{"id":"https://openalex.org/W3212060903","doi":"https://doi.org/10.1145/3426020.3426027","title":"Region-based Selective Compression and Selective Encryption of Medical Images","display_name":"Region-based Selective Compression and Selective Encryption of Medical Images","publication_year":2020,"publication_date":"2020-09-17","ids":{"openalex":"https://openalex.org/W3212060903","doi":"https://doi.org/10.1145/3426020.3426027","mag":"3212060903"},"language":"en","primary_location":{"id":"doi:10.1145/3426020.3426027","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3426020.3426027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 9th International Conference on Smart Media and Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077748142","display_name":"Ijaz Ahmad","orcid":"https://orcid.org/0000-0002-6022-7413"},"institutions":[{"id":"https://openalex.org/I152238500","display_name":"Chosun University","ror":"https://ror.org/01zt9a375","country_code":"KR","type":"education","lineage":["https://openalex.org/I152238500"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Ijaz Ahmad","raw_affiliation_strings":["Chosun University, S. Korea"],"affiliations":[{"raw_affiliation_string":"Chosun University, S. Korea","institution_ids":["https://openalex.org/I152238500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009170109","display_name":"Seokjoo Shin","orcid":"https://orcid.org/0000-0003-2092-1336"},"institutions":[{"id":"https://openalex.org/I152238500","display_name":"Chosun University","ror":"https://ror.org/01zt9a375","country_code":"KR","type":"education","lineage":["https://openalex.org/I152238500"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seokjoo Shin","raw_affiliation_strings":["Chosun University, S. Korea"],"affiliations":[{"raw_affiliation_string":"Chosun University, S. Korea","institution_ids":["https://openalex.org/I152238500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077748142"],"corresponding_institution_ids":["https://openalex.org/I152238500"],"apc_list":null,"apc_paid":null,"fwci":0.2931,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.5929791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"34","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8103777170181274},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.777023196220398},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.7560523152351379},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7431370615959167},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.5652574896812439},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.5638761520385742},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5575251579284668},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4788950979709625},{"id":"https://openalex.org/keywords/region-of-interest","display_name":"Region of interest","score":0.43790754675865173},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.32929906249046326},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.3048056364059448},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1187857985496521}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8103777170181274},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.777023196220398},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.7560523152351379},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7431370615959167},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.5652574896812439},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.5638761520385742},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5575251579284668},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4788950979709625},{"id":"https://openalex.org/C19609008","wikidata":"https://www.wikidata.org/wiki/Q2138203","display_name":"Region of interest","level":2,"score":0.43790754675865173},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.32929906249046326},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3048056364059448},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1187857985496521}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3426020.3426027","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3426020.3426027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 9th International Conference on Smart Media and Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W157820893","https://openalex.org/W1990979552","https://openalex.org/W2006363247","https://openalex.org/W2135124515","https://openalex.org/W2766934651","https://openalex.org/W2782885162","https://openalex.org/W2804876790","https://openalex.org/W3014301453","https://openalex.org/W4250059488"],"related_works":["https://openalex.org/W3210332869","https://openalex.org/W2385628723","https://openalex.org/W2547124190","https://openalex.org/W4327499886","https://openalex.org/W4294006383","https://openalex.org/W3180760233","https://openalex.org/W2096442341","https://openalex.org/W4313046148","https://openalex.org/W4210455546","https://openalex.org/W3080614128"],"abstract_inverted_index":{"Image":[0],"compression":[1,35,47,119],"and":[2,36,48,70,86,110,164],"encryption":[3,38,49],"are":[4],"two":[5],"processes":[6],"that":[7,102],"enable":[8],"telemedicine":[9],"application":[10],"of":[11,22,39,50,53,62,92,96,144,154,167,170],"eHealth":[12],"services.":[13],"However,":[14],"performing":[15],"these":[16],"operations":[17],"on":[18,45],"the":[19,51,63,83,89,103,107,118,123,131,135,146],"whole":[20],"content":[21],"an":[23],"image":[24,64,84,148,171],"is":[25,43,65,71,111,126],"computationally":[26],"expensive.":[27],"This":[28],"work":[29],"proposes":[30],"a":[31,141,150],"method":[32,105,125,159],"for":[33,137],"selective":[34,37],"medical":[40,57,97],"images.":[41,58,98],"It":[42],"based":[44],"lossless":[46],"region":[52],"interest":[54],"(ROI)":[55],"in":[56,67,78,134,173],"The":[59,157],"non-ROI":[60],"part":[61],"compressed":[66],"lossy":[68],"mode":[69],"stored":[72],"or":[73],"transmitted":[74],"as":[75],"plain":[76],"data,":[77],"order":[79],"to":[80,87],"further":[81],"reduce":[82],"size":[85],"avoid":[88],"computational":[90,162],"cost":[91],"encrypting":[93],"huge":[94,168],"volumes":[95],"Our":[99],"analysis":[100],"shows":[101],"proposed":[104,124,158],"provides":[106],"necessary":[108],"security":[109],"secured":[112],"against":[113],"various":[114],"attacks.":[115],"In":[116],"addition,":[117],"savings":[120],"achieved":[121],"by":[122],"about":[127],"28%":[128],"while":[129],"preserving":[130],"crucial":[132],"information":[133],"ROI":[136],"correct":[138],"diagnosis.":[139],"For":[140],"quality":[142],"factor":[143],"80%,":[145],"reconstructed":[147],"has":[149],"peak":[151],"signal-to-noise":[152],"ratio":[153],"42.5":[155],"dB.":[156],"requires":[160],"less":[161],"resources":[163],"enables":[165],"processing":[166],"volume":[169],"data":[172],"low":[174],"power":[175],"network.":[176]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
