In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medic...In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and educators.In order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities.展开更多
As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts o...As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques.展开更多
The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via ...The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters.展开更多
The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Suc...The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliable services focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure systemreliabilitywhen using medical convergence environment information in medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.展开更多
Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To beg...Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To begin, we use Resnet50, a pre-training network, to draw out thedeep features of medical images. Then the deep features are transformedby DCT transform and the perceptual hash function is used to generatethe feature vector. The original watermark is chaotic scrambled to get theencrypted watermark, and the watermark information is embedded into theoriginal medical image by XOR operation, and the logical key vector isobtained and saved at the same time. Similarly, the same feature extractionmethod is used to extract the deep features of the medical image to be testedand generate the feature vector. Later, the XOR operation is carried outbetween the feature vector and the logical key vector, and the encryptedwatermark is extracted and decrypted to get the restored watermark;thenormalized correlation coefficient (NC) of the original watermark and therestored watermark is calculated to determine the ownership and watermarkinformation of the medical image to be tested. After calculation, most ofthe NC values are greater than 0.50. The experimental results demonstratethe algorithm’s robustness, invisibility, and security, as well as its ability toaccurately extract watermark information. The algorithm also shows goodresistance to conventional attacks and geometric attacks.展开更多
Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchai...Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios.展开更多
The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads t...The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection.A trade-off between robustness,imperceptibility,and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability.Keeping this purpose insight,an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern.A key is generated by a random path with minimum bit flipping is selected in the 4 × 4 block to gain access to the data embedding patterns.The random path's complex structure ensures data security.Data of various sizes(8 KB,16 KB,32 KB)are used to analyze image imperceptibility and evaluate quality factors.The proposed reversible watermarking methodology performance is tested under standard structures PSNR,SSIM,and MSE.The results revealed that the MRI watermarked images are imperceptible,like the cover image when LSB is 3 bits plane.Our proposed reversible watermarking methodology outperforms other related techniques in terms of average PSNR(49.29).Experiment results show that the suggested reversible watermarking method improves data embedding capacity and imperceptibility compared to existing state-of-the-art approaches.展开更多
Nowadays,security plays an important role in Internet of Things(IoT)environment especially in medical services’domains like disease prediction and medical data storage.In healthcare sector,huge volumes of data are ge...Nowadays,security plays an important role in Internet of Things(IoT)environment especially in medical services’domains like disease prediction and medical data storage.In healthcare sector,huge volumes of data are generated on a daily basis,owing to the involvement of advanced health care devices.In general terms,health care images are highly sensitive to alterations due to which any modifications in its content can result in faulty diagnosis.At the same time,it is also significant to maintain the delicate contents of health care images during reconstruction stage.Therefore,an encryption system is required in order to raise the privacy and security of healthcare data by not leaking any sensitive data.The current study introduces Improved Multileader Optimization with Shadow Image Encryption for Medical Image Security(IMLOSIE-MIS)technique for IoT environment.The aim of the proposed IMLOSIE-MIS model is to accomplish security by generating shadows and encrypting them effectively.To do so,the presented IMLOSIE-MIS model initially generates a set of shadows for every input medical image.Besides,shadow image encryption process takes place with the help of Multileader Optimization(MLO)withHomomorphic Encryption(IMLO-HE)technique,where the optimal keys are generated with the help of MLO algorithm.On the receiver side,decryption process is initially carried out and shadow image reconstruction process is conducted.The experimentation analysis was carried out on medical images and the results inferred that the proposed IMLOSIE-MIS model is an excellent performer compared to other models.The comparison study outcomes demonstrate that IMLOSIE-MIS model is robust and offers high security in IoT-enabled healthcare environment.展开更多
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric...Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques.展开更多
In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates ...In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images.展开更多
In recent times,Internet of Medical Things(IoMT)gained much attention in medical services and healthcare management domain.Since healthcare sector generates massive volumes of data like personal details,historical med...In recent times,Internet of Medical Things(IoMT)gained much attention in medical services and healthcare management domain.Since healthcare sector generates massive volumes of data like personal details,historical medical data,hospitalization records,and discharging records,IoMT devices too evolved with potentials to handle such high quantities of data.Privacy and security of the data,gathered by IoMT gadgets,are major issues while transmitting or saving it in cloud.The advancements made in Artificial Intelligence(AI)and encryption techniques find a way to handle massive quantities of medical data and achieve security.In this view,the current study presents a new Optimal Privacy Preserving and Deep Learning(DL)-based Disease Diagnosis(OPPDL-DD)in IoMT environment.Initially,the proposed model enables IoMT devices to collect patient data which is then preprocessed to optimize quality.In order to decrease the computational difficulty during diagnosis,Radix Tree structure is employed.In addition,ElGamal public key cryptosystem with Rat Swarm Optimizer(EIG-RSO)is applied to encrypt the data.Upon the transmission of encrypted data to cloud,respective decryption process occurs and the actual data gets reconstructed.Finally,a hybridized methodology combining Gated Recurrent Unit(GRU)with Convolution Neural Network(CNN)is exploited as a classification model to diagnose the disease.Extensive sets of simulations were conducted to highlight the performance of the proposed model on benchmark dataset.The experimental outcomes ensure that the proposed model is superior to existing methods under different measures.展开更多
Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transfor...Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested.Two different phases in the fractional Fourier and output planes are provided as deciphering keys.Accordingly,the ciphering keys will not be employed for the deciphering procedure.Thus,the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH(Optical Scanning Holography)and DRPE(Double Random Phase Encoding)algorithms.One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the onedimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components.More comparisons on various colormedical images are examined and analyzed to substantiate the cryptosystem efficacy.The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure.It has terrific cryptography performance compared to conventional cryptography algorithms,even in the presence of noise and severe channel attacks.展开更多
Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have ...Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have known that IDDs is associated with iodine in the human body,but it is not clear whether IDDs is related to medical resource level.Methods:We collected the number of IDDs cases and an index for the level of medical resource from 31 provinces,autonomous regions and municipalities directly under the central government in China.All data came from the China Statistical Yearbook of Health and Family Planning issued in 2013 by the Peking Union Medical College Publishing House.Data standardization and linear regression analysis were used.Results:The results showed that IDDs correlated with the number of beds in medical and health institutions,number of medical health personnel,number of medical and health institutions,total health expenditure,average health expenditure per capita,medical insurance for urban resident and new rural cooperative medical rural residents(P<0.01).In a multiple linear regression,IDDs was most significantly associated with the number of beds in hospitals,the number of rural health personnel,the number of basic medical and health institutions and government health expenditure for these institutions. Conclusion:Based on the experimental data,we concluded that IDDs had a positive connection with the medical resource level,and basic and rural areas had a more significant association with IDDs.This analysis provides new and explicit ideas for iodine prevention and control work in China.展开更多
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing th...Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing the color medical images against impostors and invaders.In this paper,an optical medical image security approach is introduced.It is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and security.To confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security metrics.Furthermore,a comparative analysis is introduced between the suggested security approach and other conventional cryptography protocols.The simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly secure.It has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images.展开更多
Securing large amounts of electronic medical records stored in different forms and in many locations, while making availability to authorized users is considered as a great challenge. Maintaining protection and privac...Securing large amounts of electronic medical records stored in different forms and in many locations, while making availability to authorized users is considered as a great challenge. Maintaining protection and privacy of personal information is a strong motivation in the development of security policies. It is critical for health care organizations to access, analyze, and ensure security policies to meet the challenge and to develop the necessary policies to ensure the security of medical information. The problem, then, is how we can maintain the availability of the electronic medical records and at the same time maintain the privacy of patients’ information. This paper will propose a novel architecture model for the Electronic Medical Record (EMR), in which useful statistical medical records will be available to the interested parties while maintaining the privacy of patients’ information.展开更多
The Internet of Medical Things(IoMT)offers an infrastructure made of smart medical equipment and software applications for healthcare services.Through the internet,the IoMT is capable of providing remote medical diagn...The Internet of Medical Things(IoMT)offers an infrastructure made of smart medical equipment and software applications for healthcare services.Through the internet,the IoMT is capable of providing remote medical diagnosis and timely health services.The patients can use their smart devices to create,store and share their electronic health records(EHR)with a variety of medical personnel including medical doctors and nurses.However,unless the underlying commination within IoMT is secured,malicious users can intercept,modify and even delete the sensitive EHR data of patients.Patients also lose full control of their EHR since most healthcare services within IoMT are constructed under a centralized platform outsourced in the cloud.Therefore,it is appealing to design a decentralized,auditable and secure EHR system that guarantees absolute access control for the patients while ensuring privacy and security.Using the features of blockchain including decentralization,auditability and immutability,we propose a secure EHR framework which is mainly maintained by the medical centers.In this framework,the patients’EHR data are encrypted and stored in the servers of medical institutions while the corresponding hash values are kept on the blockchain.We make use of security primitives to offer authentication,integrity and confidentiality of EHR data while access control and immutability is guaranteed by the blockchain technology.The security analysis and performance evaluation of the proposed framework confirms its efficiency.展开更多
Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a ...Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks.This paper presents a new wind driven optimization algorithm based medical image encryption(WDOA-MIE)technique for blockchain enabled IoT environments.The WDOA-MIE model involves three major processes namely data collection,image encryption,optimal key generation,and data transmission.Initially,the medical images were captured from the patient using IoT devices.Then,the captured images are encrypted using signcryption technique.In addition,for improving the performance of the signcryption technique,the optimal key generation procedure was applied by WDOA algorithm.The goal of the WDOA-MIE algorithm is to derive a fitness function dependent upon peak signal to noise ratio(PSNR).Upon successful encryption of images,the IoT devices transmit to the closest server for storing it in the blockchain securely.The performance of the presented method was analyzed utilizing the benchmark medical image dataset.The security and the performance analysis determine that the presented technique offers better security with maximum PSNR of 60.7036 dB.展开更多
Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-base...Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-based medicine, so that is the most important, richest and the most realistic source of medical and health information. Health information management systems that require systems to the storage, retrieval, storage and elimination of health records (by law), and adjust to the rules of professional. These processes are difficult and time consuming for human. In the meantime semantic HIM seem best solution.展开更多
This article evaluates the security techniques that are used to maintainthe healthcare devices, and proposes a mathematical model to list these in theorder of priority and preference. To accomplish the stated objectiv...This article evaluates the security techniques that are used to maintainthe healthcare devices, and proposes a mathematical model to list these in theorder of priority and preference. To accomplish the stated objective, the articleuses the Fuzzy Analytic Network Process (ANP) integrated with Technical forOrder Preference by Similarities to Ideal Solution (TOPSIS) to find the suitablealternatives of the security techniques for securing the healthcare devices fromtrespassing. The methodology is enlisted to rank the alternatives/ techniquesbased on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques used in healthcare security.The findings of our analysis cite that Machine Learning (ML) based healthcaredevices obtained the highest priority among all the other security techniques.Hence the developers, manufacturers and researchers should focus on the MLtechniques for securing the healthcare devices. The results drawn through theaid of the suggested mathematical model would be a corroborative referencefor the developers and the manufacturers in assessing the security techniques ofthe healthcare devices.展开更多
文摘In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and educators.In order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities.
文摘As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques.
基金The authors would like to thank the reviewers and the Associate Editor for their valuable suggestions that helped in improving the quality,readability and presentation of the paper.This work was supported by FCT/MCTES through national funds and when applicable co-funded EU funds under the Project UIDB/50008/2020by the Brazilian National Council for Research and Development(CNPq)via Grants No.431726/2018-3 and 313036/2020-9.
文摘The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters.
基金This paper was supported by a Korea Institute for the Advancement of Technology(KIAT)grant funded by the Korean government(MOTIE,No.P0008703)by a National Research Foundation of Korea(NRF)grant funded by the Korean government(MSIT,No.2018R1C1B5046760).
文摘The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliable services focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure systemreliabilitywhen using medical convergence environment information in medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.
基金supported in part by the Natural Science Foundation of China under Grants 62063004the Key Research Project of Hainan Province under Grant ZDYF2021SHFZ093+1 种基金the Hainan Provincial Natural Science Foundation of China under Grants 2019RC018 and 619QN246the postdoctor research from Zhejiang Province under Grant ZJ2021028.
文摘Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To begin, we use Resnet50, a pre-training network, to draw out thedeep features of medical images. Then the deep features are transformedby DCT transform and the perceptual hash function is used to generatethe feature vector. The original watermark is chaotic scrambled to get theencrypted watermark, and the watermark information is embedded into theoriginal medical image by XOR operation, and the logical key vector isobtained and saved at the same time. Similarly, the same feature extractionmethod is used to extract the deep features of the medical image to be testedand generate the feature vector. Later, the XOR operation is carried outbetween the feature vector and the logical key vector, and the encryptedwatermark is extracted and decrypted to get the restored watermark;thenormalized correlation coefficient (NC) of the original watermark and therestored watermark is calculated to determine the ownership and watermarkinformation of the medical image to be tested. After calculation, most ofthe NC values are greater than 0.50. The experimental results demonstratethe algorithm’s robustness, invisibility, and security, as well as its ability toaccurately extract watermark information. The algorithm also shows goodresistance to conventional attacks and geometric attacks.
文摘Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios.
基金supported by the National Natural Science Foundation of China(Grant No.61762060)Educational Commission of Gansu Province,China(Grant No.2017C-05)+2 种基金Foundation for the Key Research and Development Program of Gansu Province,China(Grant No.20YF3GA016)supported by King Saud University,Riyadh,Saudi Arabia,through Researchers Supporting Project No.RSP-2022/184The work of author Ayman Radwan was supported by FCT/MEC through Programa Operacional Regional do Centro and by the European Union through the European Social Fund(ESF)under Investigator FCT Grant(5G-AHEAD IF/FCT-IF/01393/2015/CP1310/CT0002).
文摘The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection.A trade-off between robustness,imperceptibility,and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability.Keeping this purpose insight,an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern.A key is generated by a random path with minimum bit flipping is selected in the 4 × 4 block to gain access to the data embedding patterns.The random path's complex structure ensures data security.Data of various sizes(8 KB,16 KB,32 KB)are used to analyze image imperceptibility and evaluate quality factors.The proposed reversible watermarking methodology performance is tested under standard structures PSNR,SSIM,and MSE.The results revealed that the MRI watermarked images are imperceptible,like the cover image when LSB is 3 bits plane.Our proposed reversible watermarking methodology outperforms other related techniques in terms of average PSNR(49.29).Experiment results show that the suggested reversible watermarking method improves data embedding capacity and imperceptibility compared to existing state-of-the-art approaches.
基金the Deanship of Scientific Research at King Khalid University for funding this work through Small Groups Project under Grant Number(241/43)Princess Nourah Bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R319)Princess Nourah Bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4340237DSR30).
文摘Nowadays,security plays an important role in Internet of Things(IoT)environment especially in medical services’domains like disease prediction and medical data storage.In healthcare sector,huge volumes of data are generated on a daily basis,owing to the involvement of advanced health care devices.In general terms,health care images are highly sensitive to alterations due to which any modifications in its content can result in faulty diagnosis.At the same time,it is also significant to maintain the delicate contents of health care images during reconstruction stage.Therefore,an encryption system is required in order to raise the privacy and security of healthcare data by not leaking any sensitive data.The current study introduces Improved Multileader Optimization with Shadow Image Encryption for Medical Image Security(IMLOSIE-MIS)technique for IoT environment.The aim of the proposed IMLOSIE-MIS model is to accomplish security by generating shadows and encrypting them effectively.To do so,the presented IMLOSIE-MIS model initially generates a set of shadows for every input medical image.Besides,shadow image encryption process takes place with the help of Multileader Optimization(MLO)withHomomorphic Encryption(IMLO-HE)technique,where the optimal keys are generated with the help of MLO algorithm.On the receiver side,decryption process is initially carried out and shadow image reconstruction process is conducted.The experimentation analysis was carried out on medical images and the results inferred that the proposed IMLOSIE-MIS model is an excellent performer compared to other models.The comparison study outcomes demonstrate that IMLOSIE-MIS model is robust and offers high security in IoT-enabled healthcare environment.
基金funded by Dirección General de Investigaciones of Universidad Santiago de Cali under call No.01-2021.
文摘Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques.
基金This work is supported by the National Natural Science Foundation of China(Grant 61762060)Educational Commission of Gansu Province,China(Grant 2017C-05)Foundation for the Key Research and Development Program of Gansu Province,China(Grant 20YF3GA016).
文摘In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images.
基金This work was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(2020R1A6A1A03038540)National Research Foundation of Korea(NRF)grant funded by the Korea government,Ministry of Science and ICT(MSIT)(2021R1F1A1046339)by a grant(20212020900150)from“Development and Demonstration of Technology for Customers Bigdata-based Energy Management in the Field of Heat Supply Chain”funded by Ministry of Trade,Industry and Energy of Korean government.
文摘In recent times,Internet of Medical Things(IoMT)gained much attention in medical services and healthcare management domain.Since healthcare sector generates massive volumes of data like personal details,historical medical data,hospitalization records,and discharging records,IoMT devices too evolved with potentials to handle such high quantities of data.Privacy and security of the data,gathered by IoMT gadgets,are major issues while transmitting or saving it in cloud.The advancements made in Artificial Intelligence(AI)and encryption techniques find a way to handle massive quantities of medical data and achieve security.In this view,the current study presents a new Optimal Privacy Preserving and Deep Learning(DL)-based Disease Diagnosis(OPPDL-DD)in IoMT environment.Initially,the proposed model enables IoMT devices to collect patient data which is then preprocessed to optimize quality.In order to decrease the computational difficulty during diagnosis,Radix Tree structure is employed.In addition,ElGamal public key cryptosystem with Rat Swarm Optimizer(EIG-RSO)is applied to encrypt the data.Upon the transmission of encrypted data to cloud,respective decryption process occurs and the actual data gets reconstructed.Finally,a hybridized methodology combining Gated Recurrent Unit(GRU)with Convolution Neural Network(CNN)is exploited as a classification model to diagnose the disease.Extensive sets of simulations were conducted to highlight the performance of the proposed model on benchmark dataset.The experimental outcomes ensure that the proposed model is superior to existing methods under different measures.
基金This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program to support publication in the top journal(Grant no.42-FTTJ-12).
文摘Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested.Two different phases in the fractional Fourier and output planes are provided as deciphering keys.Accordingly,the ciphering keys will not be employed for the deciphering procedure.Thus,the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH(Optical Scanning Holography)and DRPE(Double Random Phase Encoding)algorithms.One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the onedimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components.More comparisons on various colormedical images are examined and analyzed to substantiate the cryptosystem efficacy.The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure.It has terrific cryptography performance compared to conventional cryptography algorithms,even in the presence of noise and severe channel attacks.
基金supported by the National Natural Science Foundation of China(No.81372125)
文摘Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have known that IDDs is associated with iodine in the human body,but it is not clear whether IDDs is related to medical resource level.Methods:We collected the number of IDDs cases and an index for the level of medical resource from 31 provinces,autonomous regions and municipalities directly under the central government in China.All data came from the China Statistical Yearbook of Health and Family Planning issued in 2013 by the Peking Union Medical College Publishing House.Data standardization and linear regression analysis were used.Results:The results showed that IDDs correlated with the number of beds in medical and health institutions,number of medical health personnel,number of medical and health institutions,total health expenditure,average health expenditure per capita,medical insurance for urban resident and new rural cooperative medical rural residents(P<0.01).In a multiple linear regression,IDDs was most significantly associated with the number of beds in hospitals,the number of rural health personnel,the number of basic medical and health institutions and government health expenditure for these institutions. Conclusion:Based on the experimental data,we concluded that IDDs had a positive connection with the medical resource level,and basic and rural areas had a more significant association with IDDs.This analysis provides new and explicit ideas for iodine prevention and control work in China.
基金This research was funded by the Deanship of Scientific Research at King Saud University through research group No.(RG-1441-456)(Grantee:MA,https://dsrs.ksu.edu.sa/).
文摘Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing the color medical images against impostors and invaders.In this paper,an optical medical image security approach is introduced.It is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and security.To confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security metrics.Furthermore,a comparative analysis is introduced between the suggested security approach and other conventional cryptography protocols.The simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly secure.It has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images.
文摘Securing large amounts of electronic medical records stored in different forms and in many locations, while making availability to authorized users is considered as a great challenge. Maintaining protection and privacy of personal information is a strong motivation in the development of security policies. It is critical for health care organizations to access, analyze, and ensure security policies to meet the challenge and to develop the necessary policies to ensure the security of medical information. The problem, then, is how we can maintain the availability of the electronic medical records and at the same time maintain the privacy of patients’ information. This paper will propose a novel architecture model for the Electronic Medical Record (EMR), in which useful statistical medical records will be available to the interested parties while maintaining the privacy of patients’ information.
文摘The Internet of Medical Things(IoMT)offers an infrastructure made of smart medical equipment and software applications for healthcare services.Through the internet,the IoMT is capable of providing remote medical diagnosis and timely health services.The patients can use their smart devices to create,store and share their electronic health records(EHR)with a variety of medical personnel including medical doctors and nurses.However,unless the underlying commination within IoMT is secured,malicious users can intercept,modify and even delete the sensitive EHR data of patients.Patients also lose full control of their EHR since most healthcare services within IoMT are constructed under a centralized platform outsourced in the cloud.Therefore,it is appealing to design a decentralized,auditable and secure EHR system that guarantees absolute access control for the patients while ensuring privacy and security.Using the features of blockchain including decentralization,auditability and immutability,we propose a secure EHR framework which is mainly maintained by the medical centers.In this framework,the patients’EHR data are encrypted and stored in the servers of medical institutions while the corresponding hash values are kept on the blockchain.We make use of security primitives to offer authentication,integrity and confidentiality of EHR data while access control and immutability is guaranteed by the blockchain technology.The security analysis and performance evaluation of the proposed framework confirms its efficiency.
文摘Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks.This paper presents a new wind driven optimization algorithm based medical image encryption(WDOA-MIE)technique for blockchain enabled IoT environments.The WDOA-MIE model involves three major processes namely data collection,image encryption,optimal key generation,and data transmission.Initially,the medical images were captured from the patient using IoT devices.Then,the captured images are encrypted using signcryption technique.In addition,for improving the performance of the signcryption technique,the optimal key generation procedure was applied by WDOA algorithm.The goal of the WDOA-MIE algorithm is to derive a fitness function dependent upon peak signal to noise ratio(PSNR).Upon successful encryption of images,the IoT devices transmit to the closest server for storing it in the blockchain securely.The performance of the presented method was analyzed utilizing the benchmark medical image dataset.The security and the performance analysis determine that the presented technique offers better security with maximum PSNR of 60.7036 dB.
文摘Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-based medicine, so that is the most important, richest and the most realistic source of medical and health information. Health information management systems that require systems to the storage, retrieval, storage and elimination of health records (by law), and adjust to the rules of professional. These processes are difficult and time consuming for human. In the meantime semantic HIM seem best solution.
基金Funding for this study was granted by the Deanship of Scientific Research at King Faisal University,Kingdom of Saudi Arabia under grant no.206063.
文摘This article evaluates the security techniques that are used to maintainthe healthcare devices, and proposes a mathematical model to list these in theorder of priority and preference. To accomplish the stated objective, the articleuses the Fuzzy Analytic Network Process (ANP) integrated with Technical forOrder Preference by Similarities to Ideal Solution (TOPSIS) to find the suitablealternatives of the security techniques for securing the healthcare devices fromtrespassing. The methodology is enlisted to rank the alternatives/ techniquesbased on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques used in healthcare security.The findings of our analysis cite that Machine Learning (ML) based healthcaredevices obtained the highest priority among all the other security techniques.Hence the developers, manufacturers and researchers should focus on the MLtechniques for securing the healthcare devices. The results drawn through theaid of the suggested mathematical model would be a corroborative referencefor the developers and the manufacturers in assessing the security techniques ofthe healthcare devices.