Repository logo
  • English
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • Research Outputs
  • Projects
  • People
  • Statistics
  • English
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Scholalry Output
  3. Publications
  4. A comprehensive study on the security of medical information using encryption
 
  • Details
Options

A comprehensive study on the security of medical information using encryption

Date Issued
2022
Author(s)
Bayari, PVB
Indian Institute of Technology Jodhpur
Bhatnagar, G
Chattopadhyay, C
Abstract
The exponential rise in the use of the Internet and rapid progress in computer technology has revolutionised healthcare allowing medical information to be shared efficiently across networks. While these advancements make it convenient to store and share information, they also have their limitations. Medical data contain highly sensitive and confidential information about patients and can be subjected to various kinds of passive and active attacks and analyses if transferred over an insecure network. These data leakages can be catastrophic for the respective individual or organisation due to the undesirable scenarios which emanate from them. Hence, information security is a major concern and warrants developing techniques to securely transfer medical data. This chapter discusses information security techniques and their properties in detail, reviews the research related to cryptography-based medical information security by categorising the techniques into traditional, hybrid and deep learning-based approaches and highlights their limitations. Comparative studies based on the universality of the method and metric-wise performance are also presented. We further discuss the potential challenges and prospective future directions, enabling a path forward to advance the research in this area.
Copyright © 2016-2025  Indian Institute of Technology Jodhpur

Developed and maintained by Dr. Kamlesh Patel and Team, S. R. Ranganathan Learning Hub, IIT Jodhpur.

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback