LEADER 03451oam 22005173 450 001 9911007129703321 005 20231122211318.0 010 $a1-83724-476-6 010 $a1-5231-5344-X 010 $a1-83953-526-1 035 $a(CKB)4100000012898291 035 $a(MiAaPQ)EBC30294622 035 $a(Au-PeEL)EBL30294622 035 $a(NjHacI)994100000012898291 035 $a(BIP)085278758 035 $a(OCoLC)1356006198 035 $a(EXLCZ)994100000012898291 100 $a20221220d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMedical information processing and security $etechniques and applications /$fedited by Amit Kumar Singh, Huiyu Zhou 205 $a1st ed. 210 1$aStevenage :$cInstitution of Engineering & Technology,$d2023. 210 4$dİ2022. 215 $a1 online resource (382 pages) 225 1 $aHealthcare Technologies 311 08$a1-83953-525-3 327 $aChapter 1: Introduction to medical information processing and security: techniques and applicationsChapter 2: Prediction of complications in spine surgery using machine learning: a Health 4.0 study on National Surgical Quality Improvement Program beyond logistic regression modelChapter 3: Recent trends in histopathological image analysisChapter 4: Terahertz imaging in healthcareChapter 5: The current state of summarization and visualization in Electronic Health Record (EHR) based on EHR interoperabilityChapter 6: EEG signal classification using robust energy-based least squares projection twin support vector machinesChapter 7: Clustering-based medical image segmentation: a surveyChapter 8: Artificial intelligence for genomics: a look into itChapter 9: Research on security of anonymous communication in wireless healthcare online systemChapter 10: A comprehensive study on the security of medical information using encryptionChapter 11: Electrocardiogram-based dual watermarking scheme for healthcare applicationsChapter 12: Application of autoencoder in craniofacial reconstruction of forensic medicineChapter 13: Security and Privacy in smart Internet of Things environments for well-being in the healthcare industryChapter 14: A survey of medical image watermarking: state-of-the-art and research directionsChapter 15: Secure communication and privacy preserving for medical systemChapter 16: Secure medical image encryption algorithm for e-healthcare applicationsChapter 17: Conclusion and future directions. 330 $aThis edited book covers novel techniques and solutions that provide medical information processing and security for smart healthcare applications. It covers the recent trends in the field of medical information processing and focuses on new security approaches and privacy solutions for smart healthcare applications. 410 0$aHealthcare Technologies 517 3 $aMedical Information Processing & Security 606 $aMedical informatics$xSecurity measures 615 0$aMedical informatics$xSecurity measures. 676 $a616.0754 701 $aSingh$b Amit Kumar$c(Of Jaypee University of Information Technology)$01824278 701 $aZhou$b Huiyu$01781718 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911007129703321 996 $aMedical information processing and security$94391377 997 $aUNINA