Block diagram reduction techniques in control systems.ppt
A Review of Secure Health Monitoring Framework
1. A Review of Secure Health Monitoring
Framework
GUIDED BY:-
DR.NAYEEMULLAH KHAN
SUBMITTED BY:-
SATYAM KUMAR CHOURASIYA
16MCA1038
2. ABSTRACT:-
As Health care grows more complex,
stockpiling and accessibility of restorative
information is beneficial and additionally
essential. Here we exhibit review of
biometric method and algorithm to make
unique to be used for patient ID as a part
of the Electronic Health Record framework
for India
3. INTRODUCTION
Electronic Health Record (EHR) frameworks assume a
crucial part in empowering innovation driven health care
services. They have picked up significance attributable to
the expanding need of institutionalization for ubiquitous
provisioning of health care services. As of late, EHR
models have been discharged by the Government of India
thro, ugh the Ministry of Health and Family Welfare Under
its order, it has been proposed to build up an optional
identifier, which would be utilized for patients crosswise
over therapeutic offices in India
4. MOTIVATION:-
The core motivation for the review of secure health monitoring
framework related systems is the improvement of care quality. Access
to updated patient information by the care provider would allow
better diagnostic, treatment decisions, and follow up, including
tracking medical errors. Patients would also be more able to move
between care providers, looking for the best health service, or to carry
health self management with increased support from monitoring
devices and social support, so that society is steadily moving towards
the Personally Controlled EHR for the management of lifelong health
information
5. OBJECTIVE OF PROJECT
The main objective of this project is:-
Analysis of unique id generator mechanism &
biometrics method.
patient enhances administrative efficiency
increases the opportunity for medical
research.
Find disadvantage of current existing EHR .
6. ADVANTAGE
Very high accuracy
Easy to use
Small storage required for the biometric
template
Data security is high
7. Literature survey
[1] Julio Cesar dos Reis , Intention-based Information Retrieval
of Electronic Health Records,[2016] Institute of Computing,
University of Campinas Campinas, São Paulo, Brazil
julio.dosreis@ic.unicamp.br
This paper deal with security of Electronic health record . problem
faced by health care professional to recover and select relevant data
8. [2] Norhaiza Bt Ya Abdullah1 , Folder Lock by using Multimodal Biometric:
Fingerprint and Signature Authentication[2015] Malaysian Institute
Information Technology (MIIT) Universitiy Kuala Lumpur ( UniKL) 1016, Jalan
Sultan Ismail, 50250 Kuala Lumpur, Malaysia norhaizaya@unikl.edu.my
This paper deal with biometric method for security of Electronic
Health record .
9. [3] Sumit Soman ∗, Praveen Srivastava † and B K Murthy ‡,Unique Health
Identifier for India: An Algorithm and Feasibility Analysis on Patient
Data,[2015]Centre for Development of Advanced Computing, Noida,
This paper deal with algorithm to generate unique id for patient.
10. WORK PROPOSED
Including different algorithm for
authentication .They all are good but
not unique .a framework need much
more to be secure such as fingerprint
textures which can detect fingerprint
texture are alive or dead...
11. references
[1] Julio Cesar dos Reis , Intention-based Information Retrieval of
Electronic Health Records,[2016] Institute of Computing, University of
Campinas Campinas, São Paulo, Brazil julio.dosreis@ic.unicamp.br
[2] Norhaiza Bt Ya Abdullah1 , Folder Lock by using Multimodal Biometric:
Fingerprint and Signature Authentication[2015] Malaysian Institute Information
Technology (MIIT) Universitiy Kuala Lumpur ( UniKL) 1016, Jalan Sultan Ismail,
50250 Kuala Lumpur, Malaysia norhaizaya@unikl.edu.my
[3] Sumit Soman ∗, Praveen Srivastava † and B K Murthy ‡,Unique Health Identifier
for India: An Algorithm and Feasibility Analysis on Patient Data,[2015]Centre for
Development of Advanced Computing, Noida, India
[4] ShradhaParashar1,ShaziyaParveen2 and Izharuddin3 An Electronic Health
Record for Medical Signal using Spread Data Hiding [2011] 1 M.tech Student,
Computer Engineering, AMU, Aligarh, India,shradhaparashar@gmail.com1, 2
M.tech
12. continue
[5] H. M. Chao', S. H Twu', and C. M. Hsu2 , A SECURE IDENTIFICATION ACCESS CONTROL
SCHEME FOR ACCESSING HEALTHCARE INFORMATION SYSTEMS[2003] ' Department of
Electrical Engineering, Chung Yuan Christian University, Chung-Li, Taiwan, R.O.C. E-mail:
hmcst@,sitc.edu.tw and abraham@,cycu.edu.tw Department of Electronic Engineering, De-Lin
Institute of Technology, Taipei County, Taiwan, ROC E-mail: cmh@,sitc.edu.tw
[6] Mar´ıa del Pilar Angeles, Adri´an EspinoGamez, Jonathan Gil-Moncada, Comparison of a
Modified Spanish phonetic, Soundex, and Phonex coding functions during data matching
process[2015] Facultad de Ingenier´ıa Universidad Nacional Aut´onoma de M´exico M´exico,
D.F. Email: pilarang@unam.mx, adriespingam@gmail.com, jonathaneumir@gmail.com