Journal ArticleDOI
Compression-Then-Encryption-Based Secure Watermarking Technique for Smart Healthcare System
TLDR
A compression-then-encryption-based dual watermarking to protect the EPR data for the healthcare system, which produces several significant features and offers better performance in terms of robustness and security.Abstract:
The smart healthcare system is an electronic patient records (EPR) sharing system, which significantly helps sharing of EPR data and provides appropriate medical assistance for the patients and a more suitable platform for the potential researchers. However, the security of EPR data is still a major issue in such systems. In this paper, we develop a compression-then-encryption-based dual watermarking to protect the EPR data for the healthcare system, which produces several significant features. Experiments conducted on a large set of medical data indicate the capability of our proposed method for smart healthcare. Finally, when compared with the existing technique, the proposed work offers better performance in terms of robustness and security.read more
Citations
More filters
Journal ArticleDOI
A Robust Medical Image Watermarking Scheme Based on Nature-Inspired Optimization for Telemedicine Applications
Vijay Krishna Pallaw,Kamred Udham Singh,Ankit Kumar,Tikam Singh,Chetan Swarup,Anjali Goswami +5 more
TL;DR: In this article , a hybrid watermarking scheme using the Slantlet transform, randomized-singular value decomposition, and optimization techniques inspired by nature (Firefly algorithm) was proposed.
Journal ArticleDOI
Introduction to the Special Section on Security and Privacy of Medical Data for Smart Healthcare
Journal ArticleDOI
WatMIF: Multimodal Medical Image Fusion-Based Watermarking for Telehealth Applications
TL;DR: Wang et al. as mentioned in this paper proposed a secure watermarking algorithm, termed WatMIF, based on multimodal medical image fusion, which consists of three major parts: the encryption of the host media, the fusion of multi-modal medical images, and the embedding and extraction of the fused mark.
Journal ArticleDOI
Practical Application of Internet of Things in the Creation of Intelligent Services and Environments
TL;DR: Taking the practical application of IoT as the theme, this work explores the application of intelligent power, intelligent building, intelligent industry, intelligent transportation, intelligent agriculture, and intelligent logistics in today’s high-speed 5G communication technology.
Journal ArticleDOI
Secure Medical Data Model Using Integrated Transformed Paillier and KLEIN Algorithm Encryption Technique with Elephant Herd Optimization for Healthcare Applications
TL;DR: This work adds new features for ensuring storage and access safety through ITPKLEIN-EHO (integrated transformed Paillier and KLEIN algorithms) that use EHOs (elephant herd optimizations) to provide lightweight features.
References
More filters
Journal ArticleDOI
On the Security of Permutation-Only Image Encryption Schemes
TL;DR: It is proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosenplaintext attack, which significantly outperforms the state-of-theart cryptanalytic methods.
Journal ArticleDOI
An improved DWT-SVD domain watermarking for medical information security
Ashima Anand,Amit Singh +1 more
TL;DR: Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.
Journal ArticleDOI
Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network
TL;DR: The proposed robust and secure DWT, DCT and SVD based multiple watermarking techniques for protecting digital contents over unsecure social networks may find potential solutions in prevention of personal identity theft and unauthorized multimedia content sharing on online social networks/open channel.
Journal ArticleDOI
Watermarking techniques for medical data authentication: a survey
Ashima Anand,Amit Singh +1 more
TL;DR: General concepts of watermarking, major characteristics, recent applications, concepts of embedding and recovery process of watermarks, and the summary of various techniques are highlighted in brief.
Journal ArticleDOI
Chaotic based secure watermarking approach for medical images
TL;DR: Experimental evaluation shows that using combination of NSCT, RDWT, SVD and chaotic encryption makes the approach robust, imperceptible, secure and suitable for medical applications.
Related Papers (5)
An improved DWT-SVD domain watermarking for medical information security
Ashima Anand,Amit Singh +1 more
Joint Watermarking-Encryption-ECC for Patient Record Security in Wavelet Domain
Ashima Anand,Amit Singh +1 more