Using Fingerprint Features as Personalized Cryptographic key in Personal Health Record Systems

被引:0
作者
Ma Guoqiang [1 ]
Liu Juan [1 ]
Ni Bin [2 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Hubei Province, Peoples R China
[2] Univ S Carolina, Columbia, SC 29208 USA
关键词
system analysis and design; health care; medical information systems; fingerprint identification;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
An embedded method which can provide privacy-safeguard and data-security layer for the Personal Health Records (PHR) is proposed. In our method, the fingerprint image of a patient or doctor is obtained with fingerprint scanner and the values of fingerprint features points are calculated and saved in an IC card. As a result, saving the fingerprint image is not required in our method. Based on the user's password, a transformation is applied on the fingerprint topology structural values. After that, we take these points' coordinates on the transformed topology structure as a cryptographic key, which is used with Advanced Encryption Standard (AES) algorithm to encrypt the users' privacy information, such as prescription, laboratory sheet, medical certificate, etc. The experimental results demonstrate that our method could bring patients the self-control and self-management on their own medical privacy information.
引用
收藏
页码:128 / 135
页数:8
相关论文
共 20 条
  • [1] The patients' personalized medical record: Thoughts on the single point of access and the masking of information in the record
    Allaert, F. -A.
    Quantin, C.
    [J]. IRBM, 2009, 30 (03) : 114 - 118
  • [2] Angst CM, 2009, MIS QUART, V33, P339
  • [3] Whose Personal Control? Creating Private, Personally Controlled Health Records for Pediatric and Adolescent Patients
    Bourgeois, Fabienne C.
    Taylor, Patrick L.
    Emans, S. Jean
    Nigrin, Daniel J.
    Mandi, Kenneth D.
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (06) : 737 - 743
  • [4] Project HealthDesign: Enhancing Action through Information
    Brennan, Patricia Flatley
    Casper, Gail
    Downs, Stephen
    Aulahk, Veenu
    [J]. CONNECTING HEALTH AND HUMANS, 2009, 146 : 214 - +
  • [5] BRENT RW, 2004, CRYPTOGRAPHIC ALGORI
  • [6] Daglish David, 2009, Proceedings of the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business. CONGRESS 2009, P110, DOI 10.1109/CONGRESS.2009.14
  • [7] DEBORAH BL, 2007, PERSONAL HLTH RECORD
  • [8] Social Uses of Personal Health Information Within PatientsLikeMe, an Online Patient Community: What Can Happen When Patients Have Access to One Another's Data
    Frost, Jeana H.
    Massagli, Michael P.
    [J]. JOURNAL OF MEDICAL INTERNET RESEARCH, 2008, 10 (03)
  • [9] Embedding a Hiding Function in a Portable Electronic Health Record for Privacy Preservation
    Huang, Lu-Chou
    Chu, Huei-Chung
    Lien, Chung-Yueh
    Hsiao, Chia-Hung
    Kao, Tsair
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2010, 34 (03) : 313 - 320
  • [10] LIU Bo, 2009, RES APPL FINGERPRINT