2
Views
0
CrossRef citations to date
0
Altmetric
Articles

Secure and authentic electronic patient records transmission scheme based on two-based number conversion

Pages 199-208 | Published online: 18 Jul 2013

References

  • Sitting, F. Personal health records on the Internet: a snapshot of the pioneers at the end of the 20th century. J. Med. Inform., 2002, 65, 1–6.
  • Kaihara, S. Realization of the computerized patient record: relevance and unsolved problems. J. Med. Inform., 1998, 49, 1–8.
  • Louwerse, K. The electronic patient record: the management of access—case study: Leiden University Hospital. J. Med. Inform., 1998, 49, 39–44.
  • Blobel, B. and Pharow, P. Experiences with health professional card. Proc. Electron. Health Rec. Europe ’97, London, 1997, pp. 29–39.
  • Meyer, F. D., Lundgren, P. A., Moor, G. D. and Fiers, T. Determination of user requirements for the secure communication of electronic medical record information. J. Med. Inform., 1998, 49, 125–130.
  • Wu, Y. G. and Tai, S. C. Low bit rate sub-band DCT image compression. IEEE Trans. Cons. Electr., 1997, 43, 134–139.
  • Artz, D. Digital steganography: hiding data within data. IEEE Internet Comput., 2001, 5, 75–80.
  • Spaulding, J., Noda, H., Shirazi, M. N. and Kawaguchi, E. BPCS steganography using EZW lossy compressed images. Pattern Recognition Lett., 2002, 23, 1579–1587.
  • Tsai, P., Hu, Y. C. and Chang, C. C. A progressive secret reveal system based on SPIHT image transmission. Signal Process.: Image Commun., 2004, 19, 285297.
  • Wu, D. C. and Tsai, W. H. Data hiding in images via multiple-based number conversion and lossy compression. IEEE Trans. Cons. Electr., 1998, 44, 1406–1412.
  • ISO/IEC JTCI/SC2/WG8, Coding of Still Picture, JPEG Committee Technical Draft R8, 14 Aug. 1990.
  • Chao, H. M., Hsu, C. M. and Miaou, S. G. A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans. Inf. Technol. Biomed., 2002, 6, 46–53.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.