Open Access Journals Promotions

Submit Manuscript Other Thematic Issue Proposal Browse Thematic Issue Become a Reviewer
Share this:

Visibility on Science Direct (Elsevier) also if published as Open Access.

Member Institutions enjoy complementary or discounted APCs.

Quick and simple submission process.

Next-Generation Healthcare and Secure Medical Imaging: Advances in Authentication, Privacy, and Data Management

Journal: Current Medical Imaging
Guest Editor(s): Dr. Sushil Kumar Singh
Co-Guest Editor(s): Dr. Rajendrasinh Jadeja,Dr. Manish Kumar
Submission closes on: 24th January, 2026

Submit Manuscript
Impact Factor Current: 1.1
5 - Year: 1
View Impact Factor Journals
Scopus CiteScore2.6 View Details

Introduction

Background and Motivation: The rapid digitization of healthcare systems has driven an unprecedented reliance on Medical Imaging (MI) technologies such as X-rays, Ultrasound, Computed Tomography (CT), and Medical Resonance Imaging (MRI) for accurate diagnosis, treatment planning, and disease monitoring. With the proliferation of telemedicine and Internet of Medical Things (IoMT) devices, medical images are increasingly transmitted, analyzed, and stored across interconnected networks. While this shift enables real-time collaboration and improved patient outcomes, it also raises necessary concerns about data security, privacy, and authentication. Sensitive patient information is vulnerable to cyber threats, unauthorized access, and data tampering, which can undermine the trustworthiness of healthcare systems and violate stringent regulatory frameworks such as the Health Insurance Portability and Accountability Act (HIPAA) and General Data Protection Regulation (GDPR). Emerging technologies such as Blockchain (BT), Federated Learning (FL), Quantum Machine Learning (QML), and Digital Twin (DT) services offer transformative solutions for addressing these challenges. BT provides immutable and decentralized ledgers for secure medical image authentication and provenance tracking. FL enables collaborative model training on distributed datasets without compromising data privacy, making it ideal for multi-institutional medical imaging studies. QML holds the potential to revolutionize the computational aspects of medical imaging, offering enhanced security and faster analytics. Meanwhile, DT of imaging workflows can simulate, monitor, and optimize image transmission and storage processes, ensuring efficiency and resilience. In telemedicine, these technologies are pivotal in securely transmitting medical images, enabling privacy-preserving remote diagnosis, and integrating diverse healthcare systems. They not only safeguard sensitive patient data but also ensure its integrity and availability, fostering patient and provider trust in digital healthcare ecosystems. This Special Issue, titled "Next-Generation Healthcare and Secure Medical Imaging: Advances in Authentication, Privacy, and Data Management," aims to explore and showcase innovative frameworks for secure and privacy-preserving medical imaging. The primary objective is to address the pressing challenges of authentication, privacy, and data management by leveraging advanced technologies such as blockchain, federated learning, quantum machine learning, and digital twins. Researchers and practitioners are invited to present their advancements and applications of these next-generation technologies, bridging the gap between theoretical innovation and practical implementation in healthcare.

Keywords

Medical Imaging, Next-Generation Healthcare, Security and Privacy, Data Management, Authentication, Internet of Medical Things, Telemedicine

Sub-topics


• Threat Analysis in Secure MI Systems
• Edge Computing Security for MI Processing
• Secure Communication Protocols for MI Transmission
• Biometric Authentication for MI Access
• Intrusion Detection and Prevention Systems (IDPS) for MI Networks
• Blockchain-Based Secure Architecture for MI Management
• Trust Management in MI Data Sharing
• Privacy-Preserving Techniques for MI Storage and Analysis
• Multi-factor Authentication for MI Systems
• AI-Driven Threat Detection in MI Networks
• Human-Centric Security for MI Workflows
• Machine Learning and AI for Secure MI
© 2025 Bentham Science Publishers | Privacy Policy