Internet of Things (IoT) applications have penetrated into all aspects of human life. Millions of IoT users and devices, online services, and applications combine to create a complex and ...heterogeneous network, which complicates the digital identity management. Distributed identity is a promising paradigm to solve IoT identity problems and allows users to have soverignty over their private data. However, the existing state-of-the-art methods are unsuitable for IoT due to continuing issues regarding resource limitations for IoT devices, security and privacy issues, and lack of a systematic proof system. Accordingly, in this article, we propose SmartDID, a novel blockchain-based distributed identity aimed at establishing a self-sovereign identity and providing strong privacy preservation. First, we configure IoT devices as light nodes and design a Sybil-resistant, unlinkable, and supervisable distributed identity that does not rely on central identity providers. We further develop a dual-credential model based on commitment and zero-knowledge proofs to protect the privacy of sensitive attributes, on-chain identity data, and linkage of credentials. Moreover, we combine the basic credential proofs to prove the knowledge of solutions to more complex problems and create a systematic proof system. We go on to provide the security analysis of SmartDID. Experimental analysis shows that our scheme achieves better performance in terms of both credential generation and proof generation when compared with CanDID.
Data security becomes more and more important in telemammography which uses a public high-speed wide area network connecting the examination site with the mammography expert center. Generally, ...security is characterized in terms of privacy, authenticity and integrity of digital data. Privacy is a network access issue and is not considered in this paper. The authors present a method, authenticity and integrity of digital mammography, here which can meet the requirements of authenticity and integrity for mammography image (IM) transmission. The authenticity and integrity for mammography (AIDM) consists of the following four modules. (1) Image preprocessing: To segment breast pixels from background and extract patient information from digital imaging and communication in medicine (DICOM) image header. (2) Image hashing: To compute an image hash value of the mammogram using the MD5 hash algorithm. (3) Data encryption: To produce a digital envelope containing the encrypted image hash value (digital signature) and corresponding patient information. (4) Data embedding: To embed the digital envelope into the image. This is done by replacing the least significant bit of a random pixel of the mammogram by one bit of the digital envelope bit stream and repeating for all bits in the bit stream. Experiments with digital IMs demonstrate the following. (1) In the expert center, only the user who knows the private key ran open the digital envelope and read the patient information data and the digital signature of the mammogram transmitted from the examination site. (2) Data integrity can he verified by matching the image hash value decrypted from the digital signature with that computed from the transmitted image. (3) No visual quality degradation is detected in the embedded image compared with the original. The authors' preliminary results demonstrate that AIDM is an effective method for image authenticity and integrity in telemammography application.
Frequently when patient and study identification information (patient name, patient identification, date of birth, sex, and accession number) are manually entered at a modality, typographical errors ...occur that have to be corrected before the acquired images can be matched to the proper patient and study on a picture archiving and communication system (PACS). The Digital Imaging and Communication in Medicine (DICOM) Modality Worklist service alleviates these problems by automatically transferring this data from the radiology information system (RIS) to the image acquisition modality. The technologist then does not have to manually re-enter the data to place it into the image files. With modality worklist, precise patient and study data are obtained and placed into the image headers with no typographical errors. When the images are sent to the PACS, they match the corresponding patient and study records, and are immediately incorporated into the electronic patient record. While modality worklist does replace the manual keying of the data and virtually eliminates typographical problems, it introduces a new source of human error: the incorrect selection of the patient and/or study from the computerized worklist, and the resultant mislabeling of the images. When these mislabeled images are sent to the PACS, they are immediately associated with the wrong patient and/or study, where they potentially may cause serious harm. The goal of this report is to raise awareness to this problem, to identify the major causes of these errors, and to offer some practical suggestions on how to minimize them.
The empirical findings from consumer policy umbrella association Arbeitsgemeinschaft der Verbraucheverbande (AgV) and the German Bio Trust project were presented. The biometric techniques in ...comparison to other identification methods were particularly sensitive and personal. The findings showed that the users expected perceptible added-value from biometrics and they were willing to do without their PIN if the advantages gained were measurable. The results of findings show that safety is also a high priority among users even though they are aware of less than 100% security from biometrics.
This research paper presents a new 2-way doubletype smartcard terminal's and a new system's design and development of the prescription order communication system (POCS) based on the Internet between ...the hospital and the pharmacy, on the public-key infrastructure (PKI), and on the concurrently parallel co-operation with both medical professional's and patient's smart cards in the 2-way doubletype terminal under the synchronized status, in order to control security and privacy of patients and to manage drug histories of them.
The year 2000 market review of the biometrics industry was presented. The successes in the industry were attributed to a number of factors such as the introduction of industry standards, lowering of ...prices to economically sensible levels and Microsoft's intention to use biometrics in Windows. The most important development in 2000 was the continued progress the industry made in the area of revenue generation. The growth rate according to the Biometric Industry Report showed little sign of slowdown and a US$1 billion mark is expected to be crossed at some point during 2003.
While much of diagnostic radiology is practiced in a private setting, many of the papers and presentations describing picture archiving and communications systems (PACS) implementation to date have ...been sponsored by university and government health facilities. We will present a 4-year retrospective review of a private practice PACS project. The challenges, benefits, and cost analysis of the PACS project will be presented.
Safe, autonomous mobility in rough terrain is an important requirement for planetary exploration rovers. Knowledge of local terrain properties is critical to ensure a rover's safety on slopes and ...uneven surfaces. This paper presents a method to classify terrain based on vibrations induced in the rover structure by wheel-terrain interaction during driving. Vibrations are measured using an accelerometer on the rover structure. The classifier is trained using labeled vibration data during an off-line learning phase. Linear discriminant analysis is used for on-line identification of terrain classes such as sand, gravel, or clay. This approach is experimentally validated on a laboratory testbed.
In this paper we describe an access control model for multilevel-security documents, those structured into multiple sections based on certain security classifications. Our access control system uses ...XACML policies to allow documents, whose contents have varying sensitivity levels, to be created, viewed, and edited by groups that have members with varying clearance levels, while enforcing the required security constraints.