PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Enhancing medical data security in e-Health systems using biometric-based watermarking

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In the field of Electronic Health (e-Health), Electronic Health Records (EHR) are transmitted between health professionals using e-Health systems for cooperative medical practice, medical monitoring, telemedical expertise, and telemedical imaging. Medical images are a crucial component of EHR and are used in various aspects of telemedicine systems such as expertise, consultation, teaching, and research. However, protecting the authenticity and copyrights of medical images is essential to prevent duplication, modification, or unauthorized distribution. This paper proposes a robust medical image copyright protection method that uses patient palm-print template as watermark and Lorenz chaotic map for template concealing and selecting the appropriate embedding positions in medical images. The novelty of the method lies in optimizing the expected number of modifications per pixel of the medical images after being watermarked. Experimental results indicate that this approach has a high performance with a genuine accept rate of 99.86% and can withstand various image processing attacks, including Gaussian noise, compression, and image rotations, while ensuring personal data security during telemedicine data exchange.
Rocznik
Strony
28--55
Opis fizyczny
Bibliogr. 25 poz., fig., tab.
Twórcy
  • University of Echahid Cheikh Larbi Tebessi, LAboratory of Mathematics, Informatics and Systems (LAMIS), Algeria
  • University of Echahid Cheikh Larbi Tebessi, LAboratory of Mathematics, Informatics and Systems (LAMIS), Algeria
  • University of Echahid Cheikh Larbi Tebessi, LAboratory of Mathematics, Informatics and Systems (LAMIS), Algeria
  • University of Echahid Cheikh Larbi Tebessi, LAboratory of Mathematics, Informatics and Systems (LAMIS), Algeria
Bibliografia
  • [1] Anand, A., Singh, A. K. (2020). An improved DWT–SVD domain watermarking for medical information security. Computer Communications, 152, 72–80. https://doi.org/10.1016/j.comcom.2020.01.038
  • [2] Aparna, P., Kishore, P. V. V. (2019). Biometric-based efficient medical image watermarking in e-healthcare application. IET Image Processing, 13(3), 409-548. https://doi.org/10.1049/iet-ipr.2018.5288
  • [3] Bendib, I., Meraoumia, A., Haouam, M. Y., & Laimeche, L. (2022). A new cancelable deep biometric feature using chaotic maps. Pattern Recognition and Image Analysis, 32(1), 109-128. https://doi:10.1134/S1054661821040052
  • [4] Bervell, B., & Al-Samarraie, H. (2019). A comparative review of mobile health and electronic health utilization in sub-Saharan African countries. Social Science and Medicine, 232, 1-16. https://doi.org/10.1016/j.socscimed.2019.04.024
  • [5] Cedillo-Hernandez, M., Cedillo-Hernandez, A., Nakano-Miyatake, M., Perez-Meana, H. (2020). Improving the management of medical imaging by using robust and secure dual watermarking. Biomedical Signal Processing Control, 56, 101695. https://doi.org/10.1016/j.bspc.2019.101695
  • [6] Fares, K., Khaldi, A., Redouane, K., Salah, E. (2021). DCT & DWT based watermarking scheme for medical information security. Biomedical Signal Processing Control, 66, 102403. https://doi.org/10.1016/j.micpro.2021.104134
  • [7] Ghouzali, S., Nafea, O., Wadood, A., Hussain, M. (2021). Cancelable multimodal biometrics based on chaotic maps. Applied Sciences, 11(18), 8573. https://doi.org/10.3390/app11188573
  • [8] Haouam, M. Y., Meraoumia, A., Laimeche, L., Bendib, I. (2021). S-DCTNet: Security-oriented biometric feature extraction technique. Multimedia Tools Applications, 80, 36059–36091, https://doi.org/10.1007/s11042-021-10936-7
  • [9] Idoga, P. E., Agoyi, M. E., Coker-Farrell, Y., & Ekeoma, O. L. (2016). Review of security issues in e-healthcare and solutions. International Symposium on High Capacity Optical Networks and Enabling Technologies (2016 HONET-ICT) (pp. 118-121). IEEE. https://doi.org/10.1109/HONET.2016.7753433
  • [10] Jain, J., Jain, A., Srivastava, S. K., Verma, C., Raboaca, M. S., & Illés, Z. (2022). Improved security of e-healthcare images using hybridized robust zero-watermarking and hyper-chaotic system along with RSA. Mathematics, 10(7), 1071. https://doi.org/10.3390/math10071071
  • [11] Joshi, M., Joshi, K. P., & Finin, T. (2018). Attribute based encryption for secure access to cloud based EHR systems. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 932-935). IEEE. https://doi.org/10.1109/CLOUD.2018.00139
  • [12] Kang, G., & Kim, Y. G. (2022). Secure collaborative platform for health care research in an open environment: perspective on accountability in access control. Journal Medical Internet Research, 24(10), e37978. https://doi.org/10.2196/37978
  • [13] Krishnan, C., & Lalitha, T. (2020). Securing healthcare data using attribute based encryption techniques in cloud environment. European Journal of Molecular & Clinical Medicine, 7(11), 6271-6280.
  • [14] Laimeche, L., Meraoumia, A., & Bendjenna, H. (2020). Enhancing LSB embedding schemes using chaotic maps systems. Neural Computing & Applications, 32(21), 16605–16623. https://doi:10.1007/s00521-019-04523-z
  • [15] Laimeche, L., Merouani, F. H., Smain, M. (2016). A new binary similarity metric for two LSB steganalysis. 2016 International Conference on Information Technology for Organizations Development (IT4OD) (pp. 1-7). IEEE. https://doi.org/10.1109/IT4OD.2016.7479313
  • [16] Mohan, P. H. (2020). Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Future Generation Computer System, 111, 213–225. https://doi.org/10.1016/j.future.2020.04.034
  • [17] Murillo-Escobar, M. A., Cruz-Hernández, C., Abundiz-Pérez, F., & López-Gutiérrez, R. M. (2016). Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocessors and Microsystems, 45, 297-309. https://doi.org/10.1016/j.micpro.2016.06.004
  • [18] Pallaw, V. K., Singh, K. U., Kumar, A., Singh, T., Swarup, C., & Goswami, A. (2023). A robust medical image watermarking scheme based on nature-inspired optimization for telemedicine applications. Electronics, 12(2), 334. https://doi.org/10.3390/electronics12020334
  • [19] Roslan, R., & Jamil, N. (2012). Texture feature extraction using 2-D Gabor Filters. International Symposium on Computer Applications and Industrial Electronics (ISCAIE) (pp. 173-178). IEEE. https://doi.org/10.1109/ISCAIE.2012.6482091
  • [20] Tertulino, R., Antunes, N., & Morais, H. (2022). Privacy in electronic health records: a systematic mapping study. Journal of Public Health, 32, 435-454. https://doi.org/10.1007/s10389-022-01795-z
  • [21] Tsou, C., Robinson, S., Boyd, J., Jamieson, A., Blakeman, R., Yeung, J., McDonnell, J., Waters, S., Bosich, K., & Hendrie, D. (2021). Effectiveness of telehealth in rural and remote emergency departments: systematic review. Journal of Medical Internet Research, 23(11), e30632. https://doi: 10.2196/30632
  • [22] Vaidya, S. P. (2022). Fingerprint-based robust medical image watermarking in hybrid transform. The Visual Computer, 39, 2245-2260. https://doi.org/10.1007/s00371-022-02406-4
  • [23] Wadood, A., Nafea, O., Ghouzali, S. (2020). Combining watermarking and hyper-chaotic map to enhance the security of stored biometric templates. The Computer Journal, 63(3), 479-493. https://doi.org/10.1093/comjnl/bxz047
  • [24] Ye, C., & Chen, C. (2022). Secure medical image sharing for smart healthcare system based on cellular neural network. Complex Intelligent Systems, 9, 1653-1670. https://doi.org/10.1007/s40747-022-00881-9
  • [25] Zulfiqar, A., Muhammad, I., Mansour, A., Tanveer, Z., Muhammad, S. (2018). A zero-watermarking algorithm for privacy protection in biomedical signals. Future Generation Computer Systems, 82, 290-303. https://doi.org/10.1016/j.future.2017.12.007
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-09c1636a-a5d7-4ff7-a367-ad83d510eaaa
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.