Scenarios for restructuring the regional inpatient healthcare system based on efficiency indicators and specialization indices

Author(s):  
Aleksandr V. Danilov
2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


2017 ◽  
Author(s):  
Mohammed Shukur ◽  
Laith Fliah ◽  
Aram Abdulqadir
Keyword(s):  
Big Data ◽  

2019 ◽  
Vol 51 (03) ◽  
pp. 399-404
Author(s):  
M. H. RAJPUT ◽  
P. K. BUTT ◽  
S TUNIO ◽  
Z. A MAHER ◽  
S. QURESHI

Sign in / Sign up

Export Citation Format

Share Document