[go: up one dir, main page]

Arshad et al., 2024 - Google Patents

A Cryptography-Based Framework for Securing Medical Imaging Data in Robotic Systems

Arshad et al., 2024

Document ID
11309797908791808379
Author
Arshad H
Iqbal M
Mir A
Fatima R
Publication year
Publication venue
2024 International Conference on Robotics and Automation in Industry (ICRAI)

External Links

Snippet

Medical imaging data is crucial in robotics-assisted diagnostics and interventions, particularly in neurology. Ensuring the security and privacy of this sensitive data is increasingly challenging in the context of robotic systems. This study presents a robust …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Similar Documents

Publication Publication Date Title
EP2874341B1 (en) Secure evaluation of a program
Ibaida et al. Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems
Nadhan et al. Enhancing healthcare security in the digital era: Safeguarding medical images with lightweight cryptographic techniques in IoT healthcare applications
CN112948883B (en) Method, device and system for multiparty joint modeling of privacy data protection
Rozlomii et al. IoT smart implants: information security and the implementation of lightweight cryptography
Shankar et al. A novel hybrid encryption method using S-box and Henon maps for multidimensional 3D medical images
Hamza et al. Privacy-preserving deep learning techniques for wearable sensor-based big data applications
Zhang et al. SIP: An efficient and secure information propagation scheme in e-health networks
Liu et al. Medical image encryption using biometric image texture fusion
Arshad et al. A Cryptography-Based Framework for Securing Medical Imaging Data in Robotic Systems
Liu et al. PE-HEALTH: Enabling fully encrypted CNN for health monitor with optimized communication
US11956353B2 (en) Machine learning device, machine learning system, and machine learning method
Gudivaka et al. Secure and efficient data management for healthcare IoT devices in cloud-enabled systems using Serpent encryption
Rajasree et al. Secure transmission and monitoring of ECG signals based on chaotic mapping algorithms
Amin et al. AI-Driven Secure Data Sharing: A Trustworthy and Privacy-Preserving Approach
Saranya et al. Secure Medical Image Transmission and Storagein IoT Cloud Using GAN-RBM with Real-TimeAnalysis
JP2023166317A (en) Machine learning apparatus, machine learning system, machine learning method, and machine learning program
Nayyef et al. Assessing the Impact of Quantum Computing on Data Encryption Practices and Information Security
Al-Zubaidie et al. Combining Fog Computing and Blockchain Based on the Internet of Medical Things to Preserve Patient Information Privacy
Keerthana et al. A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption
Khozaimi et al. Improve The Performance and Security of Medical Records using Fingerprint and Advance Encryption Standart
Dilip et al. Survey paper on wavelet based ECG steganography
WO2024098172A1 (en) Artificial neural network inner product functional encryption
TWI718680B (en) Digital Medical Information Security Transmission System
Ismael et al. Proposed Secure Key for Healthcare Platform