Skip to main content

Security in Digital Healthcare System

  • Chapter
  • First Online:
Pervasive Healthcare

Abstract

In this modern and technological world, medical field has also enhanced and digitized itself to help patients and medical professionals as per the need of the time. Most of the time, patients do not have serious medical problems. They only need some expert suggestions from a medical professional. In these times of crisis, medical professionals can help such patients via telecommunications. In serious medical conditions also, telecommunication plays an important role in helping patients as well as medicos. Thus, in the field of healthcare, conventional diagnostic methods are gradually being taken over by digital mode of diagnostics. Almost every component of medical field is in the process of digitization. This digital data can be used at convenient stages for the diagnosis of patients in the form of a patient medical record digitally stored over the Internet. Further, these medical data can also be used to predict future disease in patients and advise accordingly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barni, M., Bartolini, F., Cappellini, B., & Piva, A. (1998). DCT domain system for robust image watermarking. Signal Processing, 66, 357–372.

    Article  Google Scholar 

  2. Madhu, B., Holi, G., & Srikanta Murthy, K. (2016). An overview of image security techniques. International Journal of Computer Applications, 154(6), 37–46.

    Article  Google Scholar 

  3. Fraser, S. I., Allen, A. R.. (2012). A high capacity reversible watermarking techniques based on difference expansion. In: Proceedings of signal and image processing SIP-2008, Kailua-Kona, HI, USA.

    Google Scholar 

  4. Khanna, A. K., Roy, N. R., & Verma, B. (2016). Digital image watermarking and its optimization using genetic algorithm. In International conference on computing, communication and automation (ICCCA). IEEE.

    Google Scholar 

  5. Rao, R. S. P., & Kumar, P. R. (2016). An efficient genetic algorithm based gray scale digital image watermarking for improving the robustness and imperceptibility. In International conference on electrical, electronics, and optimization techniques (ICEEOT). IEEE.

    Google Scholar 

  6. Takore, T. T., Rajesh Kumar, P., & Lavanya Devi, G. (2016). Efficient gray image watermarking algorithm based on DWT-SVD using genetic algorithm. In International conference on information communication and embedded systems (ICICES). IEEE.

    Google Scholar 

  7. Giakoumaki, S., & Pavlopulos, D. K. (2011). Multiple image watermarking applied to health information management. IEEE Transactions on Information Technology in Bio-Medicine, 10, 4.

    Google Scholar 

  8. Baaziz, N., Zheng, D., & Wang, D. (2011). Image quality assessment based on multiple watermarking approach. In IEEE 13th international workshop on multimedia signal processing (MMSP) (pp. 1–5). IEEE.

    Google Scholar 

  9. Usman, A. K. (2010). BCH coding and intelligent watermark embedding: Employing both frequency and strength selection. Applied Soft Computing, 10(1), 332–343.

    Article  MathSciNet  Google Scholar 

  10. Karras, D. A. (2005). A second order spread spectrum modulation scheme for wavelet based low error probability digital image watermarking. ICGST International Journal on Graphics, Vision and Image Processing, 3, 5.

    Google Scholar 

  11. Hai-mei, S., Tian-can, M., & Qian-ging, Q. (2004). Spread spectrum watermark based on wavelet transform for still digital image. Wuhan University Journal of Natural Sciences, 9(2), 203–208.

    Article  Google Scholar 

  12. Enayatifar, R., & Abdullah, A. H. (2014). Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering, 56, 83–93.

    Article  Google Scholar 

  13. Bhandari, K., Mitra, S. K., & Jadhav, A. (2005). A hybrid approach to digital image watermarking using singular value decomposition and spread spectrum. In International conference on pattern recognition and machine intelligence, PReMI-05 (pp. 447–452). IEEE.

    Chapter  Google Scholar 

  14. Tripathi, M. M. (2018). Designing a model to improve medical image watermarking. PhD Thesis, TMU Moradabad.

    Google Scholar 

  15. Priego, B., Souto, D., Peña, F. L., & Duro, R. J. (2011). An ANN based hyperspectral waterway control and security system. In IEEE international conference on computational intelligence for measurement systems and applications (CIMSA) proceedings. IEEE.

    Google Scholar 

  16. Kishore, P. V. V., Sai Prajwal, K., Kamal Mohan, M., Koteswarao, S. (2015) Medical image watermarking with ANN in wavelet domain. IEEE International Conference on Electronics,Computing and Communication Technologies (CONECCT).

    Google Scholar 

  17. Khanna, A. K., Roy, N. R., Verma, B. (2016) Digital image watermarking and its optimization using genetic algorithm. International Conference on Computing, Communication and Automation (ICCCA).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manish Madhava Tripathi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Tripathi, M.M., Haroon, M., Khan, Z., Husain, M.S. (2022). Security in Digital Healthcare System. In: Husain, M.S., Adnan, M.H.B.M., Khan, M.Z., Shukla, S., Khan, F.U. (eds) Pervasive Healthcare. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-77746-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-77746-3_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-77745-6

  • Online ISBN: 978-3-030-77746-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics