A 3-layer RDH method in encrypted domain for medical information security
نویسندگان
چکیده
منابع مشابه
A Robust Zero-Watermarking Algorithm for Encrypted Medical Images in the DWT-DCT Encrypted Domain
Patients’ personal information contained in medical images can easily be intercepted and tampered with by unauthorized person when they are transmitted through the Internet. Therefore, it has latent risk of information leakage and should be seriously taken into account. Processing watermarking in the encrypted domain is a reasonable solution. The hybrid Discrete Wavelet Transform (DWT) and Disc...
متن کاملA Robust Watermarking Algorithm for Encrypted Medical Images Based on DFT Encrypted Domain
Most of the existing robust watermarking schemes were designed to embed the watermark information into the plaintext images, which leads to a latent risk of exposing information and are vulnerable to unauthorized access. In addition, the robustness of watermarking in the encrypted domain is another issue that should be taken into account. Based on Discrete Fourier Transform (DFT) and Logistic c...
متن کاملPresenting a method for extracting structured domain-dependent information from Farsi Web pages
Extracting structured information about entities from web texts is an important task in web mining, natural language processing, and information extraction. Information extraction is useful in many applications including search engines, question-answering systems, recommender systems, machine translation, etc. An information extraction system aims to identify the entities from the text and extr...
متن کاملPROVIDE A MODEL FOR IDENTIFYING AND RANKING THE MANAGERIAL FACTORS AFFECTING INFORMATION SECURITY IN ORGANIZATION BY USING VIKOR METHOD; CASE STUDY: TEHRAN UNIVERSITY OF MEDICAL SCIENCES
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملPROVIDE A MODEL FOR IDENTIFYING AND RANKING THE MANAGERIAL FACTORS AFFECTING INFORMATION SECURITY IN ORGANIZATION BY USING VIKOR METHOD; CASE STUDY: TEHRAN UNIVERSITY OF MEDICAL SCIENCES
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electronic Security and Digital Forensics
سال: 2020
ISSN: 1751-911X,1751-9128
DOI: 10.1504/ijesdf.2020.103869