Advancements in Security and Privacy Initiatives for Multimedia Images最新文献

筛选
英文 中文
Building an IPFS and Blockchain-Based Decentralized Storage Model for Medical Imaging 构建基于IPFS和区块链的医学影像分散存储模型
Advancements in Security and Privacy Initiatives for Multimedia Images Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2795-5.ch002
Randhir Kumar, Rakesh Tripathi
{"title":"Building an IPFS and Blockchain-Based Decentralized Storage Model for Medical Imaging","authors":"Randhir Kumar, Rakesh Tripathi","doi":"10.4018/978-1-7998-2795-5.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-2795-5.ch002","url":null,"abstract":"Currently, sharing and access of medical imaging is a significant element of present healthcare systems, but the existing infrastructure of medical image sharing depends on third-party approval. In this chapter, the authors have proposed a framework in order to provide a decentralized storage model for medical image sharing through IPFS and blockchain technology that remove the hurdle of third-party dependency. In the proposed model, the authors are sharing the imaging and communications in medicine (DICOM) medical images, which consist of various information related to disease, and hence, the framework can be utilized in the real-time application of the healthcare system. Moreover, the framework maintains the feature of immutability, privacy, and availability of information owing to the blockchain-based decentralized storage model. Furthermore, the authors have also discussed how the information can be accessed by the peers in the blockchain network with the help of consensus. To implement the framework, they have used the python ask and anaconda python.","PeriodicalId":206521,"journal":{"name":"Advancements in Security and Privacy Initiatives for Multimedia Images","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133299251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reversible Watermarking Techniques 可逆水印技术
Advancements in Security and Privacy Initiatives for Multimedia Images Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2795-5.ch005
M. S. Velpuru
{"title":"Reversible Watermarking Techniques","authors":"M. S. Velpuru","doi":"10.4018/978-1-7998-2795-5.ch005","DOIUrl":"https://doi.org/10.4018/978-1-7998-2795-5.ch005","url":null,"abstract":"Digital content security gained immense attention over past two decades due rapid digitization of industries and government sectors, and providing security to digital content became a vital challenge. Digital watermarking is one prominent solution to protect digital content from tamper detection and content authentication. However, digital watermarking can alter sensitive information present on cover-content during embedding, then the recovery of exact cover-content may not be possible during extraction process. Moreover, certain applications may not allow small distortions in cover-content. Hence, reversible watermarking techniques of digital content can extract cover-content and watermark completely. Additionally, reversible watermarking is gaining popularity by an increasing number of applications in military, law enforcement, healthcare. In this chapter, the authors compare and contrast the different reversible watermarking techniques with quality and embedding capacity parameters. This survey is essential due to the rapid evolution of reversible watermarking techniques.","PeriodicalId":206521,"journal":{"name":"Advancements in Security and Privacy Initiatives for Multimedia Images","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134549692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Time Series Analysis for Crime Forecasting Using ARIMA (Autoregressive Integrated Moving Average) Model 基于ARIMA(自回归综合移动平均)模型的时间序列分析
Advancements in Security and Privacy Initiatives for Multimedia Images Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2795-5.ch007
Neetu Faujdar, Anant Joshi
{"title":"Time Series Analysis for Crime Forecasting Using ARIMA (Autoregressive Integrated Moving Average) Model","authors":"Neetu Faujdar, Anant Joshi","doi":"10.4018/978-1-7998-2795-5.ch007","DOIUrl":"https://doi.org/10.4018/978-1-7998-2795-5.ch007","url":null,"abstract":"With massive advancements in the fields of data analysis and data mining, a new importance has been gained by data visualization. Data visualization focuses on visualizing and abstracting complex data to make it comprehensible and easy to understand using visual representation of information. Analysis of crime and crime-related data has been steadily popularizing over the last decade, and this chapter aims at visualizing such data. Crime data for several different types of crime for many countries in the world has been collected, compiled, processed, analyzed, and visualized in this chapter. Predictive analysis of this data has also been performed using time series analysis. This chapter aims to create a hub where internet users can easily view and interpret this data.","PeriodicalId":206521,"journal":{"name":"Advancements in Security and Privacy Initiatives for Multimedia Images","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133079396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolution of Big Data in Medical Imaging Modalities to Extract Features Using Region Growing Segmentation, GLCM, and Discrete Wavelet Transform 利用区域增长分割、GLCM和离散小波变换提取医学影像特征的大数据演变
Advancements in Security and Privacy Initiatives for Multimedia Images Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2795-5.ch003
Y. Gupta
{"title":"Evolution of Big Data in Medical Imaging Modalities to Extract Features Using Region Growing Segmentation, GLCM, and Discrete Wavelet Transform","authors":"Y. Gupta","doi":"10.4018/978-1-7998-2795-5.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-2795-5.ch003","url":null,"abstract":"Big data refers to the massive amount of data from sundry sources (gregarious media, healthcare, different sensor, etc.) with very high velocity. Due to expeditious growth, the multimedia or image data has rapidly incremented due to the expansion of convivial networking, surveillance cameras, satellite images, and medical images. Healthcare is the most promising area where big data can be applied to make a vicissitude in human life. The process for analyzing the intricate data is mundanely concerned with the disclosing of hidden patterns. In healthcare fields capturing the visual context of any medical images, extraction is a well introduced word in digital image processing. The motive of this research is to present a detailed overview of big data in healthcare and processing of non-invasive medical images with the avail of feature extraction techniques such as region growing segmentation, GLCM, and discrete wavelet transform.","PeriodicalId":206521,"journal":{"name":"Advancements in Security and Privacy Initiatives for Multimedia Images","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123022658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信