Skip to main content
Top
Published in: Journal of Medical Systems 4/2017

01-04-2017 | Mobile & Wireless Health

A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine

Authors: M. A. Murillo-Escobar, L. Cardoza-Avendaño, R. M. López-Gutiérrez, C. Cruz-Hernández

Published in: Journal of Medical Systems | Issue 4/2017

Login to get access

Abstract

Recently, telemedicine offers medical services remotely via telecommunications systems and physiological monitoring devices. This scheme provides healthcare delivery services between physicians and patients conveniently, since some patients can not attend the hospital due to any reason. However, transmission of information over an insecure channel such as internet or private data storing generates a security problem. Therefore, authentication, confidentiality, and privacy are important challenges in telemedicine, where only authorized users should have access to medical or clinical records. On the other hand, chaotic systems have been implemented efficiently in cryptographic systems to provide confidential and privacy. In this work, we propose a novel symmetric encryption algorithm based on logistic map with double chaotic layer encryption (DCLE) in diffusion process and just one round of confusion-diffusion for the confidentiality and privacy of clinical information such as electrocardiograms (ECG), electroencephalograms (EEG), and blood pressure (BP) for applications in telemedicine. The clinical signals are acquired from PhysioBank data base for encryption proposes and analysis. In contrast with recent schemes in literature, we present a secure cryptographic algorithm based on chaos validated with the most complete security analysis until this time. In addition, the cryptograms are validated with the most complete pseudorandomness tests based on National Institute of Standards and Technology (NIST) 800-22 suite. All results are at MATLAB simulations and all them show the effectiveness, security, robustness, and the potential use of the proposed scheme in telemedicine.
Literature
1.
go back to reference WHO: A health telematics policy in support of WHO’s Health-For-All strategy for global health development report of the WHO group consultation on health telematics. World Health Organization, 11-16 December, Geneva, Switzerland (1998) WHO: A health telematics policy in support of WHO’s Health-For-All strategy for global health development report of the WHO group consultation on health telematics. World Health Organization, 11-16 December, Geneva, Switzerland (1998)
2.
go back to reference Vergeles-Blanca, J. M., La telemedicina. Desarrollo, ventajas y dudas. Búsqueda Bibliográfica. Internet y las Nuevas Tecnologías, 59–61 (2011) Vergeles-Blanca, J. M., La telemedicina. Desarrollo, ventajas y dudas. Búsqueda Bibliográfica. Internet y las Nuevas Tecnologías, 59–61 (2011)
3.
go back to reference Chaudhry, S. A., Mahmood, K., Naqvi, H., Khan, M. K., An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography. J Med Syst 39(11): 1–12, 2015.CrossRef Chaudhry, S. A., Mahmood, K., Naqvi, H., Khan, M. K., An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography. J Med Syst 39(11): 1–12, 2015.CrossRef
4.
go back to reference Torres-García, A. A., Reyes-García, C. A., Villaseńor-Pineda, L., Ramírez-Cortés, J. M., Análisis de seńales electroencefalográficas para la clasificación de habla imaginada. Revista Mexicana de Ingeniería Biomédica 34(1): 23–39, 2013. Torres-García, A. A., Reyes-García, C. A., Villaseńor-Pineda, L., Ramírez-Cortés, J. M., Análisis de seńales electroencefalográficas para la clasificación de habla imaginada. Revista Mexicana de Ingeniería Biomédica 34(1): 23–39, 2013.
5.
go back to reference Cui, D.: A novel fingerprint encryption algorithm based on chaotic system and fractional fourier transform. International Conference on Machine Vision and Human-machine Interface, 168–171, 2010. Cui, D.: A novel fingerprint encryption algorithm based on chaotic system and fractional fourier transform. International Conference on Machine Vision and Human-machine Interface, 168–171, 2010.
6.
go back to reference Murillo-Escobar, M. A., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R. M., Acosta Del Campo, O. R., A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109: 119–131, 2015.CrossRef Murillo-Escobar, M. A., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R. M., Acosta Del Campo, O. R., A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109: 119–131, 2015.CrossRef
7.
go back to reference Murillo-Escobar, M. A., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R. M., A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Syst Appl 42: 8198–8211, 2015.CrossRef Murillo-Escobar, M. A., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R. M., A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Syst Appl 42: 8198–8211, 2015.CrossRef
8.
go back to reference Patidar, V., Pareek, N. K., Sud, K. K., A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci 14: 3056–3075, 2009.CrossRef Patidar, V., Pareek, N. K., Sud, K. K., A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci 14: 3056–3075, 2009.CrossRef
9.
go back to reference Zhou, Y., Bao, L., PhilipChen, C., New 1d chaotic system for image encryption. Signal Process 97: 172–182, 2014.CrossRef Zhou, Y., Bao, L., PhilipChen, C., New 1d chaotic system for image encryption. Signal Process 97: 172–182, 2014.CrossRef
10.
go back to reference Khan, M. K., Zhang, J., Tian, L., Chaotic secure content-based hidden transmission of biometric templates. Chaos, Soliton Fract 32: 1749–1759, 2007.CrossRef Khan, M. K., Zhang, J., Tian, L., Chaotic secure content-based hidden transmission of biometric templates. Chaos, Soliton Fract 32: 1749–1759, 2007.CrossRef
11.
go back to reference Murillo-Escobar, M. A., Abundiz-Pérez, F., Cruz-Hernández, C., and López-Gutiérrez R. M.: A novel symmetric text encryption algorithm based on logistic map. Proceedings of the International Conference on Communications, Signal Processing and Computers, 49–53, 2014. Murillo-Escobar, M. A., Abundiz-Pérez, F., Cruz-Hernández, C., and López-Gutiérrez R. M.: A novel symmetric text encryption algorithm based on logistic map. Proceedings of the International Conference on Communications, Signal Processing and Computers, 49–53, 2014.
12.
go back to reference Murillo-Escobar, M. A., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R. M., Implementation of an improved chaotic encryption algorithm for real-time embedded d systems by using a 32-bit microcontroller. Microprocess Microsy 45: 297–309, 2016.CrossRef Murillo-Escobar, M. A., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R. M., Implementation of an improved chaotic encryption algorithm for real-time embedded d systems by using a 32-bit microcontroller. Microprocess Microsy 45: 297–309, 2016.CrossRef
13.
go back to reference Murillo-Escobar M. A., Cardoza-Avendaño L., López-Gutiérrez R. M., and Cruz-Hernández C.: Cifrado caótico simétrico de ECG y EEG para aplicaciones en telemedicina. XVII CLCA Latin American Conference of Automatic Control, 612–617, 2016. Murillo-Escobar M. A., Cardoza-Avendaño L., López-Gutiérrez R. M., and Cruz-Hernández C.: Cifrado caótico simétrico de ECG y EEG para aplicaciones en telemedicina. XVII CLCA Latin American Conference of Automatic Control, 612–617, 2016.
14.
go back to reference Alvarez, G., and Li, S., Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(8): 2129–2151, 2006.CrossRef Alvarez, G., and Li, S., Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(8): 2129–2151, 2006.CrossRef
15.
go back to reference Chen, H.-M., Lo, J.-W., Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J Med Syst 36(6): 3907–3915, 2012.CrossRefPubMed Chen, H.-M., Lo, J.-W., Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J Med Syst 36(6): 3907–3915, 2012.CrossRefPubMed
16.
go back to reference Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(2): 1–7, 2013.CrossRef Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(2): 1–7, 2013.CrossRef
17.
go back to reference Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J Med Syst 37(1): 1–8, 2013.CrossRef Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J Med Syst 37(1): 1–8, 2013.CrossRef
18.
go back to reference Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J Med Syst 37(5): 1–6, 2013.CrossRef Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J Med Syst 37(5): 1–6, 2013.CrossRef
19.
go back to reference Das, A. K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J Med Syst 37(3): 1–16, 2013.CrossRef Das, A. K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J Med Syst 37(3): 1–16, 2013.CrossRef
20.
go back to reference Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J Med Syst 37(5): 1–4, 2013.CrossRef Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J Med Syst 37(5): 1–4, 2013.CrossRef
21.
go back to reference Lin, H.-Y., Chaotic map based mobile dynamic ID authenticated key agreement scheme. Wireless Pers Commun 78: 1487–1494, 2014.CrossRef Lin, H.-Y., Chaotic map based mobile dynamic ID authenticated key agreement scheme. Wireless Pers Commun 78: 1487–1494, 2014.CrossRef
22.
go back to reference Lu, Y., Li, L., Peng, H., Xie, D., Yang, Y., Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. J Med Syst 39(6): 1–10, 2015.CrossRef Lu, Y., Li, L., Peng, H., Xie, D., Yang, Y., Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. J Med Syst 39(6): 1–10, 2015.CrossRef
23.
go back to reference Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J Med Syst 37(2): 1–8, 2013.CrossRef Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J Med Syst 37(2): 1–8, 2013.CrossRef
24.
go back to reference Yau, W.-C., and Phan, R.C.-W., Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(6): 1–9, 2013.CrossRef Yau, W.-C., and Phan, R.C.-W., Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(6): 1–9, 2013.CrossRef
25.
go back to reference Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of A privacy enhanced scheme for telecare medical information systems. J Med Syst 37(4): 1–11, 2013.CrossRef Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of A privacy enhanced scheme for telecare medical information systems. J Med Syst 37(4): 1–11, 2013.CrossRef
26.
go back to reference Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems. J Med Syst 38(6): 1–12, 2014.CrossRef Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems. J Med Syst 38(6): 1–12, 2014.CrossRef
27.
go back to reference Kim, K.-W., and Lee, J.-D., On the security of two remote user authentication schemes for telecare medical information systems. J Med Syst 38(5): 1–11, 2014.CrossRef Kim, K.-W., and Lee, J.-D., On the security of two remote user authentication schemes for telecare medical information systems. J Med Syst 38(5): 1–11, 2014.CrossRef
28.
go back to reference Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2): 1–8, 2014.CrossRef Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2): 1–8, 2014.CrossRef
29.
go back to reference Wang, Z., Huo, Z., Shi, W., A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems. J Med Syst 39(1): 1–8, 2015. Wang, Z., Huo, Z., Shi, W., A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems. J Med Syst 39(1): 1–8, 2015.
30.
go back to reference Lee, C.-C., and Hsu, C.-W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71: 201–211, 2013.CrossRef Lee, C.-C., and Hsu, C.-W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71: 201–211, 2013.CrossRef
31.
go back to reference Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J Med Syst 38(6): 1–19, 2014.CrossRef Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J Med Syst 38(6): 1–19, 2014.CrossRef
32.
go back to reference Nayak, J., Subbanna Bhat, P., Acharya, U. R., Sathish Kumar, M., Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. J Med Syst 33: 163–171, 2009.CrossRefPubMed Nayak, J., Subbanna Bhat, P., Acharya, U. R., Sathish Kumar, M., Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. J Med Syst 33: 163–171, 2009.CrossRefPubMed
33.
go back to reference Nayak, J., Subbanna Bhat, P., Acharya, U. R., Niranjan, U. C., Simultaneous storage of medical images in the spatial and frequency domain: a comparative study. BioMed Eng OnLine 3: 1–10, 2004.CrossRef Nayak, J., Subbanna Bhat, P., Acharya, U. R., Niranjan, U. C., Simultaneous storage of medical images in the spatial and frequency domain: a comparative study. BioMed Eng OnLine 3: 1–10, 2004.CrossRef
34.
go back to reference Acharya, U. R., Niranjanb, U. C., Iyengarc, S. S., Kannathala, N., Mina, L. C., Simultaneous storage of patient information with medical images in the frequency domain. Comput Meth Prog Bio 76: 13–19, 2004.CrossRef Acharya, U. R., Niranjanb, U. C., Iyengarc, S. S., Kannathala, N., Mina, L. C., Simultaneous storage of patient information with medical images in the frequency domain. Comput Meth Prog Bio 76: 13–19, 2004.CrossRef
35.
go back to reference Acharya, U. R., Subbanna Bhat, P., Kumarc, S., Mina, L. C., Transmission and storage of medical images with patient information. Comput Biol Med 33: 303–310, 2003.CrossRef Acharya, U. R., Subbanna Bhat, P., Kumarc, S., Mina, L. C., Transmission and storage of medical images with patient information. Comput Biol Med 33: 303–310, 2003.CrossRef
36.
go back to reference Acharya, U. R., Subbanna Bhat, P., Kumarc, S., Mina, L. C., Compact storage of medical images with patient information. IEEE T Inf Technol B 5(4): 320–323, 2001.CrossRef Acharya, U. R., Subbanna Bhat, P., Kumarc, S., Mina, L. C., Compact storage of medical images with patient information. IEEE T Inf Technol B 5(4): 320–323, 2001.CrossRef
37.
go back to reference Raeiatibanadkooki, M., Quchani, S. R., KhalilZade, M., Bahaadinbeigy, K., Compression and encryption of ECG signal using wavelet and chaotically huffman code in telemedicine application. J Med Syst 40(3): 1–8, 2016.CrossRef Raeiatibanadkooki, M., Quchani, S. R., KhalilZade, M., Bahaadinbeigy, K., Compression and encryption of ECG signal using wavelet and chaotically huffman code in telemedicine application. J Med Syst 40(3): 1–8, 2016.CrossRef
38.
go back to reference Lin, C.-F., Chaotic visual cryptosystem using empirical mode decomposition algorithm for clinical EEG signals. J Med Syst 40(3): 1–10, 2016. Lin, C.-F., Chaotic visual cryptosystem using empirical mode decomposition algorithm for clinical EEG signals. J Med Syst 40(3): 1–10, 2016.
39.
go back to reference Kenfack, G., and Tiedeu, A., Chaos-based encryption of ECG signals: experimental results. J Biomed Sci Eng 7: 368–379, 2014.CrossRef Kenfack, G., and Tiedeu, A., Chaos-based encryption of ECG signals: experimental results. J Biomed Sci Eng 7: 368–379, 2014.CrossRef
40.
go back to reference Lin, C.-F., Shih, S.-H., Zhu, J.-D., Chaos based encryption system for encrypting electroencephalogram signals. J Med Syst 38(5): 1–10, 2014. Lin, C.-F., Shih, S.-H., Zhu, J.-D., Chaos based encryption system for encrypting electroencephalogram signals. J Med Syst 38(5): 1–10, 2014.
41.
go back to reference Chen, C.-K., Lin, C.-L., Chiang, C.-T., Lin, S.-L., Personalized information encryption using ECG signals with chaotic functions. Inform Sciences 193: 125–140, 2012.CrossRef Chen, C.-K., Lin, C.-L., Chiang, C.-T., Lin, S.-L., Personalized information encryption using ECG signals with chaotic functions. Inform Sciences 193: 125–140, 2012.CrossRef
42.
go back to reference Lin, C.-F., and Chang, C.-Y., Implementation of a chaos-based encryption software for electroencephalogram signals. Advances in ECWAC 1: 147–150, 2012. Lin, C.-F., and Chang, C.-Y., Implementation of a chaos-based encryption software for electroencephalogram signals. Advances in ECWAC 1: 147–150, 2012.
43.
go back to reference Sufi, F., Han, F., Khalil, I., Hu, J., A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. Security Comm Networks 4: 515–524, 2011.CrossRef Sufi, F., Han, F., Khalil, I., Hu, J., A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. Security Comm Networks 4: 515–524, 2011.CrossRef
44.
go back to reference Ahmad, M., Farooq, O., Datta, S., Sohail, S. S., Vyas A. L., and Mulvaney D.: 4th International Conference on Biomedical Engineering and Informatics, 1471–1475 (2011) Ahmad, M., Farooq, O., Datta, S., Sohail, S. S., Vyas A. L., and Mulvaney D.: 4th International Conference on Biomedical Engineering and Informatics, 1471–1475 (2011)
45.
go back to reference Lin, C. F., and Wang, B. S. H., A 2D chaos-based visual encryption scheme for clinical EEG signals. J Mar Sci Technol 19(6): 666–672, 2011. Lin, C. F., and Wang, B. S. H., A 2D chaos-based visual encryption scheme for clinical EEG signals. J Mar Sci Technol 19(6): 666–672, 2011.
46.
go back to reference Parveen, S., Parashar, S., Izharuddin: Technique for providing security in medical signals, International Conference on Multimedia, Signal Processing and Communication Technologies, 68–71 (2011) Parveen, S., Parashar, S., Izharuddin: Technique for providing security in medical signals, International Conference on Multimedia, Signal Processing and Communication Technologies, 68–71 (2011)
47.
go back to reference Lin, C.-F., Chung, C.-H., Chen, Z.-L., Song, C.-J., Wang, Z.-X., A chaos-based unequal encryption mechanism in wireless telemedicine with error decryption. WSEAS Transaction on Systems 7(2): 49–55, 2008. Lin, C.-F., Chung, C.-H., Chen, Z.-L., Song, C.-J., Wang, Z.-X., A chaos-based unequal encryption mechanism in wireless telemedicine with error decryption. WSEAS Transaction on Systems 7(2): 49–55, 2008.
48.
go back to reference May, R. M., Simple mathematical models with very complicated dynamics. Nature 261: 459–467, 1976.CrossRefPubMed May, R. M., Simple mathematical models with very complicated dynamics. Nature 261: 459–467, 1976.CrossRefPubMed
49.
go back to reference Wolf, A.: Quantifying chaos with Lyapunov exponents. Princeton University Press, Ch. 13, pp. 273–289 (1986) Wolf, A.: Quantifying chaos with Lyapunov exponents. Princeton University Press, Ch. 13, pp. 273–289 (1986)
50.
go back to reference Sprott, J. C.: Lyapunov exponents. Chaos and time-series analysis Oxford University Press, Ch. 5 (2003) Sprott, J. C.: Lyapunov exponents. Chaos and time-series analysis Oxford University Press, Ch. 5 (2003)
51.
go back to reference Arroyo, D., Alvarez, G., and Fernandez, V.: On the inadequacy of the logistic map for cryptographic applications. X Reunión Española sobre Criptología y Seguridad de la Información, 77–82, 2008. Arroyo, D., Alvarez, G., and Fernandez, V.: On the inadequacy of the logistic map for cryptographic applications. X Reunión Española sobre Criptología y Seguridad de la Información, 77–82, 2008.
52.
go back to reference Cristian-Iulian, R., and Vasile-Gabriel, I., Aspects regarding chaotic maps hardware implementations. Revue Roumaine Des Sciences Techniques 52: 219–227, 2007. Cristian-Iulian, R., and Vasile-Gabriel, I., Aspects regarding chaotic maps hardware implementations. Revue Roumaine Des Sciences Techniques 52: 219–227, 2007.
54.
go back to reference Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST special publication 800–22 (2001) Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST special publication 800–22 (2001)
55.
go back to reference Wang, Z., Lu, L., Bovik, A. C., Video quality assessment based on structural distortion measurement. Signal Process: Image Commun 19(2): 121–132, 2004. Wang, Z., Lu, L., Bovik, A. C., Video quality assessment based on structural distortion measurement. Signal Process: Image Commun 19(2): 121–132, 2004.
Metadata
Title
A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine
Authors
M. A. Murillo-Escobar
L. Cardoza-Avendaño
R. M. López-Gutiérrez
C. Cruz-Hernández
Publication date
01-04-2017
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 4/2017
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-017-0698-3

Other articles of this Issue 4/2017

Journal of Medical Systems 4/2017 Go to the issue