期刊文献+

基于混合技术的EMR系统医学信息保护

Medical Information Protection of EMR System Based on Hybrid Technology
下载PDF
导出
摘要 随着电子病历记录(EMR)系统在诸多医院的广泛使用,医生可以利用计算机云交互和共享医学数据,并通过下一代临床决策支持系统提取医学记录信息,从而做出精确诊断。为解决EMR系统传输过程中的医学信息泄露或纂改问题,将EMR系统中经过B++编码后的医学数据嵌入到病人的指纹中,通过基于非下采样Contourlet变换的数字水印算法,提取含有特征结构信息和注册密钥的指纹,并将其嵌入到病人的医学图像中,提高EMR系统医学信息的安全性。实验结果表明,该方法实现的医学水印图像具有较高的鲁棒性,并且由于允许高容量的医学信息嵌入,保证了医学数据的完整性。 As the Electronic Medical Records(EMR) system is widely used in many hospitals, doctor can use computer to cloud interaction and share medical data. It extracts the medical record information by Clinical Decision Support Systems(CDSS), and helps doctor to make accurate diagnosis. To solve the problem of medical information disclosure or tamper in the transmission process of EMR system, medical data after B++ encoding is embedded in a patient's finger. The finger with feature information and registration key are embedded in medical image by digital watermarking algorithm based on Non-subsampled Contourlet Transform(NSCT), and it can improve the safety of medical information in EMR system. Experimental results show that the method ensures higher robustness of the watermarking image, and it protects the integrity of the medical data by embedding high capacity medical information.
出处 《计算机工程》 CAS CSCD 2014年第3期175-179,183,共6页 Computer Engineering
基金 教育部博士点基金资助项目(20113227110010) 江苏省高校自然科学基金资助项目(10KJB520004) 江苏省软件和集成电路专项基金资助项目(苏信软2009[100]) 江苏省普通高校研究生科研创新计划基金资助项目(CXZZ11_0575)
关键词 电子病历记录 非下采样CONTOURLET变换 B++编码 生物认证 指纹 数字水印 Electronic Medical Records(EMR) Non-subsampled Contourlet Transform(NSCT) B++ coding biometric authentication fingerprint digital watermarking
  • 相关文献

参考文献3

二级参考文献17

  • 1付炜,孙新凤,成利敏.基于混沌加密和小波包分解的数字水印算法[J].电子测量技术,2007,30(1):110-112. 被引量:2
  • 2张旭,张贵仓.一种基于小波包分解的自适应数字水印算法[J].计算机辅助设计与图形学学报,2007,19(7):931-934. 被引量:15
  • 3Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 4Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 5Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 6Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 7Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 8Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 9Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 10Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.

共引文献100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部