Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review

被引:30
作者
Mohsin, A. H. [1 ]
Zaidan, A. A. [1 ]
Zaidan, B. B. [1 ]
bin Ariffin, Shamsul Arrieya [1 ]
Albahri, O. S. [1 ]
Albahri, A. S. [1 ]
Alsalem, M. A. [1 ]
Mohammed, K. I. [1 ]
Hashim, M. [1 ]
机构
[1] Univ Pendidikan Sultan Idris, Dept Comp, Tanjong Malim, Perak, Malaysia
关键词
Real-time medical systems; Steganography; Biometrics; User authentication; RATE DATA HIDDEN; MULTICRITERIA ANALYSIS; COHERENT TAXONOMY; ECG STEGANOGRAPHY; OPEN CHALLENGES; SECURITY; IMAGE; METHODOLOGY; PROTECTION; FRAMEWORK;
D O I
10.1007/s10916-018-1103-6
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
In real-time medical systems, the role of biometric technology is significant in authentication systems because it is used in verifying the identity of people through their biometric features. The biometric technology provides crucial properties for biometric features that can support the process of personal identification. The storage of biometric template within a central database makes it vulnerable to attack which can also occur during data transmission. Therefore, an alternative mechanism of protection becomes important to develop. On this basis, this study focuses on providing a detailed analysis of the extant literature (2013-2018) to identify the taxonomy and research distribution. Furthermore, this study also seeks to ascertain the challenges and motivations associated with biometric steganography in real-time medical systems to provide recommendations that can enhance the efficient use of real-time medical systems in biometric steganography and its applications. A review of articles on human biometric steganography in real-time medical systems obtained from three main databases (IEEE Xplore, ScienceDirect and Web of Science) is conducted according to an appropriate review protocol. Then, 41 related articles are selected by using exclusion and inclusion criteria. Majority of the studies reviewed had been conducted in the field of data-hiding (particularly steganography) technologies. In this review, various steganographic methods that have been applied in different human biometrics are investigated. Thereafter, these methods are categorised according to taxonomy, and the results are presented on the basis of human steganography biometric real-time medical systems, testing and evaluation methods, significance of use and applications and techniques. Finally, recommendations on how the challenges associated with data hiding can be addressed are provided to enhance the efficiency of using biometric information processed in any authentication real-time medical system. These recommendations are expected to be immensely helpful to developers, company users and researchers.
引用
收藏
页数:20
相关论文
共 108 条
  • [1] Abduljabbar ZA, 2016, 2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC)
  • [2] A distributed framework for health information exchange using smartphone technologies
    Abdulnabi, Mohamed
    Al-Haiqi, Ahmed
    Kiah, M. L. M.
    Zaidan, A. A.
    Zaidan, B. B.
    Hussain, Muzammil
    [J]. JOURNAL OF BIOMEDICAL INFORMATICS, 2017, 69 : 230 - 250
  • [3] Abomhara M., 2010, Journal of Applied Sciences, V10, P1834, DOI 10.3923/jas.2010.1834.1840
  • [4] Abomhara Mohamed, 2010, Journal of Applied Sciences, V10, P1656, DOI 10.3923/jas.2010.1656.1661
  • [5] A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
    Ahmed M.A.
    Kiah L.M.
    Zaidan B.B.
    Zaidan A.A.
    [J]. Journal of Applied Sciences, 2010, 10 (01) : 59 - 64
  • [6] Testing The Quality of Teaching The Biometrical-Code Transformers
    Akhmetov, B. S.
    Ivanov, A. I.
    Kartbayev, T. S.
    Kalizhanova, A. U.
    Mukapil, K.
    Nabiyeva, G. S.
    [J]. Proceedings of 6th World Conference on Educational Sciences, 2015, 191 : 2261 - 2266
  • [7] Hiding data in video file: An overview
    Al-Frajat A.K.
    Jalab H.A.
    Kasirun Z.M.
    Zaidan A.A.
    Zaidan B.B.
    [J]. Journal of Applied Sciences, 2010, 10 (15) : 1644 - 1649
  • [8] A review of smart home applications based on Internet of Things
    Alaa, Mussab
    Zaidan, A. A.
    Zaidan, B. B.
    Talal, Mohammed
    Kiah, M. L. M.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 97 : 48 - 65
  • [9] Alam GM, 2010, SCI RES ESSAYS, V5, P3254
  • [10] Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing
    Alanazi, H. O.
    Zaidan, A. A.
    Zaidan, B. B.
    Kiah, M. L. Mat
    Al-Bakri, S. H.
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (01)