Skip to main content
Log in

Secure multimedia data processing scheme in medical applications

  • 1197: Advances in Soft Computing Techniques for Visual Information-based Systems
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

People communicate in a variety of ways via multimedia through the propagation of various techniques. Nowadays, variety of multimedia frameworks or techniques is used in various applications such as industries, software processing, vehicles and medical systems. The usage of multimedia frameworks in healthcare systems makes it possible to process, record and store huge amount of information generated by various medical records. However, the processing and management of huge records of every individual lead to overload the security risk and human efforts. The aim of this paper is to propose a secure and efficient technique that helps the medical organizations to process every record of individuals in a secure and efficient way. The proposed mechanism is validated against various security and processing metrics over conventional mechanisms such as Response Time, Message Alteration Record, Trusted Classification Accuracy and Record Accuracy. The analyzed results claim the significant improvement of proposed mechanism as compare to other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Al-Muhtadi J, Shahzad B, Saleem K, Jameel W, Orgun MA (2019) Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment. Health Inform J 25(2):315–329

    Article  Google Scholar 

  2. Bourbakis N, Rwabutaza A, Yang M, Skodras AN, Ewing R (2009) A synthetic stegano-crypto scheme for securing multimedia medical records and their associations. In: 2009 16th international conference on digital signal processing, pp 1–8

  3. Coatrieux G, Puentes J, Lecornu L, Le Rest CC, Roux C (2006). Compliant secured specialized electronic patient record platform. In: 1st transdisciplinary conference on distributed diagnosis and home healthcare. D2H2, pp 156–159

  4. Coventry L, Branley D (2018) Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113:48–52

    Article  Google Scholar 

  5. Dimoulas CA (2017) Audiovisual spatial-audio analysis by means of sound localization and imaging: a multimedia healthcare framework in abdominal sound mapping. IEEE Trans Multimedia 18(10):1969–1976

    Article  Google Scholar 

  6. Hassan MM, Lin K, Yue X, Wan J (2017) A multimedia healthcare data sharing approach through cloud-based body area network. Futur Gener Comput Syst 66:48–58

    Article  Google Scholar 

  7. Hathaliya JJ, Tanwar S (2020) An exhaustive survey on security and privacy issues in Healthcare 4.0. Comput Commun 153:311–335

    Article  Google Scholar 

  8. Jalali MS, Razak S, Gordon W, Perakslis E, Madnick S (2019) Health care and cybersecurity: bibliometric analysis of the literature. J Med Internet Res 21(2):12644–21250

    Article  Google Scholar 

  9. Khan FA, Asif M, Ahmad A, Alharbi M, Aljuaid H (2020) Blockchain technology, improvement suggestions, security challenges on smart grid and its application in healthcare for sustainable development. Sustain Cities Soc 55:102018–102022

    Article  Google Scholar 

  10. Kundur D, Luh W, Okorafor UN, Zourntos T (2007) Security and privacy for distributed multimedia sensor networks. Proc IEEE 96(1):112–130

    Article  Google Scholar 

  11. Liu W, Zhu SS, Mundie T, Krieger U (2017) Advanced block-chain architecture for e-health systems. In: 19th IEEE international conference on e-health networking, applications and services, pp 1–6

  12. Magana AJ (2014) Learning strategies and multimedia techniques for scaffolding size and scale cognition. Comput Educ 72:367–377

    Article  Google Scholar 

  13. Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C (2018) A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Futur Gener Comput Syst 82:375–387

    Article  Google Scholar 

  14. Mansfield-Devine S (2017) Leaks and ransoms–the key threats to healthcare organisations. Netw Secur 6:14–19

    Google Scholar 

  15. Marwan M, Kartit A, Ouahmane H (2016) Secure cloud-based medical image storage using secret share scheme. In: 2016 5th international conference on multimedia computing and systems (ICMCS), pp 366–371

  16. Muzammal SM, Shah MA, Khattak HA, Jabbar S, Ahmed G, Khalid S, Han K (2018) Counter measuring conceivable security threats on smart healthcare devices. IEEE Access 6:20722–20733

    Article  Google Scholar 

  17. Rathee G, Garg S, Kaddoum G, Choi BJ (2020) A decision-making model for securing IoT devices in smart industries. IEEE Trans Ind Inf 17:4270

    Article  Google Scholar 

  18. Rathee G, Balasaraswathi M, Chandran KP, Gupta SD, Boopathi CS (2021) A secure IoT sensors communication in industry 4.0 using blockchain technology. J Ambient Intell Human Comput 12(1):533–545

    Article  Google Scholar 

  19. Rathee G, Sharma A, Saini H, Kumar R, Iqbal R (2019) A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology. Multimed Tools Appl 1–23

  20. Raveendran VR, Bhamidipati P, Walker GK (2015) U.S. Patent No. 9,197,912. U.S. Patent and Trademark Office, Washington, DC

  21. Sudha G, Ganesan R (2013) Secure transmission medical data for pervasive healthcare system using android. In: 2013 international conference on communication and signal processing, pp 433–436

  22. Tanwar S, Parekh K, Evans R (2020) Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J Inf Secur Appl 50:102407–102413

    Google Scholar 

  23. Valtolina S, Franzoni S, Mazzoleni P, Bertino E (2005) Dissemination of cultural heritage content through virtual reality and multimedia techniques: a case study. In: 11th international multimedia modelling conference, pp 214–221

  24. Walker-Roberts S, Hammoudeh M, Dehghantanha A (2018) A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access 6:25167–25177

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geetanjali Rathee.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Srinivasan, K., Rathee, G., Raja, M.R. et al. Secure multimedia data processing scheme in medical applications. Multimed Tools Appl 81, 9079–9090 (2022). https://doi.org/10.1007/s11042-021-11481-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11481-z

Keywords

Navigation