Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2024
Provably secure and lightweight three-factor authentication scheme for industrial medical CPS
Journal of Information Security and Applications (JISA), Volume 79, Issue Chttps://doi.org/10.1016/j.jisa.2023.103656AbstractCyber-Physical System (CPS) is a multidimensional complex system that integrates computing, network, and physical environment, which is widely used to promote the upgrading of industrial production and technology. Recently, the application of ...
- research-articleMarch 2024
Secure transmission of medical images in multi-cloud e-healthcare applications using data hiding scheme
- K. Jyothsna Devi,
- Priyanka Singh,
- Jatindra Kumar Dash,
- Hiren Kumar Thakkar,
- Sudeep Tanwar,
- Abdulatif Alabdulatif
Journal of Information Security and Applications (JISA), Volume 79, Issue Chttps://doi.org/10.1016/j.jisa.2023.103655AbstractIn recent years, medical image transmission using a multi-cloud system has played a significant role in e-Healthcare infrastructure. It allows medical practitioners to easily store, retrieve, and share patients’ medical information across ...
- research-articleMarch 2024
Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression
Journal of Information Security and Applications (JISA), Volume 79, Issue Chttps://doi.org/10.1016/j.jisa.2023.103628AbstractImages are promising information carriers when compared to other media documents in the healthcare domain. However, digital data transmission over unprotected wired or wireless networks poses a threat to the security of healthcare systems. As a ...
Highlights- A biometric image feature based secure data hiding technique is proposed.
- Joint encryption-compression methods are used to enhance security of medical images.
- This method is highly imperceptible, secure and successfully resists ...
Display Omitted
- research-articleNovember 2023
Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment
Journal of Information Security and Applications (JISA), Volume 78, Issue Chttps://doi.org/10.1016/j.jisa.2023.103626AbstractThe cloud-based sharing of electronic health data (EHDs) has great significance in researching diseases, doctors’ diagnoses and various fields. In this paper, we applied the potentiality of both blockchain and public key searchable encryption to ...
- research-articleNovember 2023
Privacy-preserving model for biometric-based authentication and Key Derivation Function
Journal of Information Security and Applications (JISA), Volume 78, Issue Chttps://doi.org/10.1016/j.jisa.2023.103624AbstractBio-cryptosystems often save the biometric template for authentication and generally employ randomly generated keys to encrypt and sign data. This method raises privacy protection concerns. Furthermore, for a system secured by the usage of a ...
-
- review-articleNovember 2023
Insights into security and privacy issues in smart healthcare systems based on medical images
Journal of Information Security and Applications (JISA), Volume 78, Issue Chttps://doi.org/10.1016/j.jisa.2023.103621AbstractThe advent of the fourth industrial revolution along with developments in other emerging technologies, such as Internet of Things, big data, artificial intelligence as well as cloud and quantum computing, smart healthcare systems (SHS) are ...
- research-articleNovember 2022
Reversible data hiding with enhancing contrast and preserving brightness in medical image
Journal of Information Security and Applications (JISA), Volume 70, Issue Chttps://doi.org/10.1016/j.jisa.2022.103324AbstractWith the development of telemedicine and medical sharing, private information which stored in the cloud may be disclosed. In order to protect the private information of patients and improve the quality of medical image further, there are some ...
- research-articleNovember 2022
Implementation of face recognition system using BioCryptosystem as template protection scheme
Journal of Information Security and Applications (JISA), Volume 70, Issue Chttps://doi.org/10.1016/j.jisa.2022.103317AbstractThis paper has designed and implemented a secure face recognition system using novel Bio-Cryptographic template protection schemes. The implementation of the proposed system has been divided into three components. The face regions are ...
- research-articleSeptember 2022
A consumer-centered security framework for sharing health data in social networks
Journal of Information Security and Applications (JISA), Volume 69, Issue Chttps://doi.org/10.1016/j.jisa.2022.103303Highlights- We proposed a framework for securely sharing healthcare consumer information with healthcare team in social networks.
Healthcare consumers should have control over their shared health data in social networks and cloud-based systems through specifying their data protection policies, and preventing unauthorized data access and ...
- research-articleAugust 2022
A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things
Journal of Information Security and Applications (JISA), Volume 68, Issue Chttps://doi.org/10.1016/j.jisa.2022.103259AbstractMedical Internet of Things (MIoT) is an emerging area of IoT comprising of wearable sensor nodes having low-powered processors. Wearable nodes gather the physiological data of a patient and transmit this real-time information to the ...
- research-articleMay 2022
Privacy preservation using game theory in e-health application
Journal of Information Security and Applications (JISA), Volume 66, Issue Chttps://doi.org/10.1016/j.jisa.2022.103158AbstractIn new e-health applications, the ubiquitous nature of intelligent devices raises legitimate questions about peoples’ privacy, and how to cope with the heterogeneity of user and application requirements in terms of security services. ...
- research-articleMay 2022
A blockchain-based keyword search scheme with dual authorization for electronic health record sharing
Journal of Information Security and Applications (JISA), Volume 66, Issue Chttps://doi.org/10.1016/j.jisa.2022.103154AbstractElectronic health record is an electronic file that records people’s medical treatment and physical examination information in an all-around way which is an important branch of building a smart medical system. The sharing of electronic ...
Graphical abstractDisplay Omitted
Highlights- Certificateless dual authorization. We use the certificateless cryptosystem to avoid certificate management and key escrow issues in the traditional ...
- research-articleMarch 2022
Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract
Journal of Information Security and Applications (JISA), Volume 65, Issue Chttps://doi.org/10.1016/j.jisa.2022.103117AbstractNo doubt that medical data sharing is very crucial but important in realizing cross-hospital diagnosis and improving research development. In traditional mechanisms, there always exists a tradeoff between correctness of medical data ...
- research-articleMarch 2022
An efficient robust zero watermarking scheme for diffusion tensor-Magnetic resonance imaging high-dimensional data
Journal of Information Security and Applications (JISA), Volume 65, Issue Chttps://doi.org/10.1016/j.jisa.2021.103106AbstractThe majority of copyright protection scheme are focused on 2D medical images, with only few being proposed for the copyright protection of complex medical data, especially for Diffusion tensor-Magnetic resonance imaging (DT-MRI). We ...
- research-articleDecember 2021
An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring
Journal of Information Security and Applications (JISA), Volume 63, Issue Chttps://doi.org/10.1016/j.jisa.2021.102992AbstractThe progressive development in online healthcare monitoring may facilitate better service for recovered patients from some pandemic diseases like the novel Covid-19 and even in well-known diseases such as cancer, heart attack, and many ...
- research-articleSeptember 2021
A privacy protection scheme for telemedicine diagnosis based on double blockchain
Journal of Information Security and Applications (JISA), Volume 61, Issue Chttps://doi.org/10.1016/j.jisa.2021.102845AbstractWith the development of the electronic healthcare industry, telemedicine diagnosis (TMD) has become a more flexible and convenient way. In the general remote diagnosis scheme, the collected medical data is stored in the cloud which may ...
- research-articleApril 2020
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems
Journal of Information Security and Applications (JISA), Volume 51, Issue Chttps://doi.org/10.1016/j.jisa.2020.102453AbstractCloud-based medical cyber-physical system (MCPS) is attracting more and more attention, since it can break through the limitations of time, space and object, and allow doctors to make accurate telemedicine diagnosis for patients. ...
- research-articleFebruary 2020
Blockchain-based electronic healthcare record system for healthcare 4.0 applications
Journal of Information Security and Applications (JISA), Volume 50, Issue Chttps://doi.org/10.1016/j.jisa.2019.102407AbstractModern healthcare systems are characterized as being highly complex and costly. However, this can be reduced through improved health record management, utilization of insurance agencies, and blockchain technology. Blockchain was first ...
- research-articleAugust 2019
A reformed grasshopper optimization with genetic principle for securing medical data
Journal of Information Security and Applications (JISA), Volume 47, Issue CPages 410–420https://doi.org/10.1016/j.jisa.2019.05.007AbstractCloud computing is an emerging computing technology that uses the internet and central remote servers to sustain data and applications. Using cloud computing, users can access database resources through internet from anywhere without ...
- research-articleAugust 2019
The language of biometrics: Analysing public perceptions
Journal of Information Security and Applications (JISA), Volume 47, Issue CPages 112–119https://doi.org/10.1016/j.jisa.2019.05.001AbstractThere is an increasing shift in technology towards biometric solutions, but one of the biggest barriers to widespread use is the acceptance by the users. In this paper we investigate the understanding, awareness and acceptance of ...