Biomedical Information Technology 2008
DOI: 10.1016/b978-012373583-6.50015-3
|View full text |Cite
|
Sign up to set email alerts
|

Data Security and Protection for Medical Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…However, the lack or inefficiency of information security planning makes it challenging to identify cybersecurity. This inefficiency also requires tools and methodologies to minimize cybersecurity consequences, which can cause large-scale damage to business sustainability [20].…”
Section: −1mentioning
confidence: 99%
See 1 more Smart Citation
“…However, the lack or inefficiency of information security planning makes it challenging to identify cybersecurity. This inefficiency also requires tools and methodologies to minimize cybersecurity consequences, which can cause large-scale damage to business sustainability [20].…”
Section: −1mentioning
confidence: 99%
“…This context requires preventive actions and security tools due to the sensitive data in healthcare systems such as digital signatures, professional credentials, financial data, patient diagnostic images, among others [19]. It is worth mentioning that this concern becomes even more complex when considering cyberattacks, especially due to the different interactions that occur on the Internet [20]. Furthermore, failure to comply with legal regulations may result in financial or criminal penalties [21,22].…”
Section: Introductionmentioning
confidence: 99%
“…To address the issue, a number of methods have been proposed in the literature [19,20]: (1) increasing block dimension, (2) including block indices in the signature, (3) including image indices in the signature, and (4) breaking block-wise independency. In our work, in order for the scheme to resist VQ attacks we used a pseudo-random and different Key1 for each block.…”
Section: B Integrity Verification Algorithmmentioning
confidence: 99%
“…To preserve the confidentiality of medical data, cryptographic techniques can be adopted. In the history of medical data privacy, many cryptographic algorithms have been employed to prevent security breaches [4]. However, novel solutions are to be proposed to challenge the attacking scenarios.…”
Section: Introductionmentioning
confidence: 99%