3.9 Review

Intelligent Security and Privacy of Electronic Health Records using Biometric Images

Journal

CURRENT MEDICAL IMAGING REVIEWS
Volume 15, Issue 4, Pages 386-394

Publisher

BENTHAM SCIENCE PUBL LTD
DOI: 10.2174/1573405615666181228121535

Keywords

Cloud computing; digital watermarking; electronic health record; biometric images; fingerprint; Fast Discrete Curvelet Transform (FDCT); Singular Value Decomposition (SVD)

Funding

  1. Prince Mohammad Bin Fahd University

Ask authors/readers for more resources

Background: In the presence of Cloud Environment and the migration of Electronic Health Systems and records to the Cloud, patient privacy has become an emergent problem for healthcare institutions. Government bylaws, electronic health documentation, and innovative internet health services generate numerous security issues for healthcare conformity and information security groups. To deal with these issues, healthcare institutes must protect essential IT infrastructure from unauthorized use by insiders and hackers. The Cloud Computing archetype allows for E-Health methods that improve the features and functionality of systems on the cloud. On the other hand, sending patients' medical information and records to the Cloud entails a number of risks in the protection and privacy of the health records during the communication process. Aim: In this paper, a solution is proposed for the security of Electronic Health Records (EHRs) in cloud environment during the process of sending the data to the cloud. In addition, the proposed method uses biometric images that allow for unified patient identification across cloud-based EHRs and across medical institutions. Method: To protect the privacy of patients' information and streamline the migration process, a watermarking-based method is proposed for health care providers to ensure that patients' data are only accessible to authorized personnel. Patients' information, such as name, id, symptoms, diseases, and previous history, is secured in biometric images of patients as an encrypted watermark. Results: Quality and impeccability analysis and robustness were performed to test the proposed method. The PSNR values show that the proposed method produced excellent results. Conclusion: The robustness and impressibility of the proposed method were tested by subjecting the watermarked images to different simulated attacks. The watermarks were largely impermeable to varied and repeated attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.9
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available