2018
DOI: 10.1007/s10916-018-1103-6
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 50 publications
(18 citation statements)
references
References 79 publications
0
17
0
Order By: Relevance
“…Privacy challenges also arise with adoption of ML/DL techniques for building biometric healthcare systems either offline (e.g., face or fingerprint recognition based system to protect medical facilities and equipment [110]) or online systems, e.g., real-time medical systems [111] and use of biometrics for authentication of medical IoT devices [112], etc. The security and privacy of such systems are of utmost importance; therefore, worst-case robustness test should be performed for biometrically secure healthcare systems.…”
Section: ML For Healthcare: Challengesmentioning
confidence: 99%
“…Privacy challenges also arise with adoption of ML/DL techniques for building biometric healthcare systems either offline (e.g., face or fingerprint recognition based system to protect medical facilities and equipment [110]) or online systems, e.g., real-time medical systems [111] and use of biometrics for authentication of medical IoT devices [112], etc. The security and privacy of such systems are of utmost importance; therefore, worst-case robustness test should be performed for biometrically secure healthcare systems.…”
Section: ML For Healthcare: Challengesmentioning
confidence: 99%
“…A sufficient number of studies on FV biometric technology covering a wide scope of disciplines can be obtained from these databases ( Figure 2). During the retrieval process, search, selection and categorisation of relevant studies from these databases were carried out in three screening and filtering iteration processes [17]- [20]. In the first iteration process, duplicate articles were eliminated [21]- [24].…”
Section: Methodsmentioning
confidence: 99%
“…The attacker can transfer these unknown data to another system or location and attempt to break the decryption of cipher text by using modern programmes and techniques [108]- [112]. Thus, the confidentiality of such information must be enhanced by using data hiding techniques, such as steganography or watermarking [17], [113]- [147]. The requirements needed to solve this problem according to the definition of information security by the international standard ISO/IEC 27002 (2005) should also be improved.…”
Section: New Proposed Solutionmentioning
confidence: 99%
“…Telemedicine has been increasingly used in healthcare because it offers several benefits, such as providing the healthrelated information of patients [1][2][3][4][5][6][7] and remote healthcare services [8][9][10][11][12][13][14]. Telemedicine is a remote medical practice in which different healthcare providers cooperate and permit their collaborative efforts in the diagnosis or treatment of a disease [15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%