Securing EPR Data Using Cryptography and Image Watermarking

被引:3
|
作者
Zaz, Youssef [1 ]
El Fadil, Lhoussain [2 ]
El Kayyali, Mohamed [3 ]
机构
[1] Abdelmalek Essaadi Univ, Tetouan, Morocco
[2] Ibn Zohr Univ, Fac Ouarzazat FPO, Math, Agadir, Morocco
[3] Univ Technol Peru, Barranco, Peru
关键词
Electronic Patient Records (EPR); Elliptic Curve Cryptosystem (ECC); Huffman Coding; Least Significant Bit Plan (LSB); Semantic Security; Symmetric Key Cryptosystem; Watermarking;
D O I
10.4018/jmcmc.2012040106
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper demonstrates new methodology to improve security and avoid data overlapping between patients records which are defined as Electronic Patient Records (EPR), a combination of digital watermarking techniques and cryptography are used to ensure the non-separation of EPR and medical images during communications within open networks. The EPR data is encrypted, by a symmetric key algorithm based on an Elliptic Curve Cryptosystem (ECC), and inserted in liberated zone of the Least Significant Bit plan (LSB) of the medical image by compressing the original one using the Huffman coding. The proposed method improves security issues and reduces the computation cost related to data encryption and decryption.
引用
收藏
页码:76 / 87
页数:12
相关论文
共 50 条
  • [21] A REVIEW ON METHODS FOR IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY IN DIGITAL IMAGE WATERMARKING
    Vyas, Chinmay
    Lunagaria, Munindra
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1191 - 1196
  • [22] Securing Data via Cryptography and Arabic Text Steganography
    Alkhudaydi M.
    Gutub A.
    SN Computer Science, 2021, 2 (1)
  • [23] Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme
    Gayathri, R.
    Nagarajan, V.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 118 - 123
  • [24] Identification and authentication using visual cryptography based fingerprint watermarking over natural image
    Jaishri Chourasia
    CSI Transactions on ICT, 2013, 1 (4) : 343 - 348
  • [25] Watermarking is not cryptography
    Cox, Ingemar J.
    Doerr, Gwenael
    Furon, Teddy
    DIGITAL WATERMARKING, PROCEEDINGS, 2006, 4283 : 1 - 15
  • [26] Visual cryptography scheme for color image using random number with enveloping by digital watermarking
    Kandar, Shyamalendu
    Maiti, Arnab
    Dhara, Bibhas Chandra
    International Journal of Computer Science Issues, 2011, 8 (3 3-1): : 543 - 549
  • [27] Securing Multiple Biometric Data Using SVD and Curvelet-Based Watermarking
    Thanki, Rohit M.
    Borisagar, Komal Rajendrakumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (04) : 35 - 53
  • [28] Internet of Things: Securing Data using Image Steganography
    Yin, Joanne Hwan Jie
    Fen, Gan May
    Mughal, Fiza
    Iranmanesh, Vahab
    2015 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION (AIMS 2015), 2015, : 310 - 314
  • [29] Securing Data in Image Using Advanced Encryption Standard
    Chavan, Puja
    Pagar, Aditya
    Pote, Sanket
    Fulsundar, Avdhoot
    Ghante, Piyush
    Mane, Phinehas
    Sonawane, Raj
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023, 2025, 1273 : 411 - 419
  • [30] Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image Attributes and Visual Cryptography
    Kester, Quist-Aphetsi
    Pascu, Anca Christine
    Nana, Laurent
    Gire, Sophie
    Eghan, Jojo M.
    Quaynor, Nii Narku
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT IV, 2015, 9158 : 712 - 724