期刊文献+
共找到2,020篇文章
< 1 2 101 >
每页显示 20 50 100
Exploration and Practice of Postgraduate Training Mode Based on Medical Imaging Information Security
1
作者 Yi Ding Jiaqi Zhang +2 位作者 Zhen Qin Yang Zhao Mingsheng Cao 《计算机教育》 2023年第12期71-77,共7页
In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medic... In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and educators.In order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities. 展开更多
关键词 medical imaging Information security Postgraduate training Countermeasures and suggestions
下载PDF
Severity Based Light-Weight Encryption Model for Secure Medical Information System
2
作者 Firas Abedi Subhi R.M.Zeebaree +10 位作者 Zainab Salih Ageed Hayder M.A.Ghanimi Ahmed Alkhayyat Mohammed A.M.Sadeeq Sarmad Nozad Mahmood Ali S.Abosinnee Zahraa H.Kareem Ali Hashim Abbas Waleed Khaild Al-Azzawi Mustafa Musa Jaber Mohammed Dauwed 《Computers, Materials & Continua》 SCIE EI 2023年第3期5691-5704,共14页
As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts o... As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques. 展开更多
关键词 Deep learning ENCRYPTION medical images SCRAMBLING security skew tent map rotation zigzag pattern
下载PDF
On the design of an AI-driven secure communication scheme for internet of medical things environment
3
作者 Neha Garg Rajat Petwal +3 位作者 Mohammad Wazid D.P.Singh Ashok Kumar Das Joel J.P.C.Rodrigues 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1080-1089,共10页
The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via ... The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters. 展开更多
关键词 Internet of medical Things(IoMT) security Authentication and key agreement Artificial Intelligence(AI) Big data analytics
下载PDF
Design of an Information Security Service for Medical Artificial Intelligence 被引量:1
4
作者 Yanghoon Kim Jawon Kim Hangbae Chang 《Computers, Materials & Continua》 SCIE EI 2022年第1期679-694,共16页
The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Suc... The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliable services focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure systemreliabilitywhen using medical convergence environment information in medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes. 展开更多
关键词 medical artificial intelligence medical information security convergence environment
下载PDF
Research on Farmers' Medical Security Based on Supply Theory
5
作者 WANG Linlin 《International English Education Research》 2017年第1期24-26,共3页
关键词 医疗保障 农民 城市化进程 供给 产业结构调整 农村地区 分布格局 农村人口
下载PDF
Zero Watermarking Algorithm for Medical Image Based on Resnet50-DCT 被引量:1
6
作者 Mingshuai Sheng Jingbing Li +3 位作者 Uzair Aslam Bhatti Jing Liu Mengxing Huang Yen-Wei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第4期293-309,共17页
Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To beg... Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To begin, we use Resnet50, a pre-training network, to draw out thedeep features of medical images. Then the deep features are transformedby DCT transform and the perceptual hash function is used to generatethe feature vector. The original watermark is chaotic scrambled to get theencrypted watermark, and the watermark information is embedded into theoriginal medical image by XOR operation, and the logical key vector isobtained and saved at the same time. Similarly, the same feature extractionmethod is used to extract the deep features of the medical image to be testedand generate the feature vector. Later, the XOR operation is carried outbetween the feature vector and the logical key vector, and the encryptedwatermark is extracted and decrypted to get the restored watermark;thenormalized correlation coefficient (NC) of the original watermark and therestored watermark is calculated to determine the ownership and watermarkinformation of the medical image to be tested. After calculation, most ofthe NC values are greater than 0.50. The experimental results demonstratethe algorithm’s robustness, invisibility, and security, as well as its ability toaccurately extract watermark information. The algorithm also shows goodresistance to conventional attacks and geometric attacks. 展开更多
关键词 medical images deep residual network resnet50-DCT privacy protection ROBUSTNESS security
下载PDF
BC-BLPM:A Multi-Level Security Access Control Model Based on Blockchain Technology 被引量:4
7
作者 Xiang Yu Zhangxiang Shu +1 位作者 Qiang Li Jun Huang 《China Communications》 SCIE CSCD 2021年第2期110-135,共26页
Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchai... Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios. 展开更多
关键词 multi-level security(MLS) access control blockchain multi-chain smart contract
下载PDF
A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System
8
作者 Saima Kanwal Feng Tao +3 位作者 Ahmad Almogren Ateeq Ur Rehman Rizwan Taj Ayman Radwan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第1期201-219,共19页
The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads t... The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection.A trade-off between robustness,imperceptibility,and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability.Keeping this purpose insight,an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern.A key is generated by a random path with minimum bit flipping is selected in the 4 × 4 block to gain access to the data embedding patterns.The random path's complex structure ensures data security.Data of various sizes(8 KB,16 KB,32 KB)are used to analyze image imperceptibility and evaluate quality factors.The proposed reversible watermarking methodology performance is tested under standard structures PSNR,SSIM,and MSE.The results revealed that the MRI watermarked images are imperceptible,like the cover image when LSB is 3 bits plane.Our proposed reversible watermarking methodology outperforms other related techniques in terms of average PSNR(49.29).Experiment results show that the suggested reversible watermarking method improves data embedding capacity and imperceptibility compared to existing state-of-the-art approaches. 展开更多
关键词 medical images security data hiding LSB matching hiding capacity IMPERCEPTIBILITY
下载PDF
Improved Multileader Optimization with Shadow Encryption for Medical Images in IoT Environment
9
作者 Mesfer Al Duhayyim Mohammed Maray +5 位作者 Ayman Qahmash Fatma S.Alrayes Nuha Alshuqayran Jaber S.Alzahrani Mohammed Alghamdi Abdullah Mohamed 《Computers, Materials & Continua》 SCIE EI 2023年第2期3133-3149,共17页
Nowadays,security plays an important role in Internet of Things(IoT)environment especially in medical services’domains like disease prediction and medical data storage.In healthcare sector,huge volumes of data are ge... Nowadays,security plays an important role in Internet of Things(IoT)environment especially in medical services’domains like disease prediction and medical data storage.In healthcare sector,huge volumes of data are generated on a daily basis,owing to the involvement of advanced health care devices.In general terms,health care images are highly sensitive to alterations due to which any modifications in its content can result in faulty diagnosis.At the same time,it is also significant to maintain the delicate contents of health care images during reconstruction stage.Therefore,an encryption system is required in order to raise the privacy and security of healthcare data by not leaking any sensitive data.The current study introduces Improved Multileader Optimization with Shadow Image Encryption for Medical Image Security(IMLOSIE-MIS)technique for IoT environment.The aim of the proposed IMLOSIE-MIS model is to accomplish security by generating shadows and encrypting them effectively.To do so,the presented IMLOSIE-MIS model initially generates a set of shadows for every input medical image.Besides,shadow image encryption process takes place with the help of Multileader Optimization(MLO)withHomomorphic Encryption(IMLO-HE)technique,where the optimal keys are generated with the help of MLO algorithm.On the receiver side,decryption process is initially carried out and shadow image reconstruction process is conducted.The experimentation analysis was carried out on medical images and the results inferred that the proposed IMLOSIE-MIS model is an excellent performer compared to other models.The comparison study outcomes demonstrate that IMLOSIE-MIS model is robust and offers high security in IoT-enabled healthcare environment. 展开更多
关键词 medical image security image encryption shadow images homomorphic encryption optimal key generation
下载PDF
Encryption with User Authentication Model for Internet of Medical Things Environment
10
作者 K.S.Riya R.Surendran +1 位作者 Carlos Andrés Tavera Romero M.Sadish Sendil 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期507-520,共14页
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric... Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques. 展开更多
关键词 User authentication security PRIVACY internet of medical things homomorphic encryption optimal key generation
下载PDF
Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images
11
作者 Rizwan Taj Feng Tao +4 位作者 Shahzada Khurram Ateeq Ur Rehman Syed Kamran Haider Akber Abid Gardezi Saima Kanwal 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第3期1309-1324,共16页
In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates ... In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images. 展开更多
关键词 LSB reversible watermarking medical images security data distortion
下载PDF
Deep Learning Enabled Disease Diagnosis for Secure Internet of Medical Things
12
作者 Sultan Ahmad Shakir Khan +4 位作者 Mohamed Fahad Al.Ajmi Ashit Kumar Dutta L.Minh Dang Gyanendra Prasad Joshi Hyeonjoon Moon 《Computers, Materials & Continua》 SCIE EI 2022年第10期965-979,共15页
In recent times,Internet of Medical Things(IoMT)gained much attention in medical services and healthcare management domain.Since healthcare sector generates massive volumes of data like personal details,historical med... In recent times,Internet of Medical Things(IoMT)gained much attention in medical services and healthcare management domain.Since healthcare sector generates massive volumes of data like personal details,historical medical data,hospitalization records,and discharging records,IoMT devices too evolved with potentials to handle such high quantities of data.Privacy and security of the data,gathered by IoMT gadgets,are major issues while transmitting or saving it in cloud.The advancements made in Artificial Intelligence(AI)and encryption techniques find a way to handle massive quantities of medical data and achieve security.In this view,the current study presents a new Optimal Privacy Preserving and Deep Learning(DL)-based Disease Diagnosis(OPPDL-DD)in IoMT environment.Initially,the proposed model enables IoMT devices to collect patient data which is then preprocessed to optimize quality.In order to decrease the computational difficulty during diagnosis,Radix Tree structure is employed.In addition,ElGamal public key cryptosystem with Rat Swarm Optimizer(EIG-RSO)is applied to encrypt the data.Upon the transmission of encrypted data to cloud,respective decryption process occurs and the actual data gets reconstructed.Finally,a hybridized methodology combining Gated Recurrent Unit(GRU)with Convolution Neural Network(CNN)is exploited as a classification model to diagnose the disease.Extensive sets of simulations were conducted to highlight the performance of the proposed model on benchmark dataset.The experimental outcomes ensure that the proposed model is superior to existing methods under different measures. 展开更多
关键词 Internet of medical things PRIVACY security ENCRYPTION radix tree deep learning
下载PDF
Secure and Robust Optical Multi-Stage Medical Image Cryptosystem
13
作者 Walid El-Shafai Moustafa H.Aly +2 位作者 Abeer D.Algarni Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第1期895-913,共19页
Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transfor... Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested.Two different phases in the fractional Fourier and output planes are provided as deciphering keys.Accordingly,the ciphering keys will not be employed for the deciphering procedure.Thus,the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH(Optical Scanning Holography)and DRPE(Double Random Phase Encoding)algorithms.One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the onedimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components.More comparisons on various colormedical images are examined and analyzed to substantiate the cryptosystem efficacy.The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure.It has terrific cryptography performance compared to conventional cryptography algorithms,even in the presence of noise and severe channel attacks. 展开更多
关键词 Optical encryption medical image security symmetric and asymmetric encryption OSH DRPE PTFrFT
下载PDF
Role of medical resource level in iodine deficiency disorder 被引量:1
14
作者 Chen Xu Zhen Liang Yong-Jun Luo 《Military Medical Research》 SCIE CAS 2018年第1期53-61,共9页
Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have ... Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have known that IDDs is associated with iodine in the human body,but it is not clear whether IDDs is related to medical resource level.Methods:We collected the number of IDDs cases and an index for the level of medical resource from 31 provinces,autonomous regions and municipalities directly under the central government in China.All data came from the China Statistical Yearbook of Health and Family Planning issued in 2013 by the Peking Union Medical College Publishing House.Data standardization and linear regression analysis were used.Results:The results showed that IDDs correlated with the number of beds in medical and health institutions,number of medical health personnel,number of medical and health institutions,total health expenditure,average health expenditure per capita,medical insurance for urban resident and new rural cooperative medical rural residents(P<0.01).In a multiple linear regression,IDDs was most significantly associated with the number of beds in hospitals,the number of rural health personnel,the number of basic medical and health institutions and government health expenditure for these institutions. Conclusion:Based on the experimental data,we concluded that IDDs had a positive connection with the medical resource level,and basic and rural areas had a more significant association with IDDs.This analysis provides new and explicit ideas for iodine prevention and control work in China. 展开更多
关键词 Iodine deficiency disorders(IDDs) Health level medical security China
下载PDF
A Fractional Fourier Based Medical Image Authentication Approach
15
作者 Fayez Alqahtani Mohammed Amoon Walid El-Shafai 《Computers, Materials & Continua》 SCIE EI 2022年第2期3133-3150,共18页
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing th... Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing the color medical images against impostors and invaders.In this paper,an optical medical image security approach is introduced.It is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and security.To confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security metrics.Furthermore,a comparative analysis is introduced between the suggested security approach and other conventional cryptography protocols.The simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly secure.It has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images. 展开更多
关键词 medical image security ENCRYPTION JT FFT CRYPTOSYSTEM
下载PDF
A Proposed Layered Architecture to Maintain Privacy Issues in Electronic Medical Records
16
作者 Ameur Bensefia Anis Zarrad 《E-Health Telecommunication Systems and Networks》 2014年第4期43-49,共7页
Securing large amounts of electronic medical records stored in different forms and in many locations, while making availability to authorized users is considered as a great challenge. Maintaining protection and privac... Securing large amounts of electronic medical records stored in different forms and in many locations, while making availability to authorized users is considered as a great challenge. Maintaining protection and privacy of personal information is a strong motivation in the development of security policies. It is critical for health care organizations to access, analyze, and ensure security policies to meet the challenge and to develop the necessary policies to ensure the security of medical information. The problem, then, is how we can maintain the availability of the electronic medical records and at the same time maintain the privacy of patients’ information. This paper will propose a novel architecture model for the Electronic Medical Record (EMR), in which useful statistical medical records will be available to the interested parties while maintaining the privacy of patients’ information. 展开更多
关键词 PRIVACY ELECTRONIC medical RECORDS ELECTRONIC HEALTH security
下载PDF
Blockchain-Enabled EHR Framework for Internet of Medical Things
17
作者 Lewis Nkenyereye S.M.Riazul Islam +2 位作者 Mahmud Hossain M.Abdullah-Al-Wadud Atif Alamri 《Computers, Materials & Continua》 SCIE EI 2021年第4期211-221,共11页
The Internet of Medical Things(IoMT)offers an infrastructure made of smart medical equipment and software applications for healthcare services.Through the internet,the IoMT is capable of providing remote medical diagn... The Internet of Medical Things(IoMT)offers an infrastructure made of smart medical equipment and software applications for healthcare services.Through the internet,the IoMT is capable of providing remote medical diagnosis and timely health services.The patients can use their smart devices to create,store and share their electronic health records(EHR)with a variety of medical personnel including medical doctors and nurses.However,unless the underlying commination within IoMT is secured,malicious users can intercept,modify and even delete the sensitive EHR data of patients.Patients also lose full control of their EHR since most healthcare services within IoMT are constructed under a centralized platform outsourced in the cloud.Therefore,it is appealing to design a decentralized,auditable and secure EHR system that guarantees absolute access control for the patients while ensuring privacy and security.Using the features of blockchain including decentralization,auditability and immutability,we propose a secure EHR framework which is mainly maintained by the medical centers.In this framework,the patients’EHR data are encrypted and stored in the servers of medical institutions while the corresponding hash values are kept on the blockchain.We make use of security primitives to offer authentication,integrity and confidentiality of EHR data while access control and immutability is guaranteed by the blockchain technology.The security analysis and performance evaluation of the proposed framework confirms its efficiency. 展开更多
关键词 Internet of medical Things security privacy preservation blockchain access control
下载PDF
Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment
18
作者 C.S.S.Anupama Raed Alsini +4 位作者 N.Supriya E.Laxmi Lydia Seifedine Kadry Sang-Soo Yeo Yongsung Kim 《Computers, Materials & Continua》 SCIE EI 2022年第11期3219-3233,共15页
Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a ... Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks.This paper presents a new wind driven optimization algorithm based medical image encryption(WDOA-MIE)technique for blockchain enabled IoT environments.The WDOA-MIE model involves three major processes namely data collection,image encryption,optimal key generation,and data transmission.Initially,the medical images were captured from the patient using IoT devices.Then,the captured images are encrypted using signcryption technique.In addition,for improving the performance of the signcryption technique,the optimal key generation procedure was applied by WDOA algorithm.The goal of the WDOA-MIE algorithm is to derive a fitness function dependent upon peak signal to noise ratio(PSNR).Upon successful encryption of images,the IoT devices transmit to the closest server for storing it in the blockchain securely.The performance of the presented method was analyzed utilizing the benchmark medical image dataset.The security and the performance analysis determine that the presented technique offers better security with maximum PSNR of 60.7036 dB. 展开更多
关键词 Internet of things image security medical images ENCRYPTION optimal key generation blockchain
下载PDF
Trust and Security on Semantic HIM (Health Information Management)
19
作者 Nasim Khozouei Razie Vanda Peyman Khozouei 《Intelligent Information Management》 2012年第6期401-406,共6页
Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-base... Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-based medicine, so that is the most important, richest and the most realistic source of medical and health information. Health information management systems that require systems to the storage, retrieval, storage and elimination of health records (by law), and adjust to the rules of professional. These processes are difficult and time consuming for human. In the meantime semantic HIM seem best solution. 展开更多
关键词 HEALTH INFORMATION Management (HIM) medical Document HEALTH INFORMATION System(HIS) SEMANTIC Web security TRUST
下载PDF
Unified Computational Modelling for Healthcare Device Security Assessment
20
作者 Shakeel Ahmed Abdulaziz Alhumam 《Computer Systems Science & Engineering》 SCIE EI 2021年第4期1-18,共18页
This article evaluates the security techniques that are used to maintainthe healthcare devices, and proposes a mathematical model to list these in theorder of priority and preference. To accomplish the stated objectiv... This article evaluates the security techniques that are used to maintainthe healthcare devices, and proposes a mathematical model to list these in theorder of priority and preference. To accomplish the stated objective, the articleuses the Fuzzy Analytic Network Process (ANP) integrated with Technical forOrder Preference by Similarities to Ideal Solution (TOPSIS) to find the suitablealternatives of the security techniques for securing the healthcare devices fromtrespassing. The methodology is enlisted to rank the alternatives/ techniquesbased on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques used in healthcare security.The findings of our analysis cite that Machine Learning (ML) based healthcaredevices obtained the highest priority among all the other security techniques.Hence the developers, manufacturers and researchers should focus on the MLtechniques for securing the healthcare devices. The results drawn through theaid of the suggested mathematical model would be a corroborative referencefor the developers and the manufacturers in assessing the security techniques ofthe healthcare devices. 展开更多
关键词 medical devices fuzzy-ANP.TOPSIS security techniques machine learning
下载PDF
上一页 1 2 101 下一页 到第
使用帮助 返回顶部