English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21661789      Online Users : 438
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/6531


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/6531


    Title: A Secure and Authentic Electronic Patient Records Transmission Scheme Based on Two-Based Number Conversion
    Authors: Tsai, P. Y.;Hu, Y. C.;Chang, C. C
    Keywords: DATA HIDING;ELECTRONIC PATIENT RECORDS;MULTIPLE-BASED NUMBER CONVERSION
    Date: 2005-12
    Issue Date: 2009-12-17 06:58:29 (UTC+0)
    Publisher: Asia University
    Abstract: This paper presents a secure and authentic transmission scheme for electronic patient records. The goal of the proposed scheme is to improve the performance of another scheme proposed by Chao et al., based on the concept of data hiding. In their scheme, the electronic patient records are embedded into a cover image using bipolar tolerant error range multiple-based number conversion. A key chain is generated that is used to record the total number of base numbers used in the embedding procedure. In fact, the key chain not only consumes the hiding capacity, but also lowers security when it is embedded into the cover image. The proposed scheme improves the multiple-based number conversion by using two-based number conversion. The key chain is omitted in the proposed scheme. In addition, the magnitudes of 1 in the tolerant error range are fully used to improve the hiding capacity. Furthermore, all types of embedding data are processed in the same way. The experimental results show the validity of the proposed scheme and also demonstrate that redundant data are reduced and more hiding capacity can be achieved.
    Relation: Imaging Science Journal 53(4):199-208
    Appears in Collections:[資訊工程學系] 期刊論文

    Files in This Item:

    File Description SizeFormat
    0KbUnknown511View/Open
    310904400-6531.doc41KbMicrosoft Word210View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback