Comparison analysis of local angular interpolation methods in diffusion MRI

Author(s):  
Ines Ben Alaya ◽  
Majdi Jribi ◽  
Faouzi Ghorbel ◽  
Tarek Kraiem
2013 ◽  
Vol 44 (S 01) ◽  
Author(s):  
M Wilke ◽  
S Groeschel ◽  
M Schuhmann ◽  
S Rona ◽  
M Alber ◽  
...  
Keyword(s):  

2021 ◽  
Vol 26 (3) ◽  
pp. 05020053
Author(s):  
Jingwei Hou ◽  
Meiyan Zheng ◽  
Moyan Zhu ◽  
Yanjuan Wang

2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


Sign in / Sign up

Export Citation Format

Share Document