The techniques of securing imaging data in medical system
Over the years, the technology evolution has brought a huge change on the people daily life, however, it is undeniable that some vulnerabilities have also been arisen. The cyber-attacks and cyber threats are always the main challenge of cybersecurity. The unsecure network causes the data leakage, da...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
IEEE
2020
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/28766/1/The%20techniques%20of%20securing%20imaging%20data%20in%20medical%20system.pdf http://umpir.ump.edu.my/id/eprint/28766/2/The%20techniques%20of%20securing%20imaging%20data%20in%20medical%20system_FULL.pdf http://umpir.ump.edu.my/id/eprint/28766/ https://doi.org/10.1109/ICEEE49618.2020.9102516 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.ump.umpir.28766 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.287662022-01-07T08:17:05Z http://umpir.ump.edu.my/id/eprint/28766/ The techniques of securing imaging data in medical system Sian, Soo M. Chung, Loh W. Mohd Fazrul, I. J. Nur Shahida, I. M.A. Nurul Suzulyana, Z. Nur Haziqah, Z. A. Syifak Izhar, Hisham HV Social pathology. Social and public welfare QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering Over the years, the technology evolution has brought a huge change on the people daily life, however, it is undeniable that some vulnerabilities have also been arisen. The cyber-attacks and cyber threats are always the main challenge of cybersecurity. The unsecure network causes the data leakage, data theft and data interception that affect the data integrity. In the healthcare sector, the medical images are the important records for the organization to detect and diagnose the disease. Hence, the confidentiality of the medical images needs to be ensured to assure the integrity of the data. The techniques that are used to enhance the security and integrity of the medical images include cryptography, steganography and digital watermarking to prevent the medical images from being modified and the techniques can also be used for authentication in which the content of the medical images can be viewed only by the authorized person. This paper will describe the techniques used in medical image for security and integrity purposes, moreover, it will propose the suitable technique to use in medical images by hospitals. IEEE 2020-04 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/28766/1/The%20techniques%20of%20securing%20imaging%20data%20in%20medical%20system.pdf pdf en http://umpir.ump.edu.my/id/eprint/28766/2/The%20techniques%20of%20securing%20imaging%20data%20in%20medical%20system_FULL.pdf Sian, Soo M. and Chung, Loh W. and Mohd Fazrul, I. J. and Nur Shahida, I. M.A. and Nurul Suzulyana, Z. and Nur Haziqah, Z. A. and Syifak Izhar, Hisham (2020) The techniques of securing imaging data in medical system. In: 2020 7th International Conference on Electrical and Electronics Engineering (ICEEE), 14-16 April 2020 , Antalya, Turkey. pp. 248-253. (9102516). ISBN 9781728167886 https://doi.org/10.1109/ICEEE49618.2020.9102516 |
institution |
Universiti Malaysia Pahang |
building |
UMP Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang |
content_source |
UMP Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English English |
topic |
HV Social pathology. Social and public welfare QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering |
spellingShingle |
HV Social pathology. Social and public welfare QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering Sian, Soo M. Chung, Loh W. Mohd Fazrul, I. J. Nur Shahida, I. M.A. Nurul Suzulyana, Z. Nur Haziqah, Z. A. Syifak Izhar, Hisham The techniques of securing imaging data in medical system |
description |
Over the years, the technology evolution has brought a huge change on the people daily life, however, it is undeniable that some vulnerabilities have also been arisen. The cyber-attacks and cyber threats are always the main challenge of cybersecurity. The unsecure network causes the data leakage, data theft and data interception that affect the data integrity. In the healthcare sector, the medical images are the important records for the organization to detect and diagnose the disease. Hence, the confidentiality of the medical images needs to be ensured to assure the integrity of the data. The techniques that are used to enhance the security and integrity of the medical images include cryptography, steganography and digital watermarking to prevent the medical images from being modified and the techniques can also be used for authentication in which the content of the medical images can be viewed only by the authorized person. This paper will describe the techniques used in medical image for security and integrity purposes, moreover, it will propose the suitable technique to use in medical images by hospitals. |
format |
Conference or Workshop Item |
author |
Sian, Soo M. Chung, Loh W. Mohd Fazrul, I. J. Nur Shahida, I. M.A. Nurul Suzulyana, Z. Nur Haziqah, Z. A. Syifak Izhar, Hisham |
author_facet |
Sian, Soo M. Chung, Loh W. Mohd Fazrul, I. J. Nur Shahida, I. M.A. Nurul Suzulyana, Z. Nur Haziqah, Z. A. Syifak Izhar, Hisham |
author_sort |
Sian, Soo M. |
title |
The techniques of securing imaging data in medical system |
title_short |
The techniques of securing imaging data in medical system |
title_full |
The techniques of securing imaging data in medical system |
title_fullStr |
The techniques of securing imaging data in medical system |
title_full_unstemmed |
The techniques of securing imaging data in medical system |
title_sort |
techniques of securing imaging data in medical system |
publisher |
IEEE |
publishDate |
2020 |
url |
http://umpir.ump.edu.my/id/eprint/28766/1/The%20techniques%20of%20securing%20imaging%20data%20in%20medical%20system.pdf http://umpir.ump.edu.my/id/eprint/28766/2/The%20techniques%20of%20securing%20imaging%20data%20in%20medical%20system_FULL.pdf http://umpir.ump.edu.my/id/eprint/28766/ https://doi.org/10.1109/ICEEE49618.2020.9102516 |
_version_ |
1724073479653818368 |
score |
13.211869 |