LEADER 04298nam 22007335 450 001 9910337618603321 005 20200705045456.0 010 $a3-319-93311-6 024 7 $a10.1007/978-3-319-93311-5 035 $a(CKB)4100000004836421 035 $a(DE-He213)978-3-319-93311-5 035 $a(MiAaPQ)EBC5434966 035 $a(PPN)229495699 035 $a(EXLCZ)994100000004836421 100 $a20180621d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMedical Imaging and its Security in Telemedicine Applications /$fby Rohit Thanki, Surekha Borra 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XI, 57 p. 37 illus., 9 illus. in color.) 225 1 $aSpringerBriefs in Applied Sciences and Technology,$x2191-530X 311 $a3-319-93310-8 327 $aChapter 1.Introduction -- Chapter 2. Technical Information -- Chapter 3. Data Hiding Techniques for Security of Medical Images -- Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images -- Chapter 5.Conclusions. 330 $aThis book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding techniques: steganography and watermarking for medical images. The authors show how these techniques are used for security and integrity verification of medical images and designed for various types of medical images such as grayscale image and color image. The implementation of techniques are done using discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), redundant DWT (RDWT), fast discrete curvelet transform (FDCuT), finite ridgelet transform (FRT) and non-subsampled contourlet transform (NSCT). The results of these techniques are also demonstrated after description of each technique. Finally, some future research directions are provided for security of medical images in telemedicine application. 410 0$aSpringerBriefs in Applied Sciences and Technology,$x2191-530X 606 $aSignal processing 606 $aImage processing 606 $aSpeech processing systems 606 $aBiomedical engineering 606 $aHealth informatics 606 $aOptical data processing 606 $aComputer security 606 $aBiometrics (Biology) 606 $aSignal, Image and Speech Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/T24051 606 $aBiomedical Engineering and Bioengineering$3https://scigraph.springernature.com/ontologies/product-market-codes/T2700X 606 $aHealth Informatics$3https://scigraph.springernature.com/ontologies/product-market-codes/H28009 606 $aImage Processing and Computer Vision$3https://scigraph.springernature.com/ontologies/product-market-codes/I22021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aBiometrics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22040 615 0$aSignal processing. 615 0$aImage processing. 615 0$aSpeech processing systems. 615 0$aBiomedical engineering. 615 0$aHealth informatics. 615 0$aOptical data processing. 615 0$aComputer security. 615 0$aBiometrics (Biology). 615 14$aSignal, Image and Speech Processing. 615 24$aBiomedical Engineering and Bioengineering. 615 24$aHealth Informatics. 615 24$aImage Processing and Computer Vision. 615 24$aSystems and Data Security. 615 24$aBiometrics. 676 $a621.382 700 $aThanki$b Rohit$4aut$4http://id.loc.gov/vocabulary/relators/aut$0878537 702 $aBorra$b Surekha$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910337618603321 996 $aMedical Imaging and its Security in Telemedicine Applications$91961477 997 $aUNINA