scispace - formally typeset
Journal ArticleDOI

A data-hiding technique with authentication, integration, and confidentiality for electronic patient records

TLDR
A data-hiding technique capable of hiding EPR related data such as diagnostic reports, electrocardiogram, and digital signatures from doctors or a hospital into a mark image and allows all of the hidden data to be separated and restored perfectly by authorized users.
Abstract
A data-hiding technique called the "bipolar multiple-number base" was developed to provide capabilities of authentication, integration, and confidentiality for an electronic patient record (EPR) transmitted among hospitals through the Internet. The proposed technique is capable of hiding those EPR related data such as diagnostic reports, electrocardiogram, and digital signatures from doctors or a hospital into a mark image. The mark image could be the mark of a hospital used to identify the origin of an EPR. Those digital signatures from doctors and a hospital could be applied for the EPR authentication. Thus, different types of medical data can be integrated into the same mark image. The confidentiality is ultimately achieved by decrypting the EPR related data and digital signatures with an exact copy of the original mark image. The experimental results validate the integrity and the invisibility of the hidden EPR related data. This newly developed technique allows all of the hidden data to be separated and restored perfectly by authorized users.

read more

Citations
More filters
Journal ArticleDOI

Information security and privacy in healthcare: current state of research

TL;DR: A holistic view of the recent research on information security and privacy in healthcare is provided and new areas of interest are suggested to the information systems community.
Journal ArticleDOI

Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting

TL;DR: A new reversible watermarking scheme that can insert more data with lower distortion than any existing schemes and achieve a peak signal-to-noise ratio (PSNR) of about 1-2 dB greater than with the scheme of Hwang, the most efficient approach actually.
Journal ArticleDOI

Multiple Image Watermarking Applied to Health Information Management

TL;DR: Experimental results indicate the efficiency and transparency of the scheme, which conforms to the strict requirements that apply to regions of diagnostic significance.
Proceedings ArticleDOI

A Review of Image Watermarking Applications in Healthcare

TL;DR: It is concluded that watermarking has found a niche role in healthcare systems, as an instrument for protection of medical information, for secure sharing and handling of medical images.
Journal ArticleDOI

A watermarking-based image ownership and tampering authentication scheme

TL;DR: An image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and detect malicious manipulation over embedded images is proposed.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Journal ArticleDOI

Image-adaptive watermarking using visual models

TL;DR: This work proposes perceptually based watermarking schemes in two frameworks: the block-based discrete cosine transform and multiresolution wavelet framework and discusses the merits of each one, which are shown to provide very good results both in terms of image transparency and robustness.
Book

Principles of communication systems

TL;DR: This edition features improved treatment of signal analysis, including representations in signal space, as well as a more complete and modern presentation of random variables and random processes.
Journal ArticleDOI

Copyright protection for electronic publishing over computer networks

TL;DR: The authors explore the use of cryptographic protocols to discourage the distribution of illicit electronic copies, and propose an architecture and two separate strategies for making electronic document distribution secure.
Related Papers (5)