The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.11 - Nov. (2012 vol.24)
pp: 1950-1962
M. Kamran , National University of Computer and Emerging Sciences, Islamabad
Muddassar Farooq , National University of Computer and Emerging Sciences, Islamabad
ABSTRACT
Recently, a significant amount of interest has been developed in motivating physicians to use e-health technology (especially Electronic Medical Records (EMR) systems). An important utility of such EMR systems is: a next generation of Clinical Decision Support Systems (CDSS) will extract knowledge from these electronic medical records to enable physicians to do accurate and effective diagnosis. It is anticipated that in future such medical records will be shared through cloud among different physicians to improve the quality of health care. Therefore, right protection of medical records is important to protect their ownership once they are shared with third parties. Watermarking is a proven well-known technique to achieve this objective. The challenges associated with watermarking of EMR systems are: 1) some fields in EMR are more relevant in the diagnosis process; as a result, small variations in them could change the diagnosis, and 2) a misdiagnosis might not only result in a life threatening scenario but also might lead to significant costs of the treatment for the patients. The major contribution of this paper is an information-preserving watermarking scheme to address the above-mentioned challenges. We model the watermarking process as a constrained optimization problem. We demonstrate, through experiments, that our scheme not only preserves the diagnosis accuracy but is also resilient to well-known attacks for corrupting the watermark. Last but not least, we also compare our scheme with a well-known threshold-based scheme to evaluate relative merits of a classifier. Our pilot studies reveal that—using proposed information-preserving scheme—the overall classification accuracy is never degraded by more than 1 percent. In comparison, the diagnosis accuracy, using the threshold-based technique, is degraded by more than 18 percent in a worst case scenario.
INDEX TERMS
Watermarking, Databases, Medical diagnostic imaging, Optimization, Medical services, Feature extraction, Mathematical model, medical data watermarking, Right protection, EMR, watermarking, decision support systems, optimization problems, particle swarm optimization
CITATION
M. Kamran, Muddassar Farooq, "An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems", IEEE Transactions on Knowledge & Data Engineering, vol.24, no. 11, pp. 1950-1962, Nov. 2012, doi:10.1109/TKDE.2011.223
REFERENCES
[1] A. Feldstein, P. Elmer, D. Smith, M. Herson, E. Orwoll, C. Chen, M. Aickin, and M. Swain, "Electronic Medical Record Reminder Improves Osteoporosis Management After a Fracture: A Randomized, Controlled Trial," J. Am. Geriatrics Soc., vol. 54, no. 3, pp. 450-457, 2006.
[2] http://www.amconmag.com/article/2009/mar/ 0900009/, last accessed on Jan. 2011.
[3] "Electronic Health Records: A Journey to Next Generation Healthcare," http://www.cognizant.com/html/content/ bluepapers WP_EHR.pdf, last accessed on Jan. 2011.
[4] B. Alhaqbani and C. Fidge, "Privacy-Preserving Electronic Health Record Linkage Using Pseudonym Identifiers," Proc. 10th Int'l Conf. e-Health Networking, Applications and Services, pp. 108-117, 2008.
[5] M. Peleg, D. Beimel, D. Dori, and Y. Denekamp, "Situation-Based Access Control: Privacy Management via Modeling of Patient Data Access Scenarios," J. Biomedical Informatics, vol. 41, no. 6, pp. 1028-1040, 2008.
[6] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records," Proc. ACM Workshop Cloud Computing Security, pp. 103-114, 2009.
[7] "Emr Data Theft Booming," http://www.informationweek.com/news/healthcare/ security-privacyshowArticle.jhtml?articleID= 224200494 , last accessed on 2011.
[8] http://www.dailymail.co.uk/newsarticle-1221186 , last accessed on 2011.
[9] http://www.medicexchange.com/EMRemr-data-theft- increasing-in-us.html , last accessed on 2010.
[10] "Emr Data Theft Booming," http://www.healthcareitnews.com/newspatients-sue-walgreens-making-money-their-data , last accessed on 2011.
[11] http://www.theregister.co.uk/2005/04/15ralph_lauren_loses_ data /, last accessed on 2011.
[12] R. Agrawal and J. Kiernan, "Watermarking Relational Databases," Proc. 28th Int'l Conf. Very Large Data Bases, pp. 155-166, 2002.
[13] R. Sion, M. Atallah, and S. Prabhakar, "Rights Protection for Relational Data," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 12, pp. 1509-1525, Dec. 2004.
[14] M. Shehab, E. Bertino, and A. Ghafoor, "Watermarking Relational Databases Using Optimization-Based Techniques," IEEE Trans. Knowledge and Data Eng., vol. 20, no. 1, pp. 116-129, Jan. 2008.
[15] R. Agrawal, P. Haas, and J. Kiernan, "Watermarking Relational Data: Framework, Algorithms and Analysis," The VLDB J., vol. 12, no. 2, pp. 157-169, 2003.
[16] V. Pournaghshband, "A New Watermarking Approach for Relational Data," Proc. 46th Ann. ACM Southeast Regional Conf., pp. 127-131, 2008.
[17] R. Hassan, B. Cohanim, O. De Weck, and G. Venter, "A Comparison of Particle Swarm Optimization and the Genetic Algorithm," Proc. 46th AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics, and Materials Conf., pp. 1-13, 2005.
[18] E. Zitzler, K. Deb, and L. Thiele, "Comparison of Multiobjective Evolutionary Algorithms: Empirical Results," Evolutionary Computation, vol. 8, no. 2, pp. 173-195, 2000.
[19] X. Cui, X. Qin, and G. Sheng, "A Weighted Algorithm for Watermarking Relational Databases," Wuhan Univ. J. Natural Sciences, vol. 12, no. 1, pp. 79-82, 2007.
[20] Y. Li, H. Guo, and S. Jajodia, "Tamper Detection and Localization for Categorical Data Using Fragile Watermarks," Proc. Fourth ACM Workshop Digital Rights Management, pp. 73-82, 2004.
[21] Y. Li, V. Swarup, and S. Jajodia, "Fingerprinting Relational Databases: Schemes and Specialties," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.
[22] C. Jiang, X. Chen, and Z. Li, "Watermarking Relational Databases for Ownership Protection Based on DWT," Proc. Fifth Int'l Conf. Information Assurance and Security, vol. 1, pp. 305-308, 2009.
[23] J. Holland, "Genetic Algorithms," Scientific Am., vol. 267, no. 1, pp. 66-72, 1992.
[24] R. Lewis and V. Torczon, Pattern Search Methods for Linearly Constrained Minimization. Inst. for Computer Applications in Science, and Eng. NASA Langley Research Center, 1998.
[25] E. Bertino, B. Ooi, Y. Yang, and R. Deng, "Privacy and Ownership Preserving of Outsourced Medical Data," Proc. 21st Int'l Conf. Data Eng. (ICDE '05), pp. 521-532, 2005.
[26] M. Afridi and M. Farooq, "OG-Miner: An Intelligent Health Tool For Achieving Millennium Development Goals (MDGs) in M-Health Environments," Proc. 44th Hawaii Int'l Conf. Systems Sciences, 2011.
[27] T. Mitchell, Machine Learning. Mac Graw Hill, 1997.
[28] J. Kennedy et al., "Particle Swarm Optimization," Proc. IEEE Int'l Conf. Neural Networks, vol. 4, pp. 1942-1948, 1995.
[29] G. Renner and A. Ekart, "Genetic Algorithms in Computer Aided Design," Computer-Aided Design, vol. 35, no. 8, pp. 709-726, 2003.
[30] E. Elbeltagi, T. Hegazy, and D. Grierson, "Comparison among Five Evolutionary-Based Optimization Algorithms," Advanced Eng. Informatics, vol. 19, no. 1, pp. 43-53, 2005.
[31] T. Anderson and T. Anderson, An Introduction to Multivariate Statistical Analysis. Wiley, 1958.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool