Resume

Methods of Medical Data Image Security Base on Principals
Ing. Aleš Roček

This article deals with methods and their properties, which are necessary to be considered during planning and deployment of medical data protection by watermarking. It describes the reasons for deployment, technological background, watermarking methods, requirements for watermarks, the types of attacks, problems with medical images watermarking, different approaches in the use of images and the three most common medical image watermarking methods. The article gives a comprehensive overview and shows the reasons and consequences of particular security method usage.
Key words: watermarking, DICOM, security, medical data, RONI.


Back