Advertisement

An Extensive Study on Medical Image Security with ROI Preservation: Techniques, Evaluations, and Future Directions

  • Bijay Ku. Paikaray
  • Prachee DewanganEmail author
  • Debabala Swain
  • Sujata Chakravarty
Conference paper
  • 13 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1101)

Abstract

In the current era of digitization, the worldwide healthcare service is a common practice; it enables the remote healthcare service with proper digits: diagnosis and medication. The main thread for the about service is the security confidentiality and integrity of personal information of a patient. Many techniques are followed for privacy preservation in image information with descriptive aspects; however, more such strategies need to analyze and devolve for better accuracy and performance. This paper has given a broad overview of deferment techniques, their performance, and some future directions for ROI preservation in medical images.

Keywords

Medical image Data hiding ROI RONI Privacy preservation 

References

  1. 1.
    Cheddad, A., J. Condell, K. Curran, and P.M. Kevitt. 2010. Digital image steganography survey and analysis of current methods. Signal Processing 90: 727–752.  https://doi.org/10.1016/j.sigpro.2009.08.010.CrossRefzbMATHGoogle Scholar
  2. 2.
    Coatrieux, G., H. Maitre, and B. Sankur, et al. 2000. Relevance of watermarking in medical imaging. In Proceedings of IEEE EMBS International Conference on Information Technology Applications in Biomedicine, 250–255.Google Scholar
  3. 3.
    Xiyao, Liu, Jieting Lou, Hui Fang, Yan Chen, Pingbo Ouyang, Yifen Wang, Beiji Zou, Lei Wang. 2019. A Novel Robust Reversible Watermarking Scheme for Protecting Authenticity and Integrity of Medical Images. IEEE.  https://doi.org/10.1109/access.2019.2921894.
  4. 4.
    Liu Yuling, Qu, and Xin Guojiang Xinxin. 2016. A ROI-based reversible data hiding scheme in encrypted medical images. Journal of Visual Communication and Image Representation 39: 51–57.  https://doi.org/10.1016/j.jvcir.2016.05.008.CrossRefGoogle Scholar
  5. 5.
    Arvind, Bakshi, and A.K. Patel. 2019. Secure telemedicine using RONI halftoned visual cryptography without pixel expansion. Journal of Information Security and Applications 46: 281–295.  https://doi.org/10.1016/j.jisa.2019.03.004.CrossRefGoogle Scholar
  6. 6.
  7. 7.
    Liu, Y., X. Qu, G. Xin, et al. 2015. ROI-based reversible data hiding scheme for medical images with tamper detection. IEICE Transactions on Information and Systems E98-D (4): 769–774.Google Scholar
  8. 8.
    Lizhi, Xiong, and Dong Danping. 2019. Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. Journal of Information Security and Applications 47: 78–85.  https://doi.org/10.1016/j.jisa.2019.04.005.CrossRefGoogle Scholar
  9. 9.
    Koley, Subhadeep. 2019. A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography. Journal of King Saud University—CIS.  https://doi.org/10.1016/j.jksuci.2019.03.002.
  10. 10.
    Yan, X., L. Liu, Y. Lu, et al. 2019. Security analysis and classification of image secret sharing. Journal of Information Security and Applications 47: 208–216.  https://doi.org/10.1016/j.jisa.2019.05.008.CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Bijay Ku. Paikaray
    • 1
  • Prachee Dewangan
    • 2
    Email author
  • Debabala Swain
    • 2
  • Sujata Chakravarty
    • 1
  1. 1.Department of CSECenturion University of Technology and ManagementBhubaneswarIndia
  2. 2.Department of Computer ScienceRama Devi Women’s UniversityBhubaneswarIndia

Personalised recommendations