메뉴 건너뛰기




Volumn 33, Issue 3, 2003, Pages 277-292

Confidential storage and transmission of medical image data

Author keywords

AES; Confidentiality for medical images; JPEG2000; Selective or partial encryption

Indexed keywords

AUGER ELECTRON SPECTROSCOPY; COMPUTATIONAL METHODS; CRYPTOGRAPHY; IMAGE ANALYSIS;

EID: 0242669216     PISSN: 00104825     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0010-4825(02)00094-X     Document Type: Review
Times cited : (88)

References (33)
  • 1
    • 0029248912 scopus 로고
    • Radiologic image compression - A review
    • Wong S., Zaremba L., Gooden D., Huang H.K. Radiologic image compression - a review. Proc. IEEE. 83(2):1995;194-219.
    • (1995) Proc. IEEE , vol.83 , Issue.2 , pp. 194-219
    • Wong, S.1    Zaremba, L.2    Gooden, D.3    Huang, H.K.4
  • 2
    • 0028445482 scopus 로고
    • Evaluating quality of compressed medical images: SNR, subjective rating, and diagnostic accuracy
    • Cosman P.C., Gray R.M., Olshen R.A. Evaluating quality of compressed medical images. SNR, subjective rating, and diagnostic accuracy Proc. IEEE. 82(6):1994;919-932.
    • (1994) Proc. IEEE , vol.82 , Issue.6 , pp. 919-932
    • Cosman, P.C.1    Gray, R.M.2    Olshen, R.A.3
  • 3
    • 0034658035 scopus 로고    scopus 로고
    • Selective medical image compression techniques for telemedical and archiving applications
    • Bruckmann A., Uhl A. Selective medical image compression techniques for telemedical and archiving applications. Comput. Biol. Med. 30(3):2000;153-169.
    • (2000) Comput. Biol. Med. , vol.30 , Issue.3 , pp. 153-169
    • Bruckmann, A.1    Uhl, A.2
  • 5
    • 0037408260 scopus 로고    scopus 로고
    • Topical cardiac cooling - computer simulation of myocardial temperature changes
    • to appear
    • P. Trunk, B. Gersak, R. Trobec, Topical cardiac cooling - computer simulation of myocardial temperature changes, Comput. Biol. Med. (2003), to appear.
    • (2003) Comput. Biol. Med.
    • Trunk, P.1    Gersak, B.2    Trobec, R.3
  • 7
    • 0003855464 scopus 로고    scopus 로고
    • Protocols, Algorithms and Source Code in C, Wiley Publishers, New York
    • B. Schneier, Applied Cryptography, 2nd Edition: Protocols, Algorithms and Source Code in C, Wiley Publishers, New York, 1996.
    • (1996) Applied Cryptography, 2nd Edition
    • Schneier, B.1
  • 12
    • 0029424437 scopus 로고
    • T. Maples, G. Spanos, Performance study of a selective encryption scheme for the security of networked real-time video, in: Proceedings of the Fourth International Conference on Computer Communications and Networks (ICCCN'95), Las Vegas, NV
    • T. Maples, G. Spanos, Performance study of a selective encryption scheme for the security of networked real-time video, in: Proceedings of the Fourth International Conference on Computer Communications and Networks (ICCCN'95), Las Vegas, NV, 1995.
    • (1995)
  • 13
    • 85031189217 scopus 로고    scopus 로고
    • P.A. Schneck, K. Schwan, Authenticast: an adaptive protocol for high-performance, secure network applications, Technical Report, Georgia Institute of Technology, Atlanta, GA, USA, 1997.
    • P.A. Schneck, K. Schwan, Authenticast: an adaptive protocol for high-performance, secure network applications, Technical Report, Georgia Institute of Technology, Atlanta, GA, USA, 1997.
  • 14
    • 84905857886 scopus 로고    scopus 로고
    • C. Shi, B. Bhargava, A fast MPEG video encryption algorithm, in: Proceedings of the ACM Multimedia 1998, Boston, USA, 1998, pp. 81-88.
    • C. Shi, B. Bhargava, A fast MPEG video encryption algorithm, in: Proceedings of the ACM Multimedia 1998, Boston, USA, 1998, pp. 81-88.
  • 15
    • 0030419062 scopus 로고    scopus 로고
    • L. Tang, Methods for encrypting and decrypting MPEG video data efficiently, in: Proceedings of the ACM Multimedia 1996, Boston, USA, November 1996, pp. 219-229.
    • L. Tang, Methods for encrypting and decrypting MPEG video data efficiently, in: Proceedings of the ACM Multimedia 1996, Boston, USA, November 1996, pp. 219-229.
  • 16
    • 85031185200 scopus 로고    scopus 로고
    • Tsung-Li Wu, S. Felix Wu, Selective encryption and watermarking of MPEG video (extended abstract), in: H.R. Arabnia (Ed.), Proceedings of the International Conference on Image Science, Systems, and Technology, CISST '97, Las Vegas, USA, February 1997.
    • Tsung-Li Wu, S. Felix Wu, Selective encryption and watermarking of MPEG video (extended abstract), in: H.R. Arabnia (Ed.), Proceedings of the International Conference on Image Science, Systems, and Technology, CISST '97, Las Vegas, USA, February 1997.
  • 17
    • 0033279372 scopus 로고    scopus 로고
    • Wenjun Zeng, Shawmin Lei, Efficient frequency domain video scrambling for content access control, in: Proceedings of ACM Multimedia, 1999, Orlando, FL, USA, November 1999, pp. 285-293.
    • Wenjun Zeng, Shawmin Lei, Efficient frequency domain video scrambling for content access control, in: Proceedings of ACM Multimedia, 1999, Orlando, FL, USA, November 1999, pp. 285-293.
  • 18
    • 0035765561 scopus 로고    scopus 로고
    • Raphaël Grosbois, Pierre Gerbelot, Touradj Ebrahimi, Authentication and access control in the JPEG 2000 compressed domain, in: A.G. Tescher (Ed.), Applications of Digital Image Processing XXIV, Proceedings of SPIE, Vol. 4472, San Diego, CA, USA, July 2001.
    • Raphaël Grosbois, Pierre Gerbelot, Touradj Ebrahimi, Authentication and access control in the JPEG 2000 compressed domain, in: A.G. Tescher (Ed.), Applications of Digital Image Processing XXIV, Proceedings of SPIE, Vol. 4472, San Diego, CA, USA, July 2001.
  • 19
    • 0034780691 scopus 로고    scopus 로고
    • A. Pommer, A. Uhl, Wavelet packet methods for multimedia compression and encryption, in: Proceedings of the 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Victoria, Canada, August 2001, IEEE Signal Processing Society, 2001, pp. 1-4.
    • A. Pommer, A. Uhl, Wavelet packet methods for multimedia compression and encryption, in: Proceedings of the 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Victoria, Canada, August 2001, IEEE Signal Processing Society, 2001, pp. 1-4.
  • 20
    • 85031180657 scopus 로고    scopus 로고
    • A. Pommer, A. Uhl, Selective encryption of wavelet packet subband structures for obscured transmission of visual data, in: Proceedings of the Third IEEE Benelux Signal Processing Symposium (SPS 2002), Leuven, Belgium, March 2002, IEEE Benelux Signal Processing Chapter, 2002, pp. 25-28.
    • A. Pommer, A. Uhl, Selective encryption of wavelet packet subband structures for obscured transmission of visual data, in: Proceedings of the Third IEEE Benelux Signal Processing Symposium (SPS 2002), Leuven, Belgium, March 2002, IEEE Benelux Signal Processing Chapter, 2002, pp. 25-28.
  • 21
    • 85031179965 scopus 로고    scopus 로고
    • T. Uehara, R. Safavi-Naini, P. Ogunbona, Securing wavelet compression with random permutations, in: Proceedings of the 2000 IEEE Pacific Rim Conference on Multimedia, Sydney, December 2000, IEEE Signal Processing Society, pp. 332-335.
    • T. Uehara, R. Safavi-Naini, P. Ogunbona, Securing wavelet compression with random permutations, in: Proceedings of the 2000 IEEE Pacific Rim Conference on Multimedia, Sydney, December 2000, IEEE Signal Processing Society, pp. 332-335.
  • 22
    • 85031191119 scopus 로고    scopus 로고
    • H. Cheng, X. Li, On the application of image decomposition to image compression and encryption, in: P. Horster (Ed.), Communications and Multimedia Security II, IFIP TC6/TC11 Second Joint Working Conference on Communications and Multimedia Security, CMS '96, Essen, Germany, September 1996, Chapman & Hall, London, pp. 116-127.
    • H. Cheng, X. Li, On the application of image decomposition to image compression and encryption, in: P. Horster (Ed.), Communications and Multimedia Security II, IFIP TC6/TC11 Second Joint Working Conference on Communications and Multimedia Security, CMS '96, Essen, Germany, September 1996, Chapman & Hall, London, pp. 116-127.
  • 23
    • 0034249821 scopus 로고    scopus 로고
    • Partial encryption of compressed images and videos
    • Cheng H., Li X. Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8):2000;2439-2451.
    • (2000) IEEE Trans. Signal Process. , vol.48 , Issue.8 , pp. 2439-2451
    • Cheng, H.1    Li, X.2
  • 24
    • 85031183569 scopus 로고    scopus 로고
    • M. Podesser, H.-P. Schmidt, A. Uhl, Selective bitplane encryption for secure transmission of image data in mobile environments, CD-ROM in: Proceedings of the Fifth IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway, October 2002, file cr1037.pdf, IEEE Norway Section.
    • M. Podesser, H.-P. Schmidt, A. Uhl, Selective bitplane encryption for secure transmission of image data in mobile environments, CD-ROM in: Proceedings of the Fifth IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway, October 2002, file cr1037.pdf, IEEE Norway Section.
  • 25
    • 0034789049 scopus 로고    scopus 로고
    • Ali Saman Tosun, Wu Chi Feng, On error preserving encryption algorithms for wireless video transmission, in: ACM Multimedia 2001, Ottawa, Canada, October 2001, pp. 302-307.
    • Ali Saman Tosun, Wu Chi Feng, On error preserving encryption algorithms for wireless video transmission, in: ACM Multimedia 2001, Ottawa, Canada, October 2001, pp. 302-307.
  • 26
    • 0035791314 scopus 로고    scopus 로고
    • J. Wen, M. Severa, W. Zeng, M. Luttrell, W. Jin, A format-compliant configurable encryption framework for access control of multimedia, in: Proceedings of the IEEE Workshop on Multimedia Signal Processing, MMSP '01, Cannes, France, October 2001, pp. 435-440.
    • J. Wen, M. Severa, W. Zeng, M. Luttrell, W. Jin, A format-compliant configurable encryption framework for access control of multimedia, in: Proceedings of the IEEE Workshop on Multimedia Signal Processing, MMSP '01, Cannes, France, October 2001, pp. 435-440.
  • 27
    • 85031192149 scopus 로고    scopus 로고
    • C.J. Skrepth, A. Uhl, Selective encryption of visual data: classification of application scenarios and comparison of techniques for lossless environments, in: B. Jerman-Blazic, T. Klobucar (Eds.), Advanced Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS '02, Portoroz, Slovenia, September 2002, Kluwer Academic Publishing, Dordrecht, 2002, pp. 213-226.
    • C.J. Skrepth, A. Uhl, Selective encryption of visual data: classification of application scenarios and comparison of techniques for lossless environments, in: B. Jerman-Blazic, T. Klobucar (Eds.), Advanced Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS '02, Portoroz, Slovenia, September 2002, Kluwer Academic Publishing, Dordrecht, 2002, pp. 213-226.
  • 28
    • 0030127507 scopus 로고    scopus 로고
    • A review of wavelets in biomedical applications
    • Unser M., Aldroubi A. A review of wavelets in biomedical applications. Proc. IEEE. 84(4):1996;626-638.
    • (1996) Proc. IEEE , vol.84 , Issue.4 , pp. 626-638
    • Unser, M.1    Aldroubi, A.2
  • 29
    • 85031183942 scopus 로고    scopus 로고
    • A. Aldroubi, M. Unser (Eds.), Wavelets in Medicine and Biology, CRC, Boca Raton, FL, USA, 1996.
    • A. Aldroubi, M. Unser (Eds.), Wavelets in Medicine and Biology, CRC, Boca Raton, FL, USA, 1996.
  • 30
    • 85031180378 scopus 로고    scopus 로고
    • P.N. Topiwala (Ed.), Wavelet Image and Video Compression, Kluwer Academic Publishers Group, Boston, 1998.
    • P.N. Topiwala (Ed.), Wavelet Image and Video Compression, Kluwer Academic Publishers Group, Boston, 1998.
  • 33
    • 0034229499 scopus 로고    scopus 로고
    • High performance scalable image compression with EBCOT
    • note
    • Taubman D. High performance scalable image compression with EBCOT. IEEE Trans. Image Process. 9(7):2000;1158-1170 Roland Norcen and Andreas Pommer received their B.S. and M.S. (Computer Science) degrees from the Salzburg University where they are currently enrolled in a Ph.D. program. The submitted work is related to the topics of their respective Ph.D. theses. Martina Podesser and Hans-Peter Schmidt are both graduate students at the Telecommunication & Network Engineering School at Carinthia Tech Institute in Klagenfurt. Their contribution to this work has been done in the context of the system security lab which is part of the curriculum on communication networks. Andreas Uhl received the B.S. and M.S. degrees (both in Mathematics) from Salzburg University and he completed his Ph.D. on Applied Mathematics at the same University. He is currently associate professor with tenure in computer science affiliated with the Department of Scientific Computing and with the Research Institute for Software Technology. He is also part-time lecturer at the Carinthia Tech Institute. His research interests include multimedia signal processing (with emphasis on compression and security issues), parallel and distributed processing, and numbertheoretical methods in numerics.
    • (2000) IEEE Trans. Image Process. , vol.9 , Issue.7 , pp. 1158-1170
    • Taubman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.