{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:23:52Z","timestamp":1772040232501,"version":"3.50.1"},"reference-count":133,"publisher":"Association for Computing Machinery (ACM)","issue":"2s","license":[{"start":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T00:00:00Z","timestamp":1621296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2021,6,21]]},"abstract":"<jats:p>With the remarkable development of internet technologies, the popularity of smart healthcare has regularly come to the fore. Smart healthcare uses advanced technologies to transform the traditional medical system in an all-round way, making healthcare more efficient, more convenient, and more personalized. Unfortunately, medical data security is a serious issue in the smart healthcare systems. It becomes a fundamental challenge that requires the development of efficient innovative strategies towards fulfilling the healthcare needs and supporting secure healthcare transfer and delivery. This article provides a comprehensive survey on state-of-the-art techniques for health data security and their new trends for solving challenges in real-world applications. We survey the various notable cryptography, biometrics, watermarking, and blockchain-based security techniques for healthcare applications. A comparative analysis is also performed to identify the contribution of reviewed techniques in terms of their objective, methodology, type of medical data, important features, and limitations. At the end, we discuss the open issues and research directions to explore the promising areas for future research.<\/jats:p>","DOI":"10.1145\/3422816","type":"journal-article","created":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T14:43:16Z","timestamp":1621348996000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["A Survey on Healthcare Data: A Security Perspective"],"prefix":"10.1145","volume":"17","author":[{"given":"A. K.","family":"Singh","sequence":"first","affiliation":[{"name":"Department of CSE, NIT Patna, Patna, Bihar (India), India"}]},{"given":"A.","family":"Anand","sequence":"additional","affiliation":[{"name":"Department of CSE, NIT Patna, Patna, Bihar (India), India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2525-3074","authenticated-orcid":false,"given":"Z.","family":"Lv","sequence":"additional","affiliation":[{"name":"School of Data Science and Software Engineering, Qingdao University, Qingdao (China), China"}]},{"given":"H.","family":"Ko","sequence":"additional","affiliation":[{"name":"IT Research Institute, Chosun University, Gwangju-City (South Korea), South Korea"}]},{"given":"A.","family":"Mohan","sequence":"additional","affiliation":[{"name":"Department of Electronics Engineering, IIT (BHU), Varanasi (India), India"}]}],"member":"320","published-online":{"date-parts":[[2021,5,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"A. K. Singh B. Kumar G. Singh and A. Mohan. 2017. Medical Image Watermarking: Techniques and Applications. Springer International Publishing.  A. K. Singh B. Kumar G. Singh and A. Mohan. 2017. Medical Image Watermarking: Techniques and Applications. Springer International Publishing.","DOI":"10.1007\/978-3-319-57699-2"},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"A. Anand and A. K. Singh. 2020. Watermarking techniques for medical data authentication: a survey. Multimed. Tools Appl. 2020.  A. Anand and A. K. Singh. 2020. Watermarking techniques for medical data authentication: a survey. Multimed. Tools Appl. 2020.","DOI":"10.1007\/s11042-020-08801-0"},{"key":"e_1_2_1_3_1","volume-title":"Greatest Cybersecurity Threats Facing Healthcare Networks","year":"2020","unstructured":"2020. Greatest Cybersecurity Threats Facing Healthcare Networks in 2020 . Retrieved from https:\/\/www.securitymagazine.com\/articles\/91751-greatest-cybersecurity-threats-facing-healthcare-networks-in-2020. 2020. Greatest Cybersecurity Threats Facing Healthcare Networks in 2020. Retrieved from https:\/\/www.securitymagazine.com\/articles\/91751-greatest-cybersecurity-threats-facing-healthcare-networks-in-2020."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.038"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2885256"},{"key":"#cr-split#-e_1_2_1_6_1.1","doi-asserted-by":"crossref","unstructured":"A. Anand A. K. Singh Z. Lv and G. Bhatnagar. 2020. Compression-then-encryption based secure watermarking technique for smart healthcare system. IEEE Multimed. (2020). DOI: 10.1109\/MMUL.2020.2993269 10.1109\/MMUL.2020.2993269","DOI":"10.1109\/MMUL.2020.2993269"},{"key":"#cr-split#-e_1_2_1_6_1.2","doi-asserted-by":"crossref","unstructured":"A. Anand A. K. Singh Z. Lv and G. Bhatnagar. 2020. Compression-then-encryption based secure watermarking technique for smart healthcare system. IEEE Multimed. (2020). DOI: 10.1109\/MMUL.2020.2993269","DOI":"10.1109\/MMUL.2020.2993269"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-6111(02)00073-3"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compmedimag.2005.02.003"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290688.3290721"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.glohj.2019.07.001"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2017.2755378"},{"key":"e_1_2_1_12_1","unstructured":"M. Demchenko. 2020. Trends in healthcare 2020: Get ready for digital transformation. NCube. Retrieved from https:\/\/ncube.com\/blog\/trends-in-healthcare-2020-get-ready-for-digital-transformation  M. Demchenko. 2020. Trends in healthcare 2020: Get ready for digital transformation. NCube. Retrieved from https:\/\/ncube.com\/blog\/trends-in-healthcare-2020-get-ready-for-digital-transformation"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2019.2961898"},{"key":"#cr-split#-e_1_2_1_14_1.1","doi-asserted-by":"crossref","unstructured":"A. Anand and A. K. Singh. 2020. Joint watermarking-encryption-ECC for patient record security in wavelet domain. IEEE Multimed. (2020). DOI: 10.1109\/MMUL.2020.2985973 10.1109\/MMUL.2020.2985973","DOI":"10.1109\/MMUL.2020.2985973"},{"key":"#cr-split#-e_1_2_1_14_1.2","doi-asserted-by":"crossref","unstructured":"A. Anand and A. K. Singh. 2020. Joint watermarking-encryption-ECC for patient record security in wavelet domain. IEEE Multimed. (2020). DOI: 10.1109\/MMUL.2020.2985973","DOI":"10.1109\/MMUL.2020.2985973"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2004.02.009"},{"key":"#cr-split#-e_1_2_1_16_1.1","doi-asserted-by":"crossref","unstructured":"S. Thakur A. K. Singh S. Ghrera and M. Dave. 2019. Watermarking techniques and its applications in tele-health: A technical survey. Cryptogr. Inf. Secur. (2019). DOI: 10.1201\/9780429435461-17 10.1201\/9780429435461-17","DOI":"10.1201\/9780429435461-17"},{"key":"#cr-split#-e_1_2_1_16_1.2","doi-asserted-by":"crossref","unstructured":"S. Thakur A. K. Singh S. Ghrera and M. Dave. 2019. Watermarking techniques and its applications in tele-health: A technical survey. Cryptogr. Inf. Secur. (2019). DOI: 10.1201\/9780429435461-17","DOI":"10.1201\/9780429435461-17"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"D. Gupta B. Perez G. M. Agrawal and D. P. Gupta. 2020. Handbook of Computer Networks and Cyber Security: Principles and Paradigms. Springer.  D. Gupta B. Perez G. M. Agrawal and D. P. Gupta. 2020. Handbook of Computer Networks and Cyber Security: Principles and Paradigms. Springer.","DOI":"10.1007\/978-3-030-22277-2"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 7th International Symposium on Digital Forensics Security. DOI: 10","author":"Qadir A. M.","year":"2019","unstructured":"A. M. Qadir and N. Varol . 2019. A review paper on cryptography . In Proceedings of the 7th International Symposium on Digital Forensics Security. DOI: 10 .1109\/ISDFS. 2019 .8757514 10.1109\/ISDFS.2019.8757514 A. M. Qadir and N. Varol. 2019. A review paper on cryptography. In Proceedings of the 7th International Symposium on Digital Forensics Security. DOI: 10.1109\/ISDFS.2019.8757514"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0245"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 31st International Conference of the IEEE Engineering in Medicine and Biology Society. 3707\u20133710","author":"Zhou Y.","unstructured":"Y. Zhou , K. Panetta , and S. Agaian . 2009. A lossless encryption method for medical images using edge maps . In Proceedings of the 31st International Conference of the IEEE Engineering in Medicine and Biology Society. 3707\u20133710 . DOI: 10.1109\/IEMBS.2009.5334799 10.1109\/IEMBS.2009.5334799 Y. Zhou, K. Panetta, and S. Agaian. 2009. A lossless encryption method for medical images using edge maps. In Proceedings of the 31st International Conference of the IEEE Engineering in Medicine and Biology Society. 3707\u20133710. DOI: 10.1109\/IEMBS.2009.5334799"},{"key":"e_1_2_1_21_1","first-page":"28","article-title":"A new approach for securing medical images and patient's information by a new approach for securing medical imag es and patient\u2019s information by using a hybrid system","volume":"19","author":"Salameh J. N. B.","year":"2019","unstructured":"J. N. B. Salameh . 2019 . A new approach for securing medical images and patient's information by a new approach for securing medical imag es and patient\u2019s information by using a hybrid system . Int. J. Comput. Sci. Netw. Secur. 19 , 4 (2019), 28 \u2013 39 . J. N. B. Salameh. 2019. A new approach for securing medical images and patient's information by a new approach for securing medical imag es and patient\u2019s information by using a hybrid system. Int. J. Comput. Sci. Netw. Secur. 19, 4 (2019), 28\u201339.","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.02.069"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.04.006"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.021"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.04.022"},{"key":"e_1_2_1_26_1","first-page":"20","article-title":"Data security on patient monitoring for future healthcare application","volume":"163","author":"Vinoth B.","year":"2017","unstructured":"B. Vinoth , M. Ramaswami , and P. Swathika . 2017 . Data security on patient monitoring for future healthcare application . Int. J. Comput. Appl 163 , 6 (2017), 20 \u2013 23 . DOI: 10.5120\/ijca2017913548 10.5120\/ijca2017913548 B. Vinoth, M. Ramaswami, and P. Swathika. 2017. Data security on patient monitoring for future healthcare application. Int. J. Comput. Appl 163, 6 (2017), 20\u201323. DOI: 10.5120\/ijca2017913548","journal-title":"Int. J. Comput. Appl"},{"key":"e_1_2_1_27_1","first-page":"27","article-title":"A secure crypto based ECG data communication using modified SPHIT and modified quasigroup encryption","volume":"78","author":"Sujatha S.","year":"2013","unstructured":"S. Sujatha and R. Govindaraju . 2013 . A secure crypto based ECG data communication using modified SPHIT and modified quasigroup encryption . Int. J. Comput. Appl. 78 , 6 (2013), 27 \u2013 33 . DOI: 10.5120\/13494-1217 10.5120\/13494-1217 S. Sujatha and R. Govindaraju. 2013. A secure crypto based ECG data communication using modified SPHIT and modified quasigroup encryption. Int. J. Comput. Appl. 78, 6 (2013), 27\u201333. DOI: 10.5120\/13494-1217","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2874026"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.06.010"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.09.150"},{"key":"e_1_2_1_31_1","first-page":"22","article-title":"Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm","volume":"7","author":"Shankar K.","year":"2018","unstructured":"K. Shankar and S. K. Lakshmanaprabu . 2018 . Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm . Int. J. Eng. Technol. 7 , 1 (2018), 22 \u2013 27 . DOI: 10.14419\/ijet.v7i1.9.9729 10.14419\/ijet.v7i1.9.9729 K. Shankar and S. K. Lakshmanaprabu. 2018. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. Int. J. Eng. Technol. 7, 1 (2018), 22\u201327. DOI: 10.14419\/ijet.v7i1.9.9729","journal-title":"Int. J. Eng. Technol."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2017.10.024"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.83"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2012.11.002"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.10.117"},{"key":"e_1_2_1_36_1","first-page":"236","article-title":"A mobile cloud-based approach for secure m-health prediction application","volume":"7","author":"Nagamani S.","year":"2018","unstructured":"S. Nagamani and D. C. Nagaraju . 2018 . A mobile cloud-based approach for secure m-health prediction application . Int. J. Innov. Eng. Manag. Res. 7 , 12 (2018), 236 \u2013 244 . DOI: 10.22214\/ijraset.2017.4212 10.22214\/ijraset.2017.4212 S. Nagamani and D. C. Nagaraju. 2018. A mobile cloud-based approach for secure m-health prediction application. Int. J. Innov. Eng. Manag. Res. 7, 12 (2018), 236\u2013244. DOI: 10.22214\/ijraset.2017.4212","journal-title":"Int. J. Innov. Eng. Manag. Res."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-019-1685-8"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the Global Summit on Computer & Information Technology (GSCIT'14)","author":"Dridi M.","unstructured":"M. Dridi , B. Bouallegue , and A. Mtibaa . 2014. Crypto-compression of medical image based on DCT and chaotic system . In Proceedings of the Global Summit on Computer & Information Technology (GSCIT'14) . DOI: 10.1109\/GSCIT.2014.6970113 10.1109\/GSCIT.2014.6970113 M. Dridi, B. Bouallegue, and A. Mtibaa. 2014. Crypto-compression of medical image based on DCT and chaotic system. In Proceedings of the Global Summit on Computer & Information Technology (GSCIT'14). DOI: 10.1109\/GSCIT.2014.6970113"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-32-9775-3_80"},{"key":"#cr-split#-e_1_2_1_40_1.1","doi-asserted-by":"crossref","unstructured":"Z. Yue et al. 2020. Privacy-preserving time series medical images analysis using a hybrid deep learning framework. ACM Trans. Internet Technol. (2020). DOI: 10.1145\/3383779 10.1145\/3383779","DOI":"10.1145\/3383779"},{"key":"#cr-split#-e_1_2_1_40_1.2","doi-asserted-by":"crossref","unstructured":"Z. Yue et al. 2020. Privacy-preserving time series medical images analysis using a hybrid deep learning framework. ACM Trans. Internet Technol. (2020). DOI: 10.1145\/3383779","DOI":"10.1145\/3383779"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.59"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.028"},{"key":"e_1_2_1_43_1","first-page":"20893","volume-title":"Proceedings of the Asian Conference on Computer Vision. 363\u2013378","author":"Zhu A. H. Y.","unstructured":"A. H. Y. Zhu , Z. Lan , and S. Newsam . 2018. Hidden two-stream convolutional networks for action recognition . In Proceedings of the Asian Conference on Computer Vision. 363\u2013378 . DOI: doi.org\/10.1007\/978-3-030- 20893 - 20896 10.1007\/978-3-030-20893-6 A. H. Y. Zhu, Z. Lan, and S. Newsam. 2018. Hidden two-stream convolutional networks for action recognition. In Proceedings of the Asian Conference on Computer Vision. 363\u2013378. DOI: doi.org\/10.1007\/978-3-030-20893-6"},{"key":"e_1_2_1_44_1","unstructured":"The National Library of Medicine presents MedPix. Retrieved from https:\/\/www.nlm.nih.gov\/news\/medpix_image_database.html.  The National Library of Medicine presents MedPix. Retrieved from https:\/\/www.nlm.nih.gov\/news\/medpix_image_database.html."},{"key":"e_1_2_1_45_1","first-page":"186","article-title":"A survey of cryptography cloud storage techniques","volume":"5","author":"Hussein N. H.","year":"2016","unstructured":"N. H. Hussein , A. Khalid , and K. Khanfar . 2016 . A survey of cryptography cloud storage techniques . Int. J. Comput. Sci. Mob. Comput. 5 , 2 (2016), 186 \u2013 191 . N. H. Hussein, A. Khalid, and K. Khanfar. 2016. A survey of cryptography cloud storage techniques. Int. J. Comput. Sci. Mob. Comput. 5, 2 (2016), 186\u2013191.","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5120\/1398-1887"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1324787"},{"key":"#cr-split#-e_1_2_1_48_1.1","doi-asserted-by":"crossref","unstructured":"W. Yang S. Wang J. Hu G. Zheng and C. Valli. 2019. Security and accuracy of fingerprint-based biometrics: A review. Symmetry (Basel). 11 2 (2019). DOI: 10.3390\/sym11020141 10.3390\/sym11020141","DOI":"10.3390\/sym11020141"},{"key":"#cr-split#-e_1_2_1_48_1.2","doi-asserted-by":"crossref","unstructured":"W. Yang S. Wang J. Hu G. Zheng and C. Valli. 2019. Security and accuracy of fingerprint-based biometrics: A review. Symmetry (Basel). 11 2 (2019). DOI: 10.3390\/sym11020141","DOI":"10.3390\/sym11020141"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"#cr-split#-e_1_2_1_50_1.1","doi-asserted-by":"crossref","unstructured":"K. A. Shakil F. J. Zareen M. Alam and S. Jabin. 2020. BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud. J. King Saud Univ.-Comput. Inf. Sci. 32 1 (2020) 57-64. DOI: 10.1016\/j.jksuci.2017.07.001 10.1016\/j.jksuci.2017.07.001","DOI":"10.1016\/j.jksuci.2017.07.001"},{"key":"#cr-split#-e_1_2_1_50_1.2","doi-asserted-by":"crossref","unstructured":"K. A. Shakil F. J. Zareen M. Alam and S. Jabin. 2020. BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud. J. King Saud Univ.-Comput. Inf. Sci. 32 1 (2020) 57-64. DOI: 10.1016\/j.jksuci.2017.07.001","DOI":"10.1016\/j.jksuci.2017.07.001"},{"key":"e_1_2_1_51_1","first-page":"121","article-title":"Clinical data privacy and customization via biometrics based on ECG signals. Lect. Notes","author":"Silva H.","year":"2011","unstructured":"H. Silva , A. Louren\u00e7o , A. Fred , and J. Filipe . 2011 . Clinical data privacy and customization via biometrics based on ECG signals. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 7058 LNCS , 121 \u2013 132 . DOI: 10.1007\/978-3-642-25364-5_12 10.1007\/978-3-642-25364-5_12 H. Silva, A. Louren\u00e7o, A. Fred, and J. Filipe. 2011. Clinical data privacy and customization via biometrics based on ECG signals. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 7058 LNCS, 121\u2013132. DOI: 10.1007\/978-3-642-25364-5_12","journal-title":"Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 7058 LNCS"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2018.1437651"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2012.34"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.3390\/s130303142"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.435"},{"key":"e_1_2_1_56_1","first-page":"69440K","article-title":"Fingerprint verification using SIFT features","author":"Park U.","year":"2008","unstructured":"U. Park , S. Pankanti , and A. K. Jain . 2008 . Fingerprint verification using SIFT features . Biomet. Technol. Hum. Identif. V 6944 (2008), 69440K . DOI: 10.1117\/12.778804 10.1117\/12.778804 U. Park, S. Pankanti, and A. K. Jain. 2008. Fingerprint verification using SIFT features. Biomet. Technol. Hum. Identif. V 6944 (2008), 69440K. DOI: 10.1117\/12.778804","journal-title":"Biomet. Technol. Hum. Identif."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.143"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the International Conference on Electronics, Information, and Communication. 1\u20134. DOI: 10","author":"Lee J. N.","year":"2019","unstructured":"J. N. Lee , S. B. Pan , and K. C. Kwak . 2019. Individual identification based on cascaded PCANet from ECG signal . In Proceedings of the International Conference on Electronics, Information, and Communication. 1\u20134. DOI: 10 .23919\/ELINFOCOM. 2019 .8706366 10.23919\/ELINFOCOM.2019.8706366 J. N. Lee, S. B. Pan, and K. C. Kwak. 2019. Individual identification based on cascaded PCANet from ECG signal. In Proceedings of the International Conference on Electronics, Information, and Communication. 1\u20134. DOI: 10.23919\/ELINFOCOM.2019.8706366"},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the Amity International Conference on Artificial Intelligence. 930\u2013933","author":"Singh I.","unstructured":"I. Singh , D. Kumar , and S. K. Khatri . 2019. Improving the efficiency of e-healthcare system based on cloud . In Proceedings of the Amity International Conference on Artificial Intelligence. 930\u2013933 . DOI: 10.1109\/AICAI.2019.8701387 10.1109\/AICAI.2019.8701387 I. Singh, D. Kumar, and S. K. Khatri. 2019. Improving the efficiency of e-healthcare system based on cloud. In Proceedings of the Amity International Conference on Artificial Intelligence. 930\u2013933. DOI: 10.1109\/AICAI.2019.8701387"},{"key":"e_1_2_1_60_1","first-page":"133","article-title":"Biometric watermarking technique based on CS theory and fast discrete curvelet transform for face and fingerprint protection","volume":"425","author":"Thanki R.","year":"2015","unstructured":"R. Thanki and K. Borisagar . 2015 . Biometric watermarking technique based on CS theory and fast discrete curvelet transform for face and fingerprint protection . Adv. Sig. Proc. Intell. Recog. Syst. 425 (2015), 133 \u2013 144 . DOI: 10.1007\/978-3-319-28658-7 10.1007\/978-3-319-28658-7 R. Thanki and K. Borisagar. 2015. Biometric watermarking technique based on CS theory and fast discrete curvelet transform for face and fingerprint protection. Adv. Sig. Proc. Intell. Recog. Syst. 425 (2015), 133\u2013144. DOI: 10.1007\/978-3-319-28658-7","journal-title":"Adv. Sig. Proc. Intell. Recog. Syst."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2004288"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2010.310111"},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the International Conference on Recent AdvAnces in Computer Software Systems. 180\u2013184","author":"Shanthini B.","unstructured":"B. Shanthini and S. Swamynathan . 2012. Genetic-based biometric security system for wireless sensor-based health care systems . In Proceedings of the International Conference on Recent AdvAnces in Computer Software Systems. 180\u2013184 . DOI: 10.1109\/RACSS.2012.6212720 10.1109\/RACSS.2012.6212720 B. Shanthini and S. Swamynathan. 2012. Genetic-based biometric security system for wireless sensor-based health care systems. In Proceedings of the International Conference on Recent AdvAnces in Computer Software Systems. 180\u2013184. DOI: 10.1109\/RACSS.2012.6212720"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3220-4"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2793"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1229"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.09.015"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0215-5"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0145-7"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.906"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.024"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.04.017"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.013"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0013-5"},{"key":"e_1_2_1_75_1","volume-title":"Proceedings of the 9th International Information Communication Technologies Conference. 424\u2013428","author":"Mirjalol S.","unstructured":"S. Mirjalol and T. K. Whangbo . 2018. An authentication protocol for smartphone integrated ambient assisted living system . In Proceedings of the 9th International Information Communication Technologies Conference. 424\u2013428 . DOI: 10.1109\/ICTC.2018.8539365 10.1109\/ICTC.2018.8539365 S. Mirjalol and T. K. Whangbo. 2018. An authentication protocol for smartphone integrated ambient assisted living system. In Proceedings of the 9th International Information Communication Technologies Conference. 424\u2013428. DOI: 10.1109\/ICTC.2018.8539365"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773666"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.3390\/s140610081"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.07.001"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGCIoT.2015.7380616"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.001"},{"key":"#cr-split#-e_1_2_1_81_1.1","doi-asserted-by":"crossref","unstructured":"J. Srinivas A. K. Das M. Wazid and N. Kumar. 2018. Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans. Depend. Secur. Comput. 5971 (2018). DOI: 10.1109\/TDSC.2018.2857811 10.1109\/TDSC.2018.2857811","DOI":"10.1109\/TDSC.2018.2857811"},{"key":"#cr-split#-e_1_2_1_81_1.2","doi-asserted-by":"crossref","unstructured":"J. Srinivas A. K. Das M. Wazid and N. Kumar. 2018. Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans. Depend. Secur. Comput. 5971 (2018). DOI: 10.1109\/TDSC.2018.2857811","DOI":"10.1109\/TDSC.2018.2857811"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4048-0"},{"key":"e_1_2_1_83_1","volume-title":"Proceedings of the International Conference on Computer Information Systems and Industrial Management Applications. 19\u201328","author":"Matyas V.","unstructured":"V. Matyas and Z. Riha . 2010. Security of biometric authentication systems . Proceedings of the International Conference on Computer Information Systems and Industrial Management Applications. 19\u201328 . DOI: 10.1109\/CISIM.2010.5643698 10.1109\/CISIM.2010.5643698 V. Matyas and Z. Riha. 2010. Security of biometric authentication systems. Proceedings of the International Conference on Computer Information Systems and Industrial Management Applications. 19\u201328. DOI: 10.1109\/CISIM.2010.5643698"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382772"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7128-5"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0010-4825(02)00083-5"},{"key":"e_1_2_1_87_1","volume-title":"Proceedings of the IEEE International Conference on Communications and Signal Processing. 568\u2013571","author":"Sankaran K. S.","unstructured":"K. S. Sankaran , H. Abhi Rayna , V. Mangu , V. R. Prakash , and N. Vasudevan . 2019. Image water marking using DWT to encapsulate data in medical image . In Proceedings of the IEEE International Conference on Communications and Signal Processing. 568\u2013571 . DOI: 10.1109\/ICCSP.2019.8698057 10.1109\/ICCSP.2019.8698057 K. S. Sankaran, H. Abhi Rayna, V. Mangu, V. R. Prakash, and N. Vasudevan. 2019. Image water marking using DWT to encapsulate data in medical image. In Proceedings of the IEEE International Conference on Communications and Signal Processing. 568\u2013571. DOI: 10.1109\/ICCSP.2019.8698057"},{"key":"e_1_2_1_88_1","first-page":"271","article-title":"An efficient medical image watermarking technique using integer wavelet transform and quick\/fast response codes","volume":"18","author":"Kavitha K. J.","year":"2019","unstructured":"K. J. Kavitha and P. B. Shan . 2019 . An efficient medical image watermarking technique using integer wavelet transform and quick\/fast response codes . Int. J. Intell. Syst. Technol. Appl. 18 , 3 (2019), 271 \u2013 280 . DOI: 10.1504\/IJISTA.2019.099344 10.1504\/IJISTA.2019.099344 K. J. Kavitha and P. B. Shan. 2019. An efficient medical image watermarking technique using integer wavelet transform and quick\/fast response codes. Int. J. Intell. Syst. Technol. Appl. 18, 3 (2019), 271\u2013280. DOI: 10.1504\/IJISTA.2019.099344","journal-title":"Int. J. Intell. Syst. Technol. Appl."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6263-3"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40009-014-0241-8"},{"key":"e_1_2_1_91_1","article-title":"Digital watermarking for image authentication based on combined DCT, DWT and SVD transformation","volume":"10","author":"Khan M. I.","year":"2013","unstructured":"M. I. Khan , M. M. Rahman , and M. I. H. Sarker . 2013 . Digital watermarking for image authentication based on combined DCT, DWT and SVD transformation . Int. J. Comput. Sci. 10 , 3 (2013). M. I. Khan, M. M. Rahman, and M. I. H. Sarker. 2013. Digital watermarking for image authentication based on combined DCT, DWT and SVD transformation. Int. J. Comput. Sci. 10, 3 (2013).","journal-title":"Int. J. Comput. Sci."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2018.12.030"},{"key":"e_1_2_1_93_1","first-page":"107","article-title":"Digital image watermarking based on joint (DCT-DWT) and Arnold transform","volume":"10","author":"Mohammed El Bireki M. F.","year":"2016","unstructured":"M. F. Mohammed El Bireki , M. F. L. Abdullah , A. A. M. Ukasha , and A. A. Elrowayati . 2016 . Digital image watermarking based on joint (DCT-DWT) and Arnold transform . Int. J. Secur. Appl. 10 , 5 (2016), 107 \u2013 118 . DOI: 10.14257\/ijsia.2016.10.5.10 10.14257\/ijsia.2016.10.5.10 M. F. Mohammed El Bireki, M. F. L. Abdullah, A. A. M. Ukasha, and A. A. Elrowayati. 2016. Digital image watermarking based on joint (DCT-DWT) and Arnold transform. Int. J. Secur. Appl. 10, 5 (2016), 107\u2013118. DOI: 10.14257\/ijsia.2016.10.5.10","journal-title":"Int. J. Secur. Appl."},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3928-7"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3127-y"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2014.184"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3536-6"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1166\/jmihi.2015.1407"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-014-9709-9"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1166\/jmihi.2015.1432"},{"key":"e_1_2_1_101_1","first-page":"91","article-title":"Secure spread-spectrum watermarking for telemedicine applications","volume":"02","author":"Kumar B.","year":"2011","unstructured":"B. Kumar , H. V. Singh , S. P. Singh , and A. Mohan . 2011 . Secure spread-spectrum watermarking for telemedicine applications . J. Inf. Secur. 02 , 02 (2011), 91 \u2013 98 . DOI: 10.4236\/jis.2011.22009 10.4236\/jis.2011.22009 B. Kumar, H. V. Singh, S. P. Singh, and A. Mohan. 2011. Secure spread-spectrum watermarking for telemedicine applications. J. Inf. Secur. 02, 02 (2011), 91\u201398. DOI: 10.4236\/jis.2011.22009","journal-title":"J. Inf. Secur."},{"key":"e_1_2_1_102_1","first-page":"95","article-title":"High capacity spread-spectrum watermarking for telemedicine applications","volume":"79","author":"Kumar B.","year":"2011","unstructured":"B. Kumar , A. Anand , S. P. Singh , and A. Mohan . 2011 . High capacity spread-spectrum watermarking for telemedicine applications . World Acad. Sci. Eng. Technol. 79 , 7 (2011), 95 \u2013 99 . DOI: 10.5281\/zenodo.1059548 10.5281\/zenodo.1059548 B. Kumar, A. Anand, S. P. Singh, and A. Mohan. 2011. High capacity spread-spectrum watermarking for telemedicine applications. World Acad. Sci. Eng. Technol. 79, 7 (2011), 95\u201399. DOI: 10.5281\/zenodo.1059548","journal-title":"World Acad. Sci. Eng. Technol."},{"key":"e_1_2_1_103_1","first-page":"20","article-title":"A lossless watermarking based authentication system for medical images","volume":"1","author":"Boucherkha S.","year":"2007","unstructured":"S. Boucherkha and M. Benmohamed . 2007 . A lossless watermarking based authentication system for medical images . World Acad. Sci. Eng. Technol. Int. J. Medical, Heal. Biomed. Bioeng. Pharm. Eng 1 , 1 (2007), 20 \u2013 23 . S. Boucherkha and M. Benmohamed. 2007. A lossless watermarking based authentication system for medical images. World Acad. Sci. Eng. Technol. Int. J. Medical, Heal. Biomed. Bioeng. Pharm. Eng 1, 1 (2007), 20\u201323.","journal-title":"World Acad. Sci. Eng. Technol. Int. J. Medical, Heal. Biomed. Bioeng. Pharm. Eng"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.11.006"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare7020056"},{"key":"e_1_2_1_107_1","first-page":"653","article-title":"A survey of blockchain security issues and challenges","volume":"19","author":"Lin I. C.","year":"2017","unstructured":"I. C. Lin and T. C. Liao . 2017 . A survey of blockchain security issues and challenges . Int. J. Netw. Secur 19 , 5 (2017), 653 \u2013 659 . DOI: 10.6633\/IJNS.201709.19(5).01 10.6633\/IJNS.201709.19(5).01 I. C. Lin and T. C. Liao. 2017. A survey of blockchain security issues and challenges. Int. J. Netw. Secur 19, 5 (2017), 653\u2013659. DOI: 10.6633\/IJNS.201709.19(5).01","journal-title":"Int. J. Netw. Secur"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1007-5"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1121-4"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3309074.3309079"},{"key":"#cr-split#-e_1_2_1_111_1.1","doi-asserted-by":"crossref","unstructured":"L. Zhu H. Dong M. Shen and K. Gai. 2019. An incentive mechanism using Shapley value for blockchain-based medical data sharing. In Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud 5th IEEE International Conference on High Performance Smart Computing and 4th IEEE International Conference on Intelligent Data Security. 113-118. DOI: 10.1109\/BigDataSecurity-HPSC-IDS.2019.00030 10.1109\/BigDataSecurity-HPSC-IDS.2019.00030","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00030"},{"key":"#cr-split#-e_1_2_1_111_1.2","doi-asserted-by":"crossref","unstructured":"L. Zhu H. Dong M. Shen and K. Gai. 2019. An incentive mechanism using Shapley value for blockchain-based medical data sharing. In Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud 5th IEEE International Conference on High Performance Smart Computing and 4th IEEE International Conference on Intelligent Data Security. 113-118. DOI: 10.1109\/BigDataSecurity-HPSC-IDS.2019.00030","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00030"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800503"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.09.350"},{"key":"#cr-split#-e_1_2_1_114_1.1","doi-asserted-by":"crossref","unstructured":"A. Theodouli S. Arakliotis K. Moschou K. Votis and D. Tzovaras. 2018. On the design of a blockchain-based system to facilitate healthcare data sharing. In Proceedings of the 17th IEEE International Conference on Trust Security and Private Computer Communications and 12th IEEE International Conference on Big Data Sciience Engineering and Trust. 1374-1379. DOI: 10.1109\/TrustCom\/BigDataSE.2018.00190 10.1109\/TrustCom","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00190"},{"key":"#cr-split#-e_1_2_1_114_1.2","doi-asserted-by":"crossref","unstructured":"A. Theodouli S. Arakliotis K. Moschou K. Votis and D. Tzovaras. 2018. On the design of a blockchain-based system to facilitate healthcare data sharing. In Proceedings of the 17th IEEE International Conference on Trust Security and Private Computer Communications and 12th IEEE International Conference on Big Data Sciience Engineering and Trust. 1374-1379. DOI: 10.1109\/TrustCom\/BigDataSE.2018.00190","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00190"},{"key":"e_1_2_1_115_1","volume-title":"Med. Syst. 42","author":"Fan K.","year":"2018","unstructured":"K. Fan , S. Wang , Y. Ren , H. Li , and Y. Yang . 2018. Systems-level quality improvement MedBlock: Efficient and secure medical data sharing via blockchain. J . Med. Syst. 42 , ( 2018 ) 1\u201311. DOI: 10.1007\/s10916-018-0993-7 10.1007\/s10916-018-0993-7 K. Fan, S. Wang, Y. Ren, H. Li, and Y. Yang. 2018. Systems-level quality improvement MedBlock: Efficient and secure medical data sharing via blockchain. J. Med. Syst. 42, (2018) 1\u201311. DOI: 10.1007\/s10916-018-0993-7"},{"key":"#cr-split#-e_1_2_1_116_1.1","doi-asserted-by":"crossref","unstructured":"D. Ichikawa M. Kashiyama and T. Ueno. 2017. Tamper-resistant mobile health using blockchain technology. JMIR mHealth uHealth. 5 7 (2017) 1-10. DOI: 10.2196\/mhealth.7938 10.2196\/mhealth.7938","DOI":"10.2196\/mhealth.7938"},{"key":"#cr-split#-e_1_2_1_116_1.2","doi-asserted-by":"crossref","unstructured":"D. Ichikawa M. Kashiyama and T. Ueno. 2017. Tamper-resistant mobile health using blockchain technology. JMIR mHealth uHealth. 5 7 (2017) 1-10. DOI: 10.2196\/mhealth.7938","DOI":"10.2196\/mhealth.7938"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1829-6"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2012.68"},{"key":"e_1_2_1_119_1","volume-title":"Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201913)","author":"Yang K.","unstructured":"K. Yang , X. Jia , K. Ren , and B. Zhang . 2013. DAC-MACS: Effective data access control for multi-authority cloud storage systems . In Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201913) . 2895\u20132903. DOI: 10.1109\/INFCOM.2013.6567100 10.1109\/INFCOM.2013.6567100 K. Yang, X. Jia, K. Ren, and B. Zhang. 2013. DAC-MACS: Effective data access control for multi-authority cloud storage systems. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201913). 2895\u20132903. DOI: 10.1109\/INFCOM.2013.6567100"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995917"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.884"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010518"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00782-8"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422816","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:56Z","timestamp":1750195496000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,18]]},"references-count":133,"journal-issue":{"issue":"2s","published-print":{"date-parts":[[2021,6,21]]}},"alternative-id":["10.1145\/3422816"],"URL":"https:\/\/doi.org\/10.1145\/3422816","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,18]]},"assertion":[{"value":"2020-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}