Шифрування цифрових медичних зображень у програмах реального часу
Patient information and medical imaging data are now subject to stringent data security and confidentiality standards due to the proliferation of telemedicine techniques and medical imaging instruments. Because of the problems described above, as well as the possibility of data or information being...
Збережено в:
Дата: | 2024 |
---|---|
Автори: | , , |
Формат: | Стаття |
Мова: | English |
Опубліковано: |
The National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"
2024
|
Теми: | |
Онлайн доступ: | http://journal.iasa.kpi.ua/article/view/281461 |
Теги: |
Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
|
Назва журналу: | System research and information technologies |
Репозитарії
System research and information technologiesРезюме: | Patient information and medical imaging data are now subject to stringent data security and confidentiality standards due to the proliferation of telemedicine techniques and medical imaging instruments. Because of the problems described above, as well as the possibility of data or information being stolen, this brings up the dilemma of transmitting data on medical images via an open network. In the past, potential solutions included the utilization of methods such as information concealment and image encryption. Nevertheless, attempting to reconstruct the original image utilizing these approaches may result in complications. In the process of this paper, an algorithm for safeguarding medical images based on the pixels of interest was established. Detection of image histogram peaks for the purpose of calculating peaks in medical images pixels of interest in medical image that have had their threshold values processed. The threshold is shown by taking the average of all the peaks in the histogram. After that, a Sudoku matrix is used to assign values of interest to each of these pixels. The proposed method will be assessed by a variety of statistical procedures, and the outcomes of these analyses will be compared to previously established standards. According to the findings, the suggested method has superior security performance compared to other image encryption methods already in use. |
---|