This work proposes a novel secret sharing scheme to enhance the security of Laryngeal Spinocellular Carcinoma or Laryngeal Squamous Cell Carcinoma (LSCC) images using the Discrete Cosine Transformation (DCT) as a cryptographic tool. The DCT-based secret sharing method divides LSCC images into shares, each containing DCT coefficients that represent the image's frequency components. The original image can only be reconstructed when a predefined number of shares are combined, ensuring confidentiality and preventing unauthorized access. The proposed scheme demonstrates robustness against noise and data loss during transmission, preserving image quality and data integrity. The performance of the proposed scheme concerning the quality of the recovered image and the strength of security preservation is demonstrated through PSNR improvement analysis, correlation analysis, and histogram analysis. The efficiency of DCT-based secret sharing enables application in medical settings, facilitating accurate diagnosis and treatment planning for LSCC patients while safeguarding patient privacy.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10908759 | PMC |
http://dx.doi.org/10.1007/s12070-023-04255-6 | DOI Listing |
Entropy (Basel)
January 2025
Division of Information Science and Engineering, KTH Royal Institute of Technology, 100-44 Stockholm, Sweden.
A private compression design problem is studied, where an encoder observes useful data , wishes to compress them using variable-length code, and communicates them through an unsecured channel. Since are correlated with the private attribute , the encoder uses a private compression mechanism to design an encoded message C and sends it over the channel. An adversary is assumed to have access to the output of the encoder, i.
View Article and Find Full Text PDFDes Codes Cryptogr
October 2024
Department of Computeralgebra, Eötvös Loránd University, Budapest, Hungary.
Secret sharing is a general method for distributing sensitive data among the participants of a system such that only a collection of predefined qualified coalitions can recover the secret data. One of the most widely used special cases is threshold secret sharing, where every subset of participants of size above a given number is qualified. In this short note, we propose a general construction for a generalized threshold scheme, called conjunctive hierarchical secret sharing, where the participants are divided into disjoint levels of hierarchy, and there are different thresholds for all levels, all of which must be satisfied by qualified sets.
View Article and Find Full Text PDFNanophotonics
February 2025
State Key Laboratory of Precision Spectroscopy, School of Physics and Electronic Science, East China Normal University, Shanghai 200241, China.
Optical encryption offers a powerful platform for secure information transfer, combining low power consumption, high-speed transmission, and intuitive visualization. Metasurfaces, with their unprecedented ability to manipulate light across multiple degrees of freedom within quasi-two-dimensional nanostructures, are emerging as promising devices for advanced encryption. However, encryption capacity remains constrained by limited information channels.
View Article and Find Full Text PDFBackground: In the ESCAPE-NA1 trial, treatment with nerinetide, an eicosapeptide that interferes with post-synaptic density protein 95, was associated with improved functional outcome among patients with acute ischaemic stroke due to large vessel occlusion undergoing endovascular thrombectomy without co-treatment with an intravenous thrombolytic agent. There was no benefit when intravenous thrombolytic agent co-treatment was used. We sought to confirm the clinical benefit of nerinetide in the absence of previous intravenous thrombolytic drug treatment.
View Article and Find Full Text PDFPhys Rev Lett
January 2025
Nanjing University, National Laboratory of Solid-state Microstructures, School of Physics, College of Engineering and Applied Sciences, Collaborative Innovation Center of Advanced Microstructures, Jiangsu Physical Science Research Center, Nanjing 210093,China.
Quantum cryptographic conferencing (QCC) allows sharing secret keys among multiple distant users and plays a crucial role in quantum networks. Because of the fragility and low generation rate of genuine multipartite entangled states required in QCC, realizing and extending QCC with the entanglement-based protocol is challenging. Measurement-device-independent (MDI) QCC, which removes all detector side channels, is a feasible long-distance quantum communication scheme to practically generate multipartite correlation with multiphoton projection measurement.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!