Security Model to Ensure Copyright of Medical Information Using Digital Watermarks

被引:0
|
作者
Okawa, Akiko [1 ]
Umeda, Tokuo [2 ]
Gomi, Tsutomu [2 ]
Asaba, Kaori [1 ]
Takahata, Masako [3 ]
机构
[1] Nagoya Univ, Grad Sch Med, Nagoya, Aichi, Japan
[2] Kitasato Univ, Sch AHS, Grad Sch Med Sci, Tokyo, Japan
[3] Chukyogakuin Univ, Fac Nursing, Nakatsugawa, Japan
关键词
Medical Information; Hiding Technology; Digital Watermark; Steganography;
D O I
10.3233/978-1-61499-423-7-312
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
引用
收藏
页码:312 / 312
页数:1
相关论文
共 50 条
  • [41] Digital watermarking of medical image using ROI information
    Lee, HK
    Kim, HJ
    Kwon, KR
    Lee, JK
    HEALTHCOM 2005: 7TH INTERNATIONAL WORKSHOP ON ENTERPRISE NETWORKING AND COMPUTING IN HEALTHCARE INDUSTRY, PROCEEDINGS, 2005, : 404 - 407
  • [42] Optical security features by using information carrier digital screening
    Koltai, F
    Trade, J
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES IV, 2002, 4677 : 138 - 144
  • [43] ART, INFORMATION AND COPYRIGHT LAWS IN THE AGE OF DIGITAL REPRODUCTION
    Gatenby, Bruce
    INTED2012: INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2012, : 2303 - 2305
  • [44] Documentary, digital and security information
    Voutssas M, Juan
    INVESTIGACION BIBLIOTECOLOGICA, 2010, 24 (50): : 127 - 155
  • [45] DIGITAL CITIZEN AND INFORMATION SECURITY
    Rzayeva, G. A.
    Ibrahimova, A. N.
    PROCEEDINGS OF THE7TH INTERNATIONAL CONFERENCE ON CONTROL AND OPTIMIZATION WITH INDUSTRIAL APPLICATIONS, VOL II, 2020, : 326 - 328
  • [46] Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy
    Yang, Ming
    Trifas, Monica
    Francia, Guillermo, III
    Chen, Lei
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (03) : 37 - 54
  • [47] A New Framework for Cloud Storage Confidentiality to Ensure Information Security
    Singh, Deepak
    Verma, Harsh K.
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [48] IMPORTANCE OF EVENT LOG MANAGEMENT TO ENSURE INFORMATION SYSTEM SECURITY
    Stanciu, Nicoleta
    METALURGIA INTERNATIONAL, 2013, 18 (02): : 144 - 149
  • [49] On the Assessment of Compliance with the Requirements of Regulatory Documents to Ensure Information Security
    Miloslavskaya, Natalia
    Tolstaya, Svetlana
    TRENDS AND INNOVATIONS IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2020, 1160 : 789 - 795
  • [50] Regulatory Compliance to Ensure Information Security: Financial Supervision Perspective
    Kull, Andro
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 298 - 306