期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Comparison of the medical security system between the United Kingdom and China 被引量:1
1
作者 Shi Qiuyi Sun Zhaolin 《Chinese Medical Journal》 SCIE CAS CSCD 2014年第10期1977-1983,共7页
In this day and age,few issues have aroused more bitter controversy than the one of how to keep the balance between fairness and cost-effectiveness in healthcare system.On one hand,a well-designed healthcare system
关键词 comparison National Health Services China medical security system REFORM
原文传递
A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System
2
作者 Saima Kanwal Feng Tao +3 位作者 Ahmad Almogren Ateeq Ur Rehman Rizwan Taj Ayman Radwan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第1期201-219,共19页
The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads t... The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection.A trade-off between robustness,imperceptibility,and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability.Keeping this purpose insight,an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern.A key is generated by a random path with minimum bit flipping is selected in the 4 × 4 block to gain access to the data embedding patterns.The random path's complex structure ensures data security.Data of various sizes(8 KB,16 KB,32 KB)are used to analyze image imperceptibility and evaluate quality factors.The proposed reversible watermarking methodology performance is tested under standard structures PSNR,SSIM,and MSE.The results revealed that the MRI watermarked images are imperceptible,like the cover image when LSB is 3 bits plane.Our proposed reversible watermarking methodology outperforms other related techniques in terms of average PSNR(49.29).Experiment results show that the suggested reversible watermarking method improves data embedding capacity and imperceptibility compared to existing state-of-the-art approaches. 展开更多
关键词 medical images security data hiding LSB matching hiding capacity IMPERCEPTIBILITY
下载PDF
Secure and Robust Optical Multi-Stage Medical Image Cryptosystem
3
作者 Walid El-Shafai Moustafa H.Aly +2 位作者 Abeer D.Algarni Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第1期895-913,共19页
Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transfor... Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested.Two different phases in the fractional Fourier and output planes are provided as deciphering keys.Accordingly,the ciphering keys will not be employed for the deciphering procedure.Thus,the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH(Optical Scanning Holography)and DRPE(Double Random Phase Encoding)algorithms.One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the onedimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components.More comparisons on various colormedical images are examined and analyzed to substantiate the cryptosystem efficacy.The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure.It has terrific cryptography performance compared to conventional cryptography algorithms,even in the presence of noise and severe channel attacks. 展开更多
关键词 Optical encryption medical image security symmetric and asymmetric encryption OSH DRPE PTFrFT
下载PDF
Research on Farmers' Medical Security Based on Supply Theory
4
作者 WANG Linlin 《International English Education Research》 2017年第1期24-26,共3页
Urbanization process to change the pattern of population distribution in rural areas to strengthen the flow of farmers in the city and rural areas; national industrial structural adjustment, the gradual decline in per... Urbanization process to change the pattern of population distribution in rural areas to strengthen the flow of farmers in the city and rural areas; national industrial structural adjustment, the gradual decline in per capital income of farmers; yearly increase in medical costs, making the farmers a serious shortage of personal medical capacity, Disease caused by poverty, due to illness back to poverty "phenomenon is obvious. Based on the historical background of the development of rural medical security, based on the perspective of "supply" of modem medical service, this paper analyzes the economic factors and policies of the farmers' "difficult to see medical treatment", and the data analysis is carried out according to the latest social data. Factors, and put forward the corresponding improvement measures. 展开更多
关键词 urbanization process rural medical security supply perspective
下载PDF
Improved Multileader Optimization with Shadow Encryption for Medical Images in IoT Environment
5
作者 Mesfer Al Duhayyim Mohammed Maray +5 位作者 Ayman Qahmash Fatma S.Alrayes Nuha Alshuqayran Jaber S.Alzahrani Mohammed Alghamdi Abdullah Mohamed 《Computers, Materials & Continua》 SCIE EI 2023年第2期3133-3149,共17页
Nowadays,security plays an important role in Internet of Things(IoT)environment especially in medical services’domains like disease prediction and medical data storage.In healthcare sector,huge volumes of data are ge... Nowadays,security plays an important role in Internet of Things(IoT)environment especially in medical services’domains like disease prediction and medical data storage.In healthcare sector,huge volumes of data are generated on a daily basis,owing to the involvement of advanced health care devices.In general terms,health care images are highly sensitive to alterations due to which any modifications in its content can result in faulty diagnosis.At the same time,it is also significant to maintain the delicate contents of health care images during reconstruction stage.Therefore,an encryption system is required in order to raise the privacy and security of healthcare data by not leaking any sensitive data.The current study introduces Improved Multileader Optimization with Shadow Image Encryption for Medical Image Security(IMLOSIE-MIS)technique for IoT environment.The aim of the proposed IMLOSIE-MIS model is to accomplish security by generating shadows and encrypting them effectively.To do so,the presented IMLOSIE-MIS model initially generates a set of shadows for every input medical image.Besides,shadow image encryption process takes place with the help of Multileader Optimization(MLO)withHomomorphic Encryption(IMLO-HE)technique,where the optimal keys are generated with the help of MLO algorithm.On the receiver side,decryption process is initially carried out and shadow image reconstruction process is conducted.The experimentation analysis was carried out on medical images and the results inferred that the proposed IMLOSIE-MIS model is an excellent performer compared to other models.The comparison study outcomes demonstrate that IMLOSIE-MIS model is robust and offers high security in IoT-enabled healthcare environment. 展开更多
关键词 medical image security image encryption shadow images homomorphic encryption optimal key generation
下载PDF
A Fractional Fourier Based Medical Image Authentication Approach 被引量:2
6
作者 Fayez Alqahtani Mohammed Amoon Walid El-Shafai 《Computers, Materials & Continua》 SCIE EI 2022年第2期3133-3150,共18页
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing th... Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing the color medical images against impostors and invaders.In this paper,an optical medical image security approach is introduced.It is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and security.To confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security metrics.Furthermore,a comparative analysis is introduced between the suggested security approach and other conventional cryptography protocols.The simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly secure.It has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images. 展开更多
关键词 medical image security ENCRYPTION JT FFT CRYPTOsystem
下载PDF
Role of medical resource level in iodine deficiency disorder 被引量:1
7
作者 Chen Xu Zhen Liang Yong-Jun Luo 《Military Medical Research》 SCIE CAS 2018年第1期53-61,共9页
Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have ... Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have known that IDDs is associated with iodine in the human body,but it is not clear whether IDDs is related to medical resource level.Methods:We collected the number of IDDs cases and an index for the level of medical resource from 31 provinces,autonomous regions and municipalities directly under the central government in China.All data came from the China Statistical Yearbook of Health and Family Planning issued in 2013 by the Peking Union Medical College Publishing House.Data standardization and linear regression analysis were used.Results:The results showed that IDDs correlated with the number of beds in medical and health institutions,number of medical health personnel,number of medical and health institutions,total health expenditure,average health expenditure per capita,medical insurance for urban resident and new rural cooperative medical rural residents(P<0.01).In a multiple linear regression,IDDs was most significantly associated with the number of beds in hospitals,the number of rural health personnel,the number of basic medical and health institutions and government health expenditure for these institutions. Conclusion:Based on the experimental data,we concluded that IDDs had a positive connection with the medical resource level,and basic and rural areas had a more significant association with IDDs.This analysis provides new and explicit ideas for iodine prevention and control work in China. 展开更多
关键词 Iodine deficiency disorders(IDDs) Health level medical security China
下载PDF
Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images
8
作者 Rizwan Taj Feng Tao +4 位作者 Shahzada Khurram Ateeq Ur Rehman Syed Kamran Haider Akber Abid Gardezi Saima Kanwal 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第3期1309-1324,共16页
In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates ... In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images. 展开更多
关键词 LSB reversible watermarking medical images security data distortion
下载PDF
推动长三角地区跨省异地就医门急诊费用直接结算的实践 被引量:6
9
作者 吕大伟 许宏 +2 位作者 王伟俊 罗力 曹俊山 《中国卫生资源》 北大核心 2021年第1期48-51,共4页
分析长三角地区跨省异地就医门急诊费用直接结算的需求,总结长三角地区跨省异地就医门急诊费用直接结算试点的主要做法及初步成效,提出对长三角地区医疗保险一体化建设的思考。
关键词 长三角地区Yangtze River Delta region 区域协同regional synergy 医疗保障medical security 异地就医seek medical advice to place other than one s own hometown 门诊费用outpatient expense 急诊费用emergency expense 直接结算direct settlement
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部