Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding techniques: steganography and watermarking for medical images. The authors show how these techniques are used for security and integrity verification of medical images and designed for various types of medical images such as grayscale image and color image. The implementation of techniques are done…mehr
This book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding techniques: steganography and watermarking for medical images. The authors show how these techniques are used for security and integrity verification of medical images and designed for various types of medical images such as grayscale image and color image. The implementation of techniques are done using discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), redundant DWT (RDWT), fast discrete curvelet transform (FDCuT), finite ridgelet transform (FRT) and non-subsampled contourlet transform (NSCT). The results of these techniques are also demonstrated after description of each technique. Finally, some future research directions are provided forsecurity of medical images in telemedicine application.
Dr. Rohit Thanki obtained his Ph.D. in Multibiometric System Security using CS Theory and Watermarking from C. U. Shah University, Wadhwan city, Gujarat, India in 2017. His area of research is Digital Watermarking, Biometrics System, Security, Compressive Sensing, Pattern Recognition and Image Processing. He has published 5 books, 7 book chapters and more than 25 research papers to his credit in refereed & indexed journals, and conferences at international and national level. His international recognition includes his professional memberships & services in refereed organizations, programme committees and reviewer for journals published by IEEE, Elsevier, Taylor & Francis, Springer, IGI-Global
Dr. Surekha Borra is currently a Professor in the Department of ECE, K. S. Institute of Technology, Bangalore, Karnataka, India. She earned her Doctorate in Image Processing from Jawaharlal Nehru Technological University, Hyderabad, India, in 2015.Her research interests are in the areas of Image and Video Analytics, Machine Learning, Biometrics and Remote Sensing. She has published 2 Books, 10 book chapters and 30 research papers to her credit in refereed & indexed journals, and conferences at international and national levels. Her international recognition includes her professional memberships & services in refereed organizations, programme committees, editorial & review boards, wherein she has been a guest editor for 2 journals and reviewer for journals published by IEEE, IET, Elsevier, Taylor & Francis, Springer, IGI-Global etc. She has received Woman Achiever's Award from The Institution of Engineers (India), for her prominent research and innovative contribution (s)., Distinguished Educator & Scholar Award for her contributions to teaching and scholarly activities, Young Woman Achiever Award for her contribution in Copyright Protection of Images.
Inhaltsangabe
Chapter 1.Introduction.- Chapter 2. Technical Information.- Chapter 3. Data Hiding Techniques for Security of Medical Images.- Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images.- Chapter 5.Conclusions.
Chapter 1.Introduction.- Chapter 2. Technical Information.- Chapter 3. Data Hiding Techniques for Security of Medical Images.- Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images.- Chapter 5.Conclusions.
Chapter 1.Introduction.- Chapter 2. Technical Information.- Chapter 3. Data Hiding Techniques for Security of Medical Images.- Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images.- Chapter 5.Conclusions.
Chapter 1.Introduction.- Chapter 2. Technical Information.- Chapter 3. Data Hiding Techniques for Security of Medical Images.- Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images.- Chapter 5.Conclusions.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG i.I. Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309