The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads t...The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection.A trade-off between robustness,imperceptibility,and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability.Keeping this purpose insight,an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern.A key is generated by a random path with minimum bit flipping is selected in the 4 × 4 block to gain access to the data embedding patterns.The random path's complex structure ensures data security.Data of various sizes(8 KB,16 KB,32 KB)are used to analyze image imperceptibility and evaluate quality factors.The proposed reversible watermarking methodology performance is tested under standard structures PSNR,SSIM,and MSE.The results revealed that the MRI watermarked images are imperceptible,like the cover image when LSB is 3 bits plane.Our proposed reversible watermarking methodology outperforms other related techniques in terms of average PSNR(49.29).Experiment results show that the suggested reversible watermarking method improves data embedding capacity and imperceptibility compared to existing state-of-the-art approaches.展开更多
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric...Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques.展开更多
The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via ...The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters.展开更多
In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medic...In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and educators.In order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities.展开更多
This paper provides a comprehensive examination of euthanasia from various perspectives,including medical,legal,religious,philosophical,and moral.The study also explores the public perceptions and trends in Malta.The ...This paper provides a comprehensive examination of euthanasia from various perspectives,including medical,legal,religious,philosophical,and moral.The study also explores the public perceptions and trends in Malta.The medical perspective analyses the benefits and risks of euthanasia and its impact on the healthcare system.The legal perspective discusses the legality of euthanasia in Malta and the potential legal implications of legalizing the practice.The religious perspective explores the beliefs of various religious groups in Malta,particularly Catholicism,on euthanasia.The philosophical perspective discusses the ethical and moral considerations of euthanasia.The paper also analyses the results of surveys conducted in Malta,examining the public’s attitudes towards euthanasia.Overall,the study provides a thorough analysis of euthanasia from various angles,shedding light on the complex and controversial nature of the topic.展开更多
The basis of the legal protection of resource security is its relative laws, which have four main characteristics, which are foundational, divergent, comprehensive and of long-term social benefits in view. The coordin...The basis of the legal protection of resource security is its relative laws, which have four main characteristics, which are foundational, divergent, comprehensive and of long-term social benefits in view. The coordination mechanism of the legal protection of resource security with its relative laws meets the needs of the sustainable development of the economy, society and environment. It also facilitates and is facilitated by the modern transformation of the legal system in China, and upholds the legal system as a logically self-perfecting entity. Furthermore, this coordination bears scientific feasibility.展开更多
As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts o...As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques.展开更多
The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Suc...The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliable services focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure systemreliabilitywhen using medical convergence environment information in medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.展开更多
In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates ...In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images.展开更多
This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hos...This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hospital accounting and finance,including an unsound management system,insufficient system implementation,inadequate risk assessment and control capabilities,poor information communication,weak internal supervision,and uneven personnel quality.The reasons for these problems are also analyzed,including outdated management concepts,irrational organizational structures,imperfect training and incentive mechanisms,low levels of information technology,and changes in the external environment.This paper proposes improvement measures for the internal control management of hospital accounting,including enhancing the management system,strengthening system implementation,improving risk assessment and control capabilities,enhancing the information communication mechanism,strengthening internal supervision,improving personnel quality,advancing information technology,and adapting to changes in the external environment.展开更多
With the rapid development of China's social economy,the economy of various regions has rapidly improved.At the same time,people are paying more attention to the issue of farmers' social security.In order to r...With the rapid development of China's social economy,the economy of various regions has rapidly improved.At the same time,people are paying more attention to the issue of farmers' social security.In order to realize the rapid development of regional economy and form a relatively stable social order,there is a need to improve the social security system of farmers so as to ensure that more people acquire basic social security rights.On this basis,based on the background of urbanization,this article studies the social security status of landless farmers in R city,and analyzes the old-age security as well as the medical insurance of landless farmers in R city.展开更多
Personal security is an im- portant human right. There would be no human rights to talk about if personalsecurity, including personal safety, were not safeguarded. So long as a person is in the person's own coun- try...Personal security is an im- portant human right. There would be no human rights to talk about if personalsecurity, including personal safety, were not safeguarded. So long as a person is in the person's own coun- try, there will always be a measure of legal safeguard for the person's interests and personal security, ff the person has his or her rights infringed upon when the person is outside the country, there will be more than one province of judicial jurisdiction over the case, and the subsequent legal remedies for the person, if any, in most cases will not be so timely and easily available as provided under the domestic laws of the person's own country.展开更多
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing th...Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing the color medical images against impostors and invaders.In this paper,an optical medical image security approach is introduced.It is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and security.To confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security metrics.Furthermore,a comparative analysis is introduced between the suggested security approach and other conventional cryptography protocols.The simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly secure.It has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images.展开更多
The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended obj...The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended objective,the study employs the combined procedure of Fuzzy Analytic Network Process(ANP)and Fuzzy Technical for Order Preference by Similarities to Ideal Solution(TOPSIS).We selected fuzzy based decision making techniques for assessing the integrity of medical devices.The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices.Different techniques or the procedures of integrity assessment were ranked according to their satisfaction weights.The rating of the options determined the order of priority for the procedures.As per the findings of the study,among all the options,A1 was assessed to be the most likely option.This means that the integrity of medical devices of A2 is the highest amongst all the chosen alternatives.This analysis will be a corroborative guideline for manufacturers and developers to quantitatively test the integrity of medical devices in order to engineer efficacious devices.The evaluations undertaken with the assistance of the planned procedure are accurate and conclusive.Hence instead of conducting a manual valuation,this experimental study is a better and reliable option for assessing the integrity of the medical devices.展开更多
Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have ...Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have known that IDDs is associated with iodine in the human body,but it is not clear whether IDDs is related to medical resource level.Methods:We collected the number of IDDs cases and an index for the level of medical resource from 31 provinces,autonomous regions and municipalities directly under the central government in China.All data came from the China Statistical Yearbook of Health and Family Planning issued in 2013 by the Peking Union Medical College Publishing House.Data standardization and linear regression analysis were used.Results:The results showed that IDDs correlated with the number of beds in medical and health institutions,number of medical health personnel,number of medical and health institutions,total health expenditure,average health expenditure per capita,medical insurance for urban resident and new rural cooperative medical rural residents(P<0.01).In a multiple linear regression,IDDs was most significantly associated with the number of beds in hospitals,the number of rural health personnel,the number of basic medical and health institutions and government health expenditure for these institutions. Conclusion:Based on the experimental data,we concluded that IDDs had a positive connection with the medical resource level,and basic and rural areas had a more significant association with IDDs.This analysis provides new and explicit ideas for iodine prevention and control work in China.展开更多
As more medical data become digitalized,machine learning is regarded as a promising tool for constructing medical decision support systems.Even with vast medical data volumes,machine learning is still not fully exploi...As more medical data become digitalized,machine learning is regarded as a promising tool for constructing medical decision support systems.Even with vast medical data volumes,machine learning is still not fully exploiting its potential because the data usually sits in data silos,and privacy and security regulations restrict their access and use.To address these issues,we built a secured and explainable machine learning framework,called explainable federated XGBoost(EXPERTS),which can share valuable information among different medical institutions to improve the learning results without sharing the patients’ data.It also reveals how the machine makes a decision through eigenvalues to offer a more insightful answer to medical professionals.To study the performance,we evaluate our approach by real-world datasets,and our approach outperforms the benchmark algorithms under both federated learning and non-federated learning frameworks.展开更多
Health records have played an increasingly important role throughout history as an important legal document for the exercise of individuals’ rights. However, domestic legislation fails to define health records as a l...Health records have played an increasingly important role throughout history as an important legal document for the exercise of individuals’ rights. However, domestic legislation fails to define health records as a legally important collection of health data and documents. Recording facts and storing legally important documents are therefore the tasks of the operator. Using the prescriptive method we will determine which laws are governing the management of medical records, their safety and accessibility. Based on the descriptive method, we will describe the process of handling health records by the provider of health treatment, focusing on exposed regulatory gaps in the area of the protection of the rights of an individual. Through the analysis of the laws governing the management of health records, even after death and operator terminating the service, we will carry out inductive reasoning and provide conclusions regarding the attitude towards health records. Considering different results we can conclude that health information, especially documents relevant to the protection of individual’s rights, is not transparent. Above all, the documents in the collection are not recorded properly, thus allowing for their removal. Even the transfer of health records by the provider of health treatment is not defined, which could result in the disposal of the entire health documentation.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.61762060)Educational Commission of Gansu Province,China(Grant No.2017C-05)+2 种基金Foundation for the Key Research and Development Program of Gansu Province,China(Grant No.20YF3GA016)supported by King Saud University,Riyadh,Saudi Arabia,through Researchers Supporting Project No.RSP-2022/184The work of author Ayman Radwan was supported by FCT/MEC through Programa Operacional Regional do Centro and by the European Union through the European Social Fund(ESF)under Investigator FCT Grant(5G-AHEAD IF/FCT-IF/01393/2015/CP1310/CT0002).
文摘The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection.A trade-off between robustness,imperceptibility,and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability.Keeping this purpose insight,an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern.A key is generated by a random path with minimum bit flipping is selected in the 4 × 4 block to gain access to the data embedding patterns.The random path's complex structure ensures data security.Data of various sizes(8 KB,16 KB,32 KB)are used to analyze image imperceptibility and evaluate quality factors.The proposed reversible watermarking methodology performance is tested under standard structures PSNR,SSIM,and MSE.The results revealed that the MRI watermarked images are imperceptible,like the cover image when LSB is 3 bits plane.Our proposed reversible watermarking methodology outperforms other related techniques in terms of average PSNR(49.29).Experiment results show that the suggested reversible watermarking method improves data embedding capacity and imperceptibility compared to existing state-of-the-art approaches.
基金funded by Dirección General de Investigaciones of Universidad Santiago de Cali under call No.01-2021.
文摘Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques.
基金The authors would like to thank the reviewers and the Associate Editor for their valuable suggestions that helped in improving the quality,readability and presentation of the paper.This work was supported by FCT/MCTES through national funds and when applicable co-funded EU funds under the Project UIDB/50008/2020by the Brazilian National Council for Research and Development(CNPq)via Grants No.431726/2018-3 and 313036/2020-9.
文摘The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters.
文摘In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and educators.In order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities.
文摘This paper provides a comprehensive examination of euthanasia from various perspectives,including medical,legal,religious,philosophical,and moral.The study also explores the public perceptions and trends in Malta.The medical perspective analyses the benefits and risks of euthanasia and its impact on the healthcare system.The legal perspective discusses the legality of euthanasia in Malta and the potential legal implications of legalizing the practice.The religious perspective explores the beliefs of various religious groups in Malta,particularly Catholicism,on euthanasia.The philosophical perspective discusses the ethical and moral considerations of euthanasia.The paper also analyses the results of surveys conducted in Malta,examining the public’s attitudes towards euthanasia.Overall,the study provides a thorough analysis of euthanasia from various angles,shedding light on the complex and controversial nature of the topic.
文摘The basis of the legal protection of resource security is its relative laws, which have four main characteristics, which are foundational, divergent, comprehensive and of long-term social benefits in view. The coordination mechanism of the legal protection of resource security with its relative laws meets the needs of the sustainable development of the economy, society and environment. It also facilitates and is facilitated by the modern transformation of the legal system in China, and upholds the legal system as a logically self-perfecting entity. Furthermore, this coordination bears scientific feasibility.
文摘As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques.
基金This paper was supported by a Korea Institute for the Advancement of Technology(KIAT)grant funded by the Korean government(MOTIE,No.P0008703)by a National Research Foundation of Korea(NRF)grant funded by the Korean government(MSIT,No.2018R1C1B5046760).
文摘The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliable services focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure systemreliabilitywhen using medical convergence environment information in medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.
基金This work is supported by the National Natural Science Foundation of China(Grant 61762060)Educational Commission of Gansu Province,China(Grant 2017C-05)Foundation for the Key Research and Development Program of Gansu Province,China(Grant 20YF3GA016).
文摘In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images.
文摘This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hospital accounting and finance,including an unsound management system,insufficient system implementation,inadequate risk assessment and control capabilities,poor information communication,weak internal supervision,and uneven personnel quality.The reasons for these problems are also analyzed,including outdated management concepts,irrational organizational structures,imperfect training and incentive mechanisms,low levels of information technology,and changes in the external environment.This paper proposes improvement measures for the internal control management of hospital accounting,including enhancing the management system,strengthening system implementation,improving risk assessment and control capabilities,enhancing the information communication mechanism,strengthening internal supervision,improving personnel quality,advancing information technology,and adapting to changes in the external environment.
文摘With the rapid development of China's social economy,the economy of various regions has rapidly improved.At the same time,people are paying more attention to the issue of farmers' social security.In order to realize the rapid development of regional economy and form a relatively stable social order,there is a need to improve the social security system of farmers so as to ensure that more people acquire basic social security rights.On this basis,based on the background of urbanization,this article studies the social security status of landless farmers in R city,and analyzes the old-age security as well as the medical insurance of landless farmers in R city.
文摘Personal security is an im- portant human right. There would be no human rights to talk about if personalsecurity, including personal safety, were not safeguarded. So long as a person is in the person's own coun- try, there will always be a measure of legal safeguard for the person's interests and personal security, ff the person has his or her rights infringed upon when the person is outside the country, there will be more than one province of judicial jurisdiction over the case, and the subsequent legal remedies for the person, if any, in most cases will not be so timely and easily available as provided under the domestic laws of the person's own country.
基金This research was funded by the Deanship of Scientific Research at King Saud University through research group No.(RG-1441-456)(Grantee:MA,https://dsrs.ksu.edu.sa/).
文摘Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing the color medical images against impostors and invaders.In this paper,an optical medical image security approach is introduced.It is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and security.To confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security metrics.Furthermore,a comparative analysis is introduced between the suggested security approach and other conventional cryptography protocols.The simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly secure.It has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images.
基金Funding for this study was granted by the King Abdul-Aziz City for Science and Technology(KACST),Kingdom of Saudi Arabia under the Grant Number:12-INF2970-10.
文摘The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended objective,the study employs the combined procedure of Fuzzy Analytic Network Process(ANP)and Fuzzy Technical for Order Preference by Similarities to Ideal Solution(TOPSIS).We selected fuzzy based decision making techniques for assessing the integrity of medical devices.The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices.Different techniques or the procedures of integrity assessment were ranked according to their satisfaction weights.The rating of the options determined the order of priority for the procedures.As per the findings of the study,among all the options,A1 was assessed to be the most likely option.This means that the integrity of medical devices of A2 is the highest amongst all the chosen alternatives.This analysis will be a corroborative guideline for manufacturers and developers to quantitatively test the integrity of medical devices in order to engineer efficacious devices.The evaluations undertaken with the assistance of the planned procedure are accurate and conclusive.Hence instead of conducting a manual valuation,this experimental study is a better and reliable option for assessing the integrity of the medical devices.
基金supported by the National Natural Science Foundation of China(No.81372125)
文摘Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have known that IDDs is associated with iodine in the human body,but it is not clear whether IDDs is related to medical resource level.Methods:We collected the number of IDDs cases and an index for the level of medical resource from 31 provinces,autonomous regions and municipalities directly under the central government in China.All data came from the China Statistical Yearbook of Health and Family Planning issued in 2013 by the Peking Union Medical College Publishing House.Data standardization and linear regression analysis were used.Results:The results showed that IDDs correlated with the number of beds in medical and health institutions,number of medical health personnel,number of medical and health institutions,total health expenditure,average health expenditure per capita,medical insurance for urban resident and new rural cooperative medical rural residents(P<0.01).In a multiple linear regression,IDDs was most significantly associated with the number of beds in hospitals,the number of rural health personnel,the number of basic medical and health institutions and government health expenditure for these institutions. Conclusion:Based on the experimental data,we concluded that IDDs had a positive connection with the medical resource level,and basic and rural areas had a more significant association with IDDs.This analysis provides new and explicit ideas for iodine prevention and control work in China.
文摘As more medical data become digitalized,machine learning is regarded as a promising tool for constructing medical decision support systems.Even with vast medical data volumes,machine learning is still not fully exploiting its potential because the data usually sits in data silos,and privacy and security regulations restrict their access and use.To address these issues,we built a secured and explainable machine learning framework,called explainable federated XGBoost(EXPERTS),which can share valuable information among different medical institutions to improve the learning results without sharing the patients’ data.It also reveals how the machine makes a decision through eigenvalues to offer a more insightful answer to medical professionals.To study the performance,we evaluate our approach by real-world datasets,and our approach outperforms the benchmark algorithms under both federated learning and non-federated learning frameworks.
文摘Health records have played an increasingly important role throughout history as an important legal document for the exercise of individuals’ rights. However, domestic legislation fails to define health records as a legally important collection of health data and documents. Recording facts and storing legally important documents are therefore the tasks of the operator. Using the prescriptive method we will determine which laws are governing the management of medical records, their safety and accessibility. Based on the descriptive method, we will describe the process of handling health records by the provider of health treatment, focusing on exposed regulatory gaps in the area of the protection of the rights of an individual. Through the analysis of the laws governing the management of health records, even after death and operator terminating the service, we will carry out inductive reasoning and provide conclusions regarding the attitude towards health records. Considering different results we can conclude that health information, especially documents relevant to the protection of individual’s rights, is not transparent. Above all, the documents in the collection are not recorded properly, thus allowing for their removal. Even the transfer of health records by the provider of health treatment is not defined, which could result in the disposal of the entire health documentation.