AI-Powered Cybersecurity for Safeguarding Electronic Health Records from Deepfake Biometric Attacks
Keywords:
Electronic Health Records (EHRs), Deepfake Biometric Attacks, AI-Powered Cybersecurity, Biometric Authentication, Generative Adversarial Networks (GANs), Liveness Detection, Behavioural Authentication, Zero Trust, Blockchain Identity Management, Deepfake Detection Models, Synthetic Fingerprint Spoofing, Voice Authentication Attack, Healthcare Cybersecurity, Machine Learning Security, Regulatory Compliance (HIPAA, GDPR, NIST 800-63B)Abstract
The adoption of biometric authentication in Electronic Health Records (EHR) systems enhances security but also introduces new vulnerabilities, particularly from deepfake biometric attacks. This paper introduces an AI-driven cybersecurity framework integrating deepfake detection models, liveness verification, behavioral authentication, Zero Trust security, and blockchain identity management to mitigate these risks. Unlike traditional authentication methods, the proposed framework ensures real-time biometric verification, adaptive risk-based access control, and decentralized identity validation to prevent unauthorized access and identity fraud. By leveraging machine learning algorithms, generative adversarial networks (GANs), and AI-powered anomaly detection, this study demonstrates an improved authentication success rate and a 45% reduction in unauthorized access attempts, ensuring regulatory compliance with HIPAA, GDPR, and NIST 800-63B standards
Downloads
References
M. Alharthi, et al., “AI-powered security mechanisms for EHR authentication, including deepfake detection and liveness verification,” PMC - AI Security in EHRs, 2022. [Online]. Available: [PMC Database].
A. Olatunji, et al., “The impact of artificial intelligence on organizational cybersecurity, including AI-based anomaly detection in healthcare,” ResearchGate - AI and Cybersecurity, 2024. [Online]. Available: [ResearchGate].
National Institute of Standards and Technology (NIST), “AI Security & Risk Assessment – Guidelines on AI-driven threat detection and biometric security improvements,” NIST AI Security Framework. [Online]. Available: [NIST Website].
IEEE Xplore, “Deepfake Detection in Biometric Systems – A comprehensive review of deepfake detection models in AI-based authentication,” IEEE Deepfake Biometric Security. [Online]. Available: [IEEE Xplore].
MIT Technology Review, “AI for Biometric Authentication – Insights into AI’s role in combating deepfake attacks within healthcare security infrastructures,” MIT AI Biometric Security. [Online]. Available: [MIT Technology Review].
G. Gupta, K. Raja, M. Gupta, T. Jan, S.T. Whiteside, and M. Prasad, “A Comprehensive Review of DeepFake Detection Using Advanced Machine Learning and Fusion Methods,” *Electronics*, vol. 13, no. 1, p. 95, 2024. [Online]. Available: https://doi.org/10.3390/electronics13010095.
A. R. Alsabbagh and O. Al-Kadi, “Comparative Analysis of Deep Convolutional Neural Networks for Detecting Medical Image Deepfakes,” *arXiv preprint*, arXiv:2406.08758, 2024. [Online]. Available: https://arxiv.org/abs/2406.08758.
S. Solaiyappan and Y. Wen, “Machine Learning-Based Medical Image Deepfake Detection: A Comparative Study,” *arXiv preprint*, arXiv:2109.12800, 2021. [Online]. Available: https://arxiv.org/abs/2109.12800.
B. Zhu, H. Fang, Y. Sui, and L. Li, “Deepfakes for Medical Video De-Identification: Privacy Protection and Diagnostic Information Preservation,” *arXiv preprint*, arXiv:2003.00813, 2020. [Online]. Available: https://arxiv.org/abs/2003.00813.
J. Qureshi and S. Khan, “Artificial Intelligence (AI) Deepfakes in Healthcare Systems: A Double-Edged Sword? Balancing Opportunities and Navigating Risks,” *Preprints*, 202402.0176, 2024. [Online]. Available: https://www.preprints.org/manuscript/202402.0176/v1.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.