Enhancing Laryngeal Spinocellular Carcinoma Image Security with DCT.

Indian J Otolaryngol Head Neck Surg

Department of Computer Science and Engineering Manipal Institute of Technology, Manipal Academy of Higher Education (MAHE), Manipal, Karnataka 576104 India.

Published: February 2024

This work proposes a novel secret sharing scheme to enhance the security of Laryngeal Spinocellular Carcinoma or Laryngeal Squamous Cell Carcinoma (LSCC) images using the Discrete Cosine Transformation (DCT) as a cryptographic tool. The DCT-based secret sharing method divides LSCC images into shares, each containing DCT coefficients that represent the image's frequency components. The original image can only be reconstructed when a predefined number of shares are combined, ensuring confidentiality and preventing unauthorized access. The proposed scheme demonstrates robustness against noise and data loss during transmission, preserving image quality and data integrity. The performance of the proposed scheme concerning the quality of the recovered image and the strength of security preservation is demonstrated through PSNR improvement analysis, correlation analysis, and histogram analysis. The efficiency of DCT-based secret sharing enables application in medical settings, facilitating accurate diagnosis and treatment planning for LSCC patients while safeguarding patient privacy.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10908759PMC
http://dx.doi.org/10.1007/s12070-023-04255-6DOI Listing

Publication Analysis

Top Keywords

secret sharing
12
laryngeal spinocellular
8
spinocellular carcinoma
8
lscc images
8
dct-based secret
8
proposed scheme
8
enhancing laryngeal
4
image
4
carcinoma image
4
image security
4

Similar Publications

Variable-Length Coding with Zero and Non-Zero Privacy Leakage.

Entropy (Basel)

January 2025

Division of Information Science and Engineering, KTH Royal Institute of Technology, 100-44 Stockholm, Sweden.

A private compression design problem is studied, where an encoder observes useful data , wishes to compress them using variable-length code, and communicates them through an unsecured channel. Since are correlated with the private attribute , the encoder uses a private compression mechanism to design an encoded message C and sends it over the channel. An adversary is assumed to have access to the output of the encoder, i.

View Article and Find Full Text PDF

Secret sharing is a general method for distributing sensitive data among the participants of a system such that only a collection of predefined qualified coalitions can recover the secret data. One of the most widely used special cases is threshold secret sharing, where every subset of participants of size above a given number is qualified. In this short note, we propose a general construction for a generalized threshold scheme, called conjunctive hierarchical secret sharing, where the participants are divided into disjoint levels of hierarchy, and there are different thresholds for all levels, all of which must be satisfied by qualified sets.

View Article and Find Full Text PDF

Enhanced optical encryption via polarization-dependent multi-channel metasurfaces.

Nanophotonics

February 2025

State Key Laboratory of Precision Spectroscopy, School of Physics and Electronic Science, East China Normal University, Shanghai 200241, China.

Optical encryption offers a powerful platform for secure information transfer, combining low power consumption, high-speed transmission, and intuitive visualization. Metasurfaces, with their unprecedented ability to manipulate light across multiple degrees of freedom within quasi-two-dimensional nanostructures, are emerging as promising devices for advanced encryption. However, encryption capacity remains constrained by limited information channels.

View Article and Find Full Text PDF

Background: In the ESCAPE-NA1 trial, treatment with nerinetide, an eicosapeptide that interferes with post-synaptic density protein 95, was associated with improved functional outcome among patients with acute ischaemic stroke due to large vessel occlusion undergoing endovascular thrombectomy without co-treatment with an intravenous thrombolytic agent. There was no benefit when intravenous thrombolytic agent co-treatment was used. We sought to confirm the clinical benefit of nerinetide in the absence of previous intravenous thrombolytic drug treatment.

View Article and Find Full Text PDF

Experimental Measurement-Device-Independent Quantum Cryptographic Conferencing.

Phys Rev Lett

January 2025

Nanjing University, National Laboratory of Solid-state Microstructures, School of Physics, College of Engineering and Applied Sciences, Collaborative Innovation Center of Advanced Microstructures, Jiangsu Physical Science Research Center, Nanjing 210093,China.

Quantum cryptographic conferencing (QCC) allows sharing secret keys among multiple distant users and plays a crucial role in quantum networks. Because of the fragility and low generation rate of genuine multipartite entangled states required in QCC, realizing and extending QCC with the entanglement-based protocol is challenging. Measurement-device-independent (MDI) QCC, which removes all detector side channels, is a feasible long-distance quantum communication scheme to practically generate multipartite correlation with multiphoton projection measurement.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!