{"title":"使用加密算法保护DICOM图像的机密性和完整性","authors":"Harshvardhan Tiwari, S. K., S. G","doi":"10.1145/2983402.2983418","DOIUrl":null,"url":null,"abstract":"Digital watermarking scheme is used to hide information in digital documents, images and multimedia files such as video or audio. It embeds a bit-pattern and influences the digital data by modifying its content. Telemedicine is an area where medicine and I&T (information and telecommunications) technology meets and its having the greatest impact on health care delivery. This paper proposed a watermarking scheme based on different security techniques to preserve basic security features such as confidentiality and integrity of DICOM images. The performance of proposed technique has been tested on different criterion and results prove that proposed technique fulfill all the security criterions.","PeriodicalId":283626,"journal":{"name":"Proceedings of the Third International Symposium on Computer Vision and the Internet","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Preserving Confidentiality and Integrity of DICOM Images Using Cryptographic Algorithms\",\"authors\":\"Harshvardhan Tiwari, S. K., S. G\",\"doi\":\"10.1145/2983402.2983418\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital watermarking scheme is used to hide information in digital documents, images and multimedia files such as video or audio. It embeds a bit-pattern and influences the digital data by modifying its content. Telemedicine is an area where medicine and I&T (information and telecommunications) technology meets and its having the greatest impact on health care delivery. This paper proposed a watermarking scheme based on different security techniques to preserve basic security features such as confidentiality and integrity of DICOM images. The performance of proposed technique has been tested on different criterion and results prove that proposed technique fulfill all the security criterions.\",\"PeriodicalId\":283626,\"journal\":{\"name\":\"Proceedings of the Third International Symposium on Computer Vision and the Internet\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Third International Symposium on Computer Vision and the Internet\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2983402.2983418\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Third International Symposium on Computer Vision and the Internet","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2983402.2983418","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Preserving Confidentiality and Integrity of DICOM Images Using Cryptographic Algorithms
Digital watermarking scheme is used to hide information in digital documents, images and multimedia files such as video or audio. It embeds a bit-pattern and influences the digital data by modifying its content. Telemedicine is an area where medicine and I&T (information and telecommunications) technology meets and its having the greatest impact on health care delivery. This paper proposed a watermarking scheme based on different security techniques to preserve basic security features such as confidentiality and integrity of DICOM images. The performance of proposed technique has been tested on different criterion and results prove that proposed technique fulfill all the security criterions.