, Rohit (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Borra, Surekha (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:SpringerBriefs in Applied Sciences and Technology,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04045nam a2200625 4500
001 978-3-319-93311-5
003 DE-He213
005 20200214064021.0
007 cr nn 008mamaa
008 180621s2019 gw | s |||| 0|eng d
020 |a 9783319933115  |9 978-3-319-93311-5 
024 7 |a 10.1007/978-3-319-93311-5  |2 doi 
040 |d GrThAP 
050 4 |a TK5102.9 
050 4 |a TA1637-1638 
072 7 |a TTBM  |2 bicssc 
072 7 |a TEC008000  |2 bisacsh 
072 7 |a TTBM  |2 thema 
072 7 |a UYS  |2 thema 
082 0 4 |a 621.382  |2 23 
100 1 |a Thanki, Rohit.  |e author.  |0 (orcid)0000-0002-0645-6266  |1 https://orcid.org/0000-0002-0645-6266  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Medical Imaging and its Security in Telemedicine Applications  |h [electronic resource] /  |c by Rohit Thanki, Surekha Borra. 
250 |a 1st ed. 2019. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2019. 
300 |a XI, 57 p. 37 illus., 9 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Applied Sciences and Technology,  |x 2191-530X 
505 0 |a Chapter 1.Introduction -- Chapter 2. Technical Information -- Chapter 3. Data Hiding Techniques for Security of Medical Images -- Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images -- Chapter 5.Conclusions. 
520 |a This book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding techniques: steganography and watermarking for medical images. The authors show how these techniques are used for security and integrity verification of medical images and designed for various types of medical images such as grayscale image and color image. The implementation of techniques are done using discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), redundant DWT (RDWT), fast discrete curvelet transform (FDCuT), finite ridgelet transform (FRT) and non-subsampled contourlet transform (NSCT). The results of these techniques are also demonstrated after description of each technique. Finally, some future research directions are provided for security of medical images in telemedicine application. 
650 0 |a Signal processing. 
650 0 |a Image processing. 
650 0 |a Speech processing systems. 
650 0 |a Biomedical engineering. 
650 0 |a Health informatics. 
650 0 |a Optical data processing. 
650 0 |a Computer security. 
650 0 |a Biometrics (Biology). 
650 1 4 |a Signal, Image and Speech Processing.  |0 http://scigraph.springernature.com/things/product-market-codes/T24051 
650 2 4 |a Biomedical Engineering and Bioengineering.  |0 http://scigraph.springernature.com/things/product-market-codes/T2700X 
650 2 4 |a Health Informatics.  |0 http://scigraph.springernature.com/things/product-market-codes/H28009 
650 2 4 |a Image Processing and Computer Vision.  |0 http://scigraph.springernature.com/things/product-market-codes/I22021 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Biometrics.  |0 http://scigraph.springernature.com/things/product-market-codes/I22040 
700 1 |a Borra, Surekha.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319933108 
776 0 8 |i Printed edition:  |z 9783319933122 
830 0 |a SpringerBriefs in Applied Sciences and Technology,  |x 2191-530X 
856 4 0 |u https://doi.org/10.1007/978-3-319-93311-5  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)