Privacy-preserving in the smart healthcare system using steganography and chaotic functions based on DNA

被引:1
作者
Esmaeelzadeh Rostam, Habib [1 ]
Motameni, Homayun [2 ]
Enayatifar, Rasul [3 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Qaemshahr Branch, Qaemshahr, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Sari Branch, Sari, Iran
[3] Islamic Azad Univ, Dept Comp Engn, Firoozkooh Branch, Firoozkooh, Iran
关键词
chaotic function; DNA-based steganography; privacy-preserving; smart healthcare system; IMAGE ENCRYPTION; ALGORITHM; EFFICIENT; HYBRID; CLOUD; INFORMATION; INTERNET; THINGS;
D O I
10.1002/spy2.363
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The smart healthcare system is one of the Internet of Things-based applications that are increasingly used nowadays. One of the requirements of this system is privacy-preserving, which should protect the disclosure of the patient record contents. In the present paper, a combination of chaotic functions and a new DNA-based steganography method, and image blocking are suggested to protect patients' privacy-preserving. First, the image is blocked, and the initial key for the chaotic function will be gained by using the centers of the blocks. Then the data and image are transformed into DNA sequences. Finally, one of the randomly chosen DNA strands of data is XOR with the center of one randomly selected block and will be placed in one of the block pixels. The failure to send the initial key separately to generate random numbers, as well as the random selection of secret data bits and image pixels for steganography has increased the security of the proposed method. The simulation results not only indicate the quality of the stego-image but also show better performance of the proposed method than the existing methods.
引用
收藏
页数:21
相关论文
共 58 条
  • [1] Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System
    Abawajy, Jemal H.
    Hassan, Mohammad Mehedi
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (01) : 48 - 53
  • [2] Abdullah A., 2020, UKH J SCI ENG, V4, P15, DOI [10.25079/ukhjse.v4n1y2020.pp15-26, DOI 10.25079/UKHJSE.V4N1Y2020.PP15]
  • [3] Security analysis of DNA based steganography techniques
    Al-Harbi, Omnia Abdullah
    Alahmadi, Walaa Essa
    Aljahdali, Asia Othman
    [J]. SN APPLIED SCIENCES, 2020, 2 (02):
  • [4] IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography
    Alarood, Alaa
    Ababneh, Nedal
    Al-Khasawneh, Mahmoud
    Rawashdeh, Majdi
    Al-Omari, Mohammad
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (03): : 1607 - 1618
  • [5] Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data
    Almawgani, A. H. M.
    Alhawari, Adam R. H.
    Hindi, Ayman Taher
    Al-Arashi, Waled Hussein
    Al-Ashwal, A. Y.
    [J]. MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2022, 33 (02) : 561 - 578
  • [6] [Anonymous], 2013, ASIAN J COMPUT INF T, V1, P50
  • [7] A Novel Image Encryption Scheme Based on Walsh Compressed Quantum Spinning Chaotic Lorenz System
    Arshad, Usman
    Batool, Syeda Iram
    Amin, Muhammad
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (10) : 3565 - 3588
  • [8] Security and privacy issues in e-health cloud-based system: A comprehensive content analysis
    Azeez, Nureni Ayofe
    Van der Vyver, Charles
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2019, 20 (02) : 97 - 108
  • [9] An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
    Bairagi, Anupam Kumar
    Khondoker, Rahamatullah
    Islam, Rafiqul
    [J]. INFORMATION SECURITY JOURNAL, 2016, 25 (4-6): : 197 - 212
  • [10] An encryption scheme for securing multiple medical images
    Banik, Arpita
    Shamsi, Zeba
    Laiphrakpam, Dolendro Singh
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49