Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems
暂无分享,去创建一个
[1] Mazdak Zamani,et al. Integration of chaotic map and confusion technique for color medical image encryption , 2010, 6th International Conference on Digital Content, Multimedia Technology and its Applications.
[2] Costas Lambrinoudakis,et al. A security architecture for interconnecting health information systems , 2004, Int. J. Medical Informatics.
[3] Zahir Tari,et al. Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.
[4] U. Rajendra Acharya,et al. Reliable and robust transmission and storage of medical images with patient information , 2004, 2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04..
[5] Gunther Eysenbach,et al. Consumer health informatics , 2000, BMJ : British Medical Journal.
[6] William M. Tierney,et al. Designing a System for Patients Controlling Providers’ Access to their Electronic Health Records: Organizational and Technical Challenges , 2014, Journal of General Internal Medicine.
[7] M. Mrinalni Vaknishadh,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .
[8] Mary Alice Hanken PhD Chps Rhia,et al. Health Information: Management of a Strategic Resource , 2007 .
[9] Huan Liu,et al. Big Data Drives Cloud Adoption in Enterprise , 2013, IEEE Internet Computing.
[10] Yicong Zhou,et al. A lossless encryption method for medical images using edge maps , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[11] John Doucette,et al. Adopting electronic medical records in primary care: Lessons learned from health information systems implementation experience in seven countries , 2009, Int. J. Medical Informatics.
[12] Ross Anderson,et al. Security in Clinical Information Systems , 1996 .
[13] Parmida Moradi Birgani,et al. Chaos-Based Medical Image Encryption Using Symmetric Cryptography , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.
[14] Haralambos Mouratidis,et al. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems , 2003, CAiSE.
[15] Karen Witting. Health Information Exchange: Integrating the Healthcare Enterprise (IHE) , 2015 .