Journal ArticleDOI
A data-hiding technique with authentication, integration, and confidentiality for electronic patient records
Hui-Mei Chao,Chin-Ming Hsu,Shaou-Gang Miaou +2 more
- Vol. 6, Iss: 1, pp 46-53
TLDR
A data-hiding technique capable of hiding EPR related data such as diagnostic reports, electrocardiogram, and digital signatures from doctors or a hospital into a mark image and allows all of the hidden data to be separated and restored perfectly by authorized users.Abstract:
A data-hiding technique called the "bipolar multiple-number base" was developed to provide capabilities of authentication, integration, and confidentiality for an electronic patient record (EPR) transmitted among hospitals through the Internet. The proposed technique is capable of hiding those EPR related data such as diagnostic reports, electrocardiogram, and digital signatures from doctors or a hospital into a mark image. The mark image could be the mark of a hospital used to identify the origin of an EPR. Those digital signatures from doctors and a hospital could be applied for the EPR authentication. Thus, different types of medical data can be integrated into the same mark image. The confidentiality is ultimately achieved by decrypting the EPR related data and digital signatures with an exact copy of the original mark image. The experimental results validate the integrity and the invisibility of the hidden EPR related data. This newly developed technique allows all of the hidden data to be separated and restored perfectly by authorized users.read more
Citations
More filters
Journal ArticleDOI
Information security and privacy in healthcare: current state of research
Ajit Appari,M. Eric Johnson +1 more
TL;DR: A holistic view of the recent research on information security and privacy in healthcare is provided and new areas of interest are suggested to the information systems community.
Journal ArticleDOI
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting
TL;DR: A new reversible watermarking scheme that can insert more data with lower distortion than any existing schemes and achieve a peak signal-to-noise ratio (PSNR) of about 1-2 dB greater than with the scheme of Hwang, the most efficient approach actually.
Journal ArticleDOI
Multiple Image Watermarking Applied to Health Information Management
TL;DR: Experimental results indicate the efficiency and transparency of the scheme, which conforms to the strict requirements that apply to regions of diagnostic significance.
Proceedings ArticleDOI
A Review of Image Watermarking Applications in Healthcare
TL;DR: It is concluded that watermarking has found a niche role in healthcare systems, as an instrument for protection of medical information, for secure sharing and handling of medical images.
Journal ArticleDOI
A watermarking-based image ownership and tampering authentication scheme
TL;DR: An image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and detect malicious manipulation over embedded images is proposed.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Book
Cryptography and Network Security: Principles and Practice
TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Journal ArticleDOI
Image-adaptive watermarking using visual models
C.I. Podilchuk,Wenjun Zeng +1 more
TL;DR: This work proposes perceptually based watermarking schemes in two frameworks: the block-based discrete cosine transform and multiresolution wavelet framework and discusses the merits of each one, which are shown to provide very good results both in terms of image transparency and robustness.
Book
Principles of communication systems
Herbert Taub,Donald L. Schilling +1 more
TL;DR: This edition features improved treatment of signal analysis, including representations in signal space, as well as a more complete and modern presentation of random variables and random processes.
Journal ArticleDOI
Copyright protection for electronic publishing over computer networks
TL;DR: The authors explore the use of cryptographic protocols to discourage the distribution of illicit electronic copies, and propose an architecture and two separate strategies for making electronic document distribution secure.