Skip to main content
. 2014 Sep 30;28(2):179–187. doi: 10.1007/s10278-014-9734-8

Table 3.

Comparing achievements of confidentiality, authentication, and integrity

Algorithm Confidentiality (header) Confidentiality (pixels) Authenticity (header) Authenticity (pixels) Integrity (header) Integrity (pixels)
DICOM standard
Kobayashi [18]
Proposed algorithm