Applications of data hiding techniques in medical and healthcare systems: a survey

被引:15
|
作者
Sajedi H. [1 ]
机构
[1] Department of Mathematics, Statistics and Computer Science, College of Science, University of Tehran, Tehran
关键词
Healthcare; Information hiding; Medical application; Security; Steganography; Watermarking;
D O I
10.1007/s13721-018-0169-x
中图分类号
学科分类号
摘要
Nowadays, scientists make effort to provide security for the communication channels. Several security and privacy threats are introduced via the Internet as the major communication channel. Therefore, information exchanging through the Internet should be protected and secured. Now healthcare systems are getting very common in the world. A health care system should preserve privacy while sending patients’ information, prevent the patients’ information from tampering, and prevent any sabotage in the healthcare systems. Therefore, it is crucial to provide security in such systems to attract the confidence of people for using the Internet (network)-based health care systems. In this respect, the goal of this paper is to review the accessories to provide security in healthcare systems. Our objective is to state the achievements of a literature review regarding the security of health care systems provided by information hiding methods including cryptography, steganography and watermarking methods. Furthermore, discussion about these methods, the media employed in these methods such as medical images and biomedical signals, their pros and cons and the applications in healthcare systems are provided. Correspondingly, we share the visions into the open research problems and highlight future directions in this extent. © 2018, Springer-Verlag GmbH Austria, part of Springer Nature.
引用
收藏
相关论文
共 50 条
  • [1] A Survey on Medical Images for Reversible Data Hiding Techniques
    Bhagat, Deepali
    Bhardwaj, Rupali
    [J]. PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 811 - 817
  • [2] Secure data hiding techniques: a survey
    Singh, Laxmanika
    Singh, A. K.
    Singh, P. K.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 15901 - 15921
  • [3] Survey on LSB Data Hiding Techniques
    Jois, Aakaash
    Tejaswini, L.
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 656 - 660
  • [4] A Recent Survey On Data Hiding Techniques
    Singh, Sandeep
    Singh, Amit Kumar
    Ghrera, S. P.
    [J]. 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 882 - 886
  • [5] Survey on Reversible Data Hiding Techniques
    Rathika, R.
    Kumaresan, S.
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [6] Survey on Reversible Data Hiding Techniques
    Manju, M.
    Kavitha, V.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 297 - 305
  • [7] Secure data hiding techniques: a survey
    Laxmanika Singh
    A. K. Singh
    P. K. Singh
    [J]. Multimedia Tools and Applications, 2020, 79 : 15901 - 15921
  • [8] Techniques and applications of intelligent multimedia data hiding
    Huang, Hsiang-Cheh
    Fang, Wai-Chi
    [J]. TELECOMMUNICATION SYSTEMS, 2010, 44 (3-4) : 241 - 251
  • [9] Techniques and applications of intelligent multimedia data hiding
    Hsiang-Cheh Huang
    Wai-Chi Fang
    [J]. Telecommunication Systems, 2010, 44 : 241 - 251
  • [10] Intelligent multimedia data hiding techniques and applications
    Huang, Hsiang-Cheh
    Fang, Wai-Chi
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 477 - +