Privacy-preserving in the smart healthcare system using steganography and chaotic functions based on DNA

被引:1
作者
Esmaeelzadeh Rostam, Habib [1 ]
Motameni, Homayun [2 ]
Enayatifar, Rasul [3 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Qaemshahr Branch, Qaemshahr, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Sari Branch, Sari, Iran
[3] Islamic Azad Univ, Dept Comp Engn, Firoozkooh Branch, Firoozkooh, Iran
关键词
chaotic function; DNA-based steganography; privacy-preserving; smart healthcare system; IMAGE ENCRYPTION; ALGORITHM; EFFICIENT; HYBRID; CLOUD; INFORMATION; INTERNET; THINGS;
D O I
10.1002/spy2.363
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The smart healthcare system is one of the Internet of Things-based applications that are increasingly used nowadays. One of the requirements of this system is privacy-preserving, which should protect the disclosure of the patient record contents. In the present paper, a combination of chaotic functions and a new DNA-based steganography method, and image blocking are suggested to protect patients' privacy-preserving. First, the image is blocked, and the initial key for the chaotic function will be gained by using the centers of the blocks. Then the data and image are transformed into DNA sequences. Finally, one of the randomly chosen DNA strands of data is XOR with the center of one randomly selected block and will be placed in one of the block pixels. The failure to send the initial key separately to generate random numbers, as well as the random selection of secret data bits and image pixels for steganography has increased the security of the proposed method. The simulation results not only indicate the quality of the stego-image but also show better performance of the proposed method than the existing methods.
引用
收藏
页数:21
相关论文
共 58 条
[51]   Message Scheduling for Performant, Many-Core Belief Propagation [J].
Van der Merwe, Mark ;
Joseph, Vinu ;
Gopalakrishnan, Ganesh .
2019 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2019,
[52]   Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques [J].
Wahab, Osama Fouad Abdel ;
Khalaf, Ashraf A. M. ;
Hussein, Aziza I. ;
Hamed, Hesham F. A. .
IEEE ACCESS, 2021, 9 :31805-31815
[53]   A novel chaotic system and its application in a color image cryptosystem [J].
Wang, Mingxu ;
Wang, Xingyuan ;
Zhang, Yingqian ;
Zhou, Shuang ;
Zhao, Tingting ;
Yao, Nianmin .
OPTICS AND LASERS IN ENGINEERING, 2019, 121 :479-494
[54]   A one-time pad color image cryptosystem based on SHA-3 and multiple chaotic systems [J].
Wang, Xingyuan ;
Wang, Siwei ;
Zhang, Yingqian ;
Luo, Chao .
OPTICS AND LASERS IN ENGINEERING, 2018, 103 :1-8
[55]   Outsourcing chaotic selective image encryption to the cloud with steganography [J].
Xiang, Tao ;
Hu, Jia ;
Sun, Jianglin .
DIGITAL SIGNAL PROCESSING, 2015, 43 :28-37
[56]   Binary-block embedding for reversible data hiding in encrypted images [J].
Yi, Shuang ;
Zhou, Yicong .
SIGNAL PROCESSING, 2017, 133 :40-51
[57]  
Zhang X., 2019, ENTROPY BASED BLOCK
[58]   An image encryption scheme based on the MLNCML system using DNA sequences [J].
Zhang, Ying-Qian ;
Wang, Xing Yuan ;
Liu, Jia ;
Chi, Ze-Lin .
OPTICS AND LASERS IN ENGINEERING, 2016, 82 :95-103