Javascript must be enabled to continue!
Secure Patient Data Transfer Using Information Embedding and Hyperchaos
View through CrossRef
Health 4.0 is an extension of the Industry standard 4.0 which is aimed at the virtualization of health-care services. It employs core technologies and services for integrated management of electronic health records (EHRs), captured through various sensors. The EHR is processed and transmitted to distant experts for better diagnosis and improved healthcare delivery. However, for the successful implementation of Heath 4.0 many challenges do exist. One of the critical issues that needs attention is the security of EHRs in smart health systems. In this work, we have developed a new interpolation scheme capable of providing better quality cover media and supporting reversible EHR embedding. The scheme provides a double layer of security to the EHR by firstly using hyperchaos to encrypt the EHR. The encrypted EHR is reversibly embedded in the cover images produced by the proposed interpolation scheme. The proposed interpolation module has been found to provide better quality interpolated images. The proposed system provides an average peak signal to noise ratio (PSNR) of 52.38 dB for a high payload of 0.75 bits per pixel. In addition to embedding EHR, a fragile watermark (WM) is also encrypted using the hyperchaos embedded into the cover image for tamper detection and authentication of the received EHR. Experimental investigations reveal that our scheme provides improved performance for high contrast medical images (MI) when compared to various techniques for evaluation parameters like imperceptibility, reversibility, payload, and computational complexity. Given the attributes of the scheme, it can be used for enhancing the security of EHR in health 4.0.
Title: Secure Patient Data Transfer Using Information Embedding and Hyperchaos
Description:
Health 4.
0 is an extension of the Industry standard 4.
0 which is aimed at the virtualization of health-care services.
It employs core technologies and services for integrated management of electronic health records (EHRs), captured through various sensors.
The EHR is processed and transmitted to distant experts for better diagnosis and improved healthcare delivery.
However, for the successful implementation of Heath 4.
0 many challenges do exist.
One of the critical issues that needs attention is the security of EHRs in smart health systems.
In this work, we have developed a new interpolation scheme capable of providing better quality cover media and supporting reversible EHR embedding.
The scheme provides a double layer of security to the EHR by firstly using hyperchaos to encrypt the EHR.
The encrypted EHR is reversibly embedded in the cover images produced by the proposed interpolation scheme.
The proposed interpolation module has been found to provide better quality interpolated images.
The proposed system provides an average peak signal to noise ratio (PSNR) of 52.
38 dB for a high payload of 0.
75 bits per pixel.
In addition to embedding EHR, a fragile watermark (WM) is also encrypted using the hyperchaos embedded into the cover image for tamper detection and authentication of the received EHR.
Experimental investigations reveal that our scheme provides improved performance for high contrast medical images (MI) when compared to various techniques for evaluation parameters like imperceptibility, reversibility, payload, and computational complexity.
Given the attributes of the scheme, it can be used for enhancing the security of EHR in health 4.
Related Results
Autonomy on Trial
Autonomy on Trial
Photo by CHUTTERSNAP on Unsplash
Abstract
This paper critically examines how US bioethics and health law conceptualize patient autonomy, contrasting the rights-based, individualist...
Procedure for Western blot v1
Procedure for Western blot v1
Goal: This document has the objective of standardizing the protocol for Western blot. This technique allows the detection of specific proteins separated on polyacrylamide gel and t...
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Representing Hierarchical Structured Data Using Cone Embedding
Representing Hierarchical Structured Data Using Cone Embedding
Extracting hierarchical structure in graph data is becoming an important problem in fields such as natural language processing and developmental biology. Hierarchical structures ca...
An Efficient ZZW Construction Using Low-Density Generator-Matrix Embedding Techniques
An Efficient ZZW Construction Using Low-Density Generator-Matrix Embedding Techniques
A novel steganographic algorithm based on ZZW construction is proposed to improve the steganographic embedding efficiency. Low-density generator-matrix (LDGM) embedding is an effic...
Information-Theoretic Limits for Steganography in Multimedia
Information-Theoretic Limits for Steganography in Multimedia
Steganography in multimedia aims to embed secret data into an innocent multimedia cover object. The embedding introduces some distortion to the cover object and produces a correspo...
Data Loss Transmission in 5g Network by Enabling Green Blockchain Methodologies
Data Loss Transmission in 5g Network by Enabling Green Blockchain Methodologies
Network embedding successfully maintains the network structure by assigning network nodes to low-dimensional representations. A considerable amount of progress has recently been ac...
Effective Attributed Network Embedding with Information Behavior Extraction
Effective Attributed Network Embedding with Information Behavior Extraction
Abstract
Network embedding has shown its effectiveness in many tasks such as link prediction, node classification, and community detection. Most attributed network embeddin...

