{"id":"https://openalex.org/W1921962718","doi":"https://doi.org/10.1109/isspit.2014.7300583","title":"Performance evaluation of frequnecy domain techniques for efficient storage of patient information with medical images","display_name":"Performance evaluation of frequnecy domain techniques for efficient storage of patient information with medical images","publication_year":2014,"publication_date":"2014-12-01","ids":{"openalex":"https://openalex.org/W1921962718","doi":"https://doi.org/10.1109/isspit.2014.7300583","mag":"1921962718"},"language":"en","primary_location":{"id":"doi:10.1109/isspit.2014.7300583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isspit.2014.7300583","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016037462","display_name":"Mousami Turuk","orcid":"https://orcid.org/0000-0002-0103-9789"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. P. Turuk","raw_affiliation_strings":["Pune Institute of Computer Technology, Pune, India","Pune Institute of Computer Technology, Pune-Satara Road, 411 043, India"],"affiliations":[{"raw_affiliation_string":"Pune Institute of Computer Technology, Pune, India","institution_ids":[]},{"raw_affiliation_string":"Pune Institute of Computer Technology, Pune-Satara Road, 411 043, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043766609","display_name":"A. P. Dhande","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. P. Dhande","raw_affiliation_strings":["Pune Institute of Computer Technology, Pune, India","Pune Institute of Computer Technology, Pune-Satara Road, 411 043, India"],"affiliations":[{"raw_affiliation_string":"Pune Institute of Computer Technology, Pune, India","institution_ids":[]},{"raw_affiliation_string":"Pune Institute of Computer Technology, Pune-Satara Road, 411 043, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014985432","display_name":"P. P. Kalgaonkar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"P. P. Kalgaonkar","raw_affiliation_strings":["Pune Institute of Computer Technology, Pune, India","Pune Institute of Computer Technology, Pune-Satara Road, 411 043, India"],"affiliations":[{"raw_affiliation_string":"Pune Institute of Computer Technology, Pune, India","institution_ids":[]},{"raw_affiliation_string":"Pune Institute of Computer Technology, Pune-Satara Road, 411 043, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016037462"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2439,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.54775532,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"5","issue":null,"first_page":"000173","last_page":"000178"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.7480162978172302},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7009190320968628},{"id":"https://openalex.org/keywords/interleaving","display_name":"Interleaving","score":0.679265558719635},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6444656848907471},{"id":"https://openalex.org/keywords/peak-signal-to-noise-ratio","display_name":"Peak signal-to-noise ratio","score":0.539067804813385},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5192963480949402},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5033726096153259},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45934897661209106},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4589596092700958},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2977103590965271},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09107604622840881}],"concepts":[{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.7480162978172302},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7009190320968628},{"id":"https://openalex.org/C28034677","wikidata":"https://www.wikidata.org/wiki/Q17092530","display_name":"Interleaving","level":2,"score":0.679265558719635},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6444656848907471},{"id":"https://openalex.org/C154579607","wikidata":"https://www.wikidata.org/wiki/Q3373850","display_name":"Peak signal-to-noise ratio","level":3,"score":0.539067804813385},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5192963480949402},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5033726096153259},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45934897661209106},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4589596092700958},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2977103590965271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09107604622840881},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isspit.2014.7300583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isspit.2014.7300583","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1605603784","https://openalex.org/W1998075962","https://openalex.org/W2050427006","https://openalex.org/W2097805648","https://openalex.org/W2113559173","https://openalex.org/W2121594495","https://openalex.org/W2157336204","https://openalex.org/W2340558563","https://openalex.org/W2798711040","https://openalex.org/W4234327355"],"related_works":["https://openalex.org/W2373405822","https://openalex.org/W1512373895","https://openalex.org/W2359773540","https://openalex.org/W1669086842","https://openalex.org/W4294068482","https://openalex.org/W4327926797","https://openalex.org/W2795318091","https://openalex.org/W2141372244","https://openalex.org/W2062005526","https://openalex.org/W2429650965"],"abstract_inverted_index":{"In":[0],"an":[1,61],"e-Health":[2],"environment":[3],"medical":[4,13,16,27,81,160],"image":[5,14,28,41,161],"protection":[6],"and":[7,15,37,76,88,99,117,128,149],"authentication":[8],"are":[9,18,102,122,166],"extremely":[10],"important":[11,54],"as":[12,178],"data":[17,35,45,51,98],"distributed":[19],"over":[20],"electronic":[21],"network.":[22],"Research":[23],"has":[24,42],"shown":[25],"that":[26,170],"watermarking":[29],"is":[30,53,139,176],"relevant":[31],"process":[32],"for":[33,124],"enhancing":[34],"security":[36],"content":[38],"authentication.":[39],"Medical":[40],"most":[43],"sensitive":[44],"hence":[46],"while":[47],"adding":[48],"the":[49,57,73,95,107,134,171],"external":[50],"it":[52,179],"to":[55,145],"preserve":[56],"perceptual":[58],"integrity":[59],"of":[60,68,133,136],"image.":[62],"This":[63],"Paper":[64],"presents":[65],"comparative":[66],"analysis":[67],"interleaving":[69,105,174],"patient":[70],"information":[71],"in":[72,80,106],"form":[74],"text":[75,97],"electrocardiograph":[77],"(ECG)":[78],"signal":[79,101,126,144],"images,":[82],"using":[83,142],"Discrete":[84,89],"Fourier":[85],"Transform":[86,91],"(DFT)":[87],"Cosine":[90],"(DCT).":[92],"To":[93],"provide":[94],"security,":[96],"ECG":[100,125],"encrypted":[103],"before":[104],"frequency":[108],"domain.":[109],"Predicative":[110],"coding":[111],"techniques":[112],"like":[113],"adaptive":[114],"delta":[115],"modulation":[116,121],"differential":[118],"pulse":[119],"code":[120],"used":[123],"encryption":[127],"compression.":[129],"The":[130,155],"quantitative":[131],"assessment":[132],"quality":[135],"watermarked":[137],"images":[138],"carried":[140],"out":[141],"peak":[143],"noise":[146],"ratio":[147],"(PSNR)":[148],"normalized":[150],"mean":[151],"square":[152],"error":[153],"(NRMSE).":[154],"experimental":[156],"results":[157],"on":[158],"different":[159],"modalities":[162],"(MRI,":[163],"MRA,":[164],"CT)":[165],"tabulated,":[167],"which":[168],"shows":[169],"DFT":[172],"based":[173],"algorithm":[175],"efficient":[177],"preserves":[180],"imperceptibility":[181],"better":[182],"than":[183],"DCT.":[184]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
