Author:
Kumar Satish,Singh Sunil,Chaurasia Pawan Kumar
Publisher
Springer Nature Singapore
Reference32 articles.
1. Norcen R, Podesser M, Pommer A, Schmidt HP, Uhl A (2003) Confidential storage and transmission of medical image data. Comput Biol Med 33(3):277–292. https://doi.org/10.1016/S0010-4825(02)00094-X
2. Chaurasia PK, Kumar S, Tiwari SK, Ansar SA, Yadav N, Soni N, Singh S (2022) The security of transforming digital medical images using RDWT, HT, AND SVD techniques. Harbin Gongye Daxue Xuebao/J Harbin Inst Technol 54(10):270–276
3. Med M, Kafi S, Redouane M, Amine K (2022) Secure transmission and integrity verification for color medical images in telemedicine applications. Multimed Tools Appl 43613–43638. https://doi.org/10.1007/s11042-021-11791-2
4. Ulutas M, Ulutas G, Nabiyev VV (2011) Medical image security and EPR hiding using Shamir’s secret sharing scheme. J Syst Softw 84(3):341–353. https://doi.org/10.1016/j.jss.2010.11.928
5. Magdy M, Hosny KM, Ghali NI, Ghoniemy S (2022) Security of medical images for telemedicine: a systematic review. Multimedia Tools Appl