Reference Hub2
An Innovative Approach to Solve Healthcare Issues Using Big Data Image Analytics

An Innovative Approach to Solve Healthcare Issues Using Big Data Image Analytics

Ramesh R., Udayakumar E., Srihari K., Sunil Pathak P.
Copyright: © 2021 |Volume: 6 |Issue: 1 |Pages: 11
ISSN: 2379-738X|EISSN: 2379-7371|EISBN13: 9781799862987|DOI: 10.4018/IJBDAH.20210101.oa2
Cite Article Cite Article

MLA

Ramesh R., et al. "An Innovative Approach to Solve Healthcare Issues Using Big Data Image Analytics." IJBDAH vol.6, no.1 2021: pp.15-25. http://doi.org/10.4018/IJBDAH.20210101.oa2

APA

Ramesh R., Udayakumar E., Srihari K., & Sunil Pathak P. (2021). An Innovative Approach to Solve Healthcare Issues Using Big Data Image Analytics. International Journal of Big Data and Analytics in Healthcare (IJBDAH), 6(1), 15-25. http://doi.org/10.4018/IJBDAH.20210101.oa2

Chicago

Ramesh R., et al. "An Innovative Approach to Solve Healthcare Issues Using Big Data Image Analytics," International Journal of Big Data and Analytics in Healthcare (IJBDAH) 6, no.1: 15-25. http://doi.org/10.4018/IJBDAH.20210101.oa2

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The increasing adoption of transmission of medical images through internet in healthcare has led to several security threats to patient medical information. Permitting quiet data to be in peril may prompt hopeless harm, ethically and truly to the patient. Accordingly, it is important to take measures to forestall illicit access and altering of clinical pictures. This requests reception of security components to guarantee three fundamental security administrations – classification, content-based legitimacy, and trustworthiness of clinical pictures traded in telemedicine applications. Right now, inside created symmetric key cryptographic capacities are utilized. Pictorial model-based perceptual image hash is used to provide content-based authentication for malicious tampering detection and localization. The presentation of the projected algorithm has been evaluated using performance metrics such as PSNR, normalized correlation, entropy, and histogram analysis, and the simulation results show that the security services have been achieved effectively.