Javascript must be enabled to continue!
Secure Medical Data Transmission In Mobile Health Care System Using Medical Image Watermarking Techniques
View through CrossRef
Medical information is maintained in a digital format, like scanned images
along with patient information. In the mobile health care system, digitized medical
information is transmitted to remote specialists for diagnosis purposes. The remote
specialists verify the patient medical information using mobile or other devices and
suggest the treatment. During medical data transmission, through unsecured media,
there is a chance to modify the medical data by the attacker. It leads to the wrong
diagnosis and affects the patient's entire life. So there is a need for secure medical data
transmission in mobile healthcare to protect medical information from unauthorized
users or intruders. The medical image watermarking technique is required to protect
medical information in mobile healthcare. To withstand various medical image
watermarking attacks, this chapter discusses two different types of robust medical
image watermarking techniques in mobile healthcare. First, an intelligent-based
medical image watermarking technique is discussed to protect the medical data in a
secured manner during the electronic patient information embedding part. After
embedding the patient information in the medical image, the generated watermarked
medical image looks like an original medical image. So the attacker knows the visual
existence of the medical data during its transmission. To avoid this, the second
technique, i.e., the visual medical image encryption technique, is discussed. The mobile
healthcare system uses the intelligent medical image watermarking technique and
visual medical image encryption for the secure transmission of medical information. <br>
BENTHAM SCIENCE PUBLISHERS
Title: Secure Medical Data Transmission In Mobile Health Care System Using Medical Image Watermarking Techniques
Description:
Medical information is maintained in a digital format, like scanned images
along with patient information.
In the mobile health care system, digitized medical
information is transmitted to remote specialists for diagnosis purposes.
The remote
specialists verify the patient medical information using mobile or other devices and
suggest the treatment.
During medical data transmission, through unsecured media,
there is a chance to modify the medical data by the attacker.
It leads to the wrong
diagnosis and affects the patient's entire life.
So there is a need for secure medical data
transmission in mobile healthcare to protect medical information from unauthorized
users or intruders.
The medical image watermarking technique is required to protect
medical information in mobile healthcare.
To withstand various medical image
watermarking attacks, this chapter discusses two different types of robust medical
image watermarking techniques in mobile healthcare.
First, an intelligent-based
medical image watermarking technique is discussed to protect the medical data in a
secured manner during the electronic patient information embedding part.
After
embedding the patient information in the medical image, the generated watermarked
medical image looks like an original medical image.
So the attacker knows the visual
existence of the medical data during its transmission.
To avoid this, the second
technique, i.
e.
, the visual medical image encryption technique, is discussed.
The mobile
healthcare system uses the intelligent medical image watermarking technique and
visual medical image encryption for the secure transmission of medical information.
<br>.
Related Results
Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
The illegal act of digital multimedia data loss the value of information and integrity. The loss of information and integrity born the process of piracy of digital data. The piracy...
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Abstract
In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the express...
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, ill...
Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking
Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking
<p>Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content a...
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
PurposeMobile technologies offer the opportunity to embed learning in a natural environment. The objective of the study is to examine how the usage of mobile phones for m‐learning ...
Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis
Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermark...
Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on ...

