|
Author | Method | Advantages | Disadvantages |
|
Ali et al., [15] | Zero-watermarking algorithm | Increase the encryption and decryption process’s security level | Because some areas in this approach are more important in the diagnostic process, slight changes in them might modify the diagnosis |
|
Kamran and Farooq [16] | Information-preserving watermarking scheme | Excellent performance and on-time delivery | The investigation discovered, however, that the present recommended approaches still had application-specific security issues |
|
Vasanthanayaki [17] | SMCPS | The suggested approach has a fast computational speed | The photos of the patients, on the other hand, are not encrypted |
|
Anand et al., [18] | Compression-then-encryption-based dual watermarking | The suggested technique has demonstrated good encryption and decryption performance, as well as minimal complexity | The investigation discovered, however, that the present recommended approaches still had application-specific security issues |
|
Ding et al., [20] | DeepEDN | The suggested approach is simple to implement | The memory, CPU, and energy budgets are all limited |
|
Hasan et al., [21] | Lightweight encryption algorithm | The suggested system’s encrypted entropy and encryption speed are high, protecting patients’ privacy and boosting the security of medical photos on the cloud | The use of security analytics has the potential to drastically reduce vulnerability concerns. |
|
Yang et al., [22] | RDH | In terms of storage, search, and update difficulty, the approaches are superior | Searching encrypted medical data without decryption, on the other hand, is challenging |
|
Li et al., [23] | SEDSSE | It delivers optimal and lossless picture encryption and decryption, as well as the ability to safeguard medical photos flexibly and reliably | At the low embedding rate, the image contrast does not appear to be boosted |
|
Zhou et al., [24] | A lossless medical image encryption scheme | Reduce the computational load significantly | However, being vulnerable to data manipulation and forgery is a disadvantage |
|
Yang et al., [25], zheng et al., [26], tao and ling [30] | ABE | It protects against known-plaintext/background and linkability attacks while maintaining privacy | However, sharing paper-based medical data between two or more medical institutions was cumbersome and time-consuming |
|
Abdelfattah et al., [27] | Search scheme over encrypted data | Increase the encryption and decryption process’s security level | Smart terminals, on the other hand, are typically restricted in computer capacity, and users’ privacy concerns persist |
|
Chen et al., [28] | NTRU | Excellent performance and on-time delivery | Users’ sensitive information is involved, and communication energy is used |
|
Liu et al., [29] | Singular value decomposition | It necessitated little overheads | This technique, however, has a substantial computing cost since it compares individual keywords in the trapdoor to all of the keywords |
|
Guo et al., [32] | Homomorphic encryption | It features a low computation/communication overhead and a quick search time | However, numerous problems remain in the creation of an online medical prediagnosis system, including medical information leakage and misuse |
|
Niu et al., [31] | Searchable attribute-based encryption | Low computation and transmission overheads are required | However, this results in erroneous search results and the downloading of unnecessary material, which may lead to doctor misdiagnosis |
|