Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Secure Medical Data Transmission In Mobile Health Care System Using Medical Image Watermarking Techniques

View through CrossRef
Medical information is maintained in a digital format, like scanned images along with patient information. In the mobile health care system, digitized medical information is transmitted to remote specialists for diagnosis purposes. The remote specialists verify the patient medical information using mobile or other devices and suggest the treatment. During medical data transmission, through unsecured media, there is a chance to modify the medical data by the attacker. It leads to the wrong diagnosis and affects the patient's entire life. So there is a need for secure medical data transmission in mobile healthcare to protect medical information from unauthorized users or intruders. The medical image watermarking technique is required to protect medical information in mobile healthcare. To withstand various medical image watermarking attacks, this chapter discusses two different types of robust medical image watermarking techniques in mobile healthcare. First, an intelligent-based medical image watermarking technique is discussed to protect the medical data in a secured manner during the electronic patient information embedding part. After embedding the patient information in the medical image, the generated watermarked medical image looks like an original medical image. So the attacker knows the visual existence of the medical data during its transmission. To avoid this, the second technique, i.e., the visual medical image encryption technique, is discussed. The mobile healthcare system uses the intelligent medical image watermarking technique and visual medical image encryption for the secure transmission of medical information.&nbsp;<br>
Title: Secure Medical Data Transmission In Mobile Health Care System Using Medical Image Watermarking Techniques
Description:
Medical information is maintained in a digital format, like scanned images along with patient information.
In the mobile health care system, digitized medical information is transmitted to remote specialists for diagnosis purposes.
The remote specialists verify the patient medical information using mobile or other devices and suggest the treatment.
During medical data transmission, through unsecured media, there is a chance to modify the medical data by the attacker.
It leads to the wrong diagnosis and affects the patient's entire life.
So there is a need for secure medical data transmission in mobile healthcare to protect medical information from unauthorized users or intruders.
The medical image watermarking technique is required to protect medical information in mobile healthcare.
To withstand various medical image watermarking attacks, this chapter discusses two different types of robust medical image watermarking techniques in mobile healthcare.
First, an intelligent-based medical image watermarking technique is discussed to protect the medical data in a secured manner during the electronic patient information embedding part.
After embedding the patient information in the medical image, the generated watermarked medical image looks like an original medical image.
So the attacker knows the visual existence of the medical data during its transmission.
To avoid this, the second technique, i.
e.
, the visual medical image encryption technique, is discussed.
The mobile healthcare system uses the intelligent medical image watermarking technique and visual medical image encryption for the secure transmission of medical information.
&nbsp;<br>.

Related Results

Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
The illegal act of digital multimedia data loss the value of information and integrity. The loss of information and integrity born the process of piracy of digital data. The piracy...
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Abstract In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the express...
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, ill...
Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking
Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking
<p>Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content a...
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
PurposeMobile technologies offer the opportunity to embed learning in a natural environment. The objective of the study is to examine how the usage of mobile phones for m‐learning ...
Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis
Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermark...
Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on ...

Back to Top