scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Audio Transmission of Medical Reports for Visa Processing: A Solution for the Spread of Communicable Diseases by the Immigrant Population

01 Sep 2018-IEEE Consumer Electronics Magazine (Institute of Electrical and Electronics Engineers (IEEE))-Vol. 7, Iss: 5, pp 27-33
TL;DR: A novel transfer system of visa applicant medical reports for processing through multilayer security helps to reduce the incorrect identification of visa applicants and quickens the visa-processing system, and helps to control the spread of communicable diseases.
Abstract: The rapid growth of immigrants is a veritable menace for most state authorities. Aside from the hazards of population overcrowding, they create the risk of health hazards. According to recent medical statistics, international immigrants are the carriers of communicable diseases. In addition to tightened border controls, the strict and transparent visa approval process through proper medical diagnoses may play a vital role in addressing this problem. This requires the safe, secure, and prompt transmission of medical reports from recognized medical centers to embassies without violating the Health Insurance Portability and Accountability Act (HIPAA). This article introduces a novel transfer system of visa applicant medical reports for processing through multilayer security. Both cryptography and steganography are used here to ensure security. This nearly foolproof system helps to reduce the incorrect identification of visa applicants and quickens the visa-processing system. At the same time, it helps to control the spread of communicable diseases.
Citations
More filters
Journal ArticleDOI
TL;DR: The main goal is to encrypt the medical data (EEG signal) and send to end user by utilizing proposed HLE–SO method, which combines Paillier encryption and KATAN algorithm, which provides the lightweight features.
Abstract: In medical field, securing every patient’s record is main concern, ascribed to many fraudulent cases occurring in the health sector. The data of every individual must be engraved and sent into end-user without any issues. Mainly in the healthcare industry, where thoughts are often focused on saving someone’s life and rightly so, but securing access to interfaces and computer systems that store private data like medical records is also an essential factor to consider. Data security is a corresponding action between controlling access to information while allowing free and easy access to those who need that information. Still few problems are focused by the physician in the health sector. Patient’s data should be kept securely in medical provider servers so that physicians can provide proper treatments. To ensure secure storage and access management, we propose a novel hybrid lightweight encryption using swarm optimization algorithm (HLE–SO).The proposed HLE–SO technique merge Paillier encryption and KATAN algorithm, which provides the lightweight features. Generally, the lightweight encryption algorithms are affected by the key space. We introduce the swarm optimization algorithm to optimize the key space by changing the number of iteration round. Our main goal is to encrypt the medical data (EEG signal) and send to end user by utilizing proposed HLE–SO method. Finally, the implementation is done with MATLAB tool with different EEG signal data set. The simulation results of proposed HLE–SO technique is compared with the existing state-of-art techniques in terms of different performance metrics are MSE, PSNR, SSIM, PRD, encryption time and decryption time.

23 citations

Book ChapterDOI
08 Dec 2020
TL;DR: In this paper, the authors used the Discrete Wavelet Transform (DWT) and Huffman Encoding (HuFE) for compression and EEG signal encryption with chaos for Telemedicine applications.
Abstract: A Telemedicine network that uses connectivity and information technology to transmit medical signals such as neurological signals Electroencephalography (EEG) has become a reality for medical services of long distances. In the monitoring of mobile healthcare, these signals need to be compressed for the efficient utilization of bandwidth and the confidentiality of these signals, where compression is a critical tool to solve storage and transmission problems and can then retrieve the original signal (OS) from the compressed signal. The objective of this manuscript is to achieve higher compression gains at a low bit rate while maintaining the integrity of clinical details and also encrypting the signal to keep it private, except for specialists. Thresholding techniques are utilized in the compression stage, the Discrete Wavelet Transform (DWT). Instead, Huffman Encoding (HuFE) is utilized for compression and EEG signal encryption with chaos. This manuscript addresses the encoding of EEG signals with consistency for Telemedicine applications. To test the proposed method, overall compression and reconstruction (ComRec) time (T) was measured, the root mean square (RMSE), and the compression ratio (CR). Findings from the simulation show that the addition of HuFE after the DWT algorithm gives the best CR and complexity efficiency. The findings show that the consistency of the reconstructed signal (Rs) is maintained at a low PRD while yielding better findings in compression. Utilizing the DWT as a loss compression algorithm followed by the HuFE as a lossy compression algorithm, CR = 92.9% at RMS = 0.16 and PRD = 5. 4131%.

2 citations

References
More filters
Journal ArticleDOI
01 Jul 1999
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Abstract: Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.

2,561 citations


"Audio Transmission of Medical Repor..." refers background in this paper

  • ...Today, steganography is prevalent in the field of health­care security [6]....

    [...]

Journal ArticleDOI
TL;DR: A wavelet-based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data and it is found that the proposed technique provides high-security protection for patients data with low distortion and ECG data remain diagnosable after watermarking.
Abstract: With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as point-of-care (PoC) applications in hospitals around the world. Therefore, huge amount of ECG signal collected by body sensor networks from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level, etc., and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data are being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this paper, a wavelet-based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest. To evaluate the effectiveness of the proposed technique on the ECG signal, two distortion measurement metrics have been used: the percentage residual difference and the wavelet weighted PRD. It is found that the proposed technique provides high-security protection for patients data with low (less than 1%) distortion and ECG data remain diagnosable after watermarking (i.e., hiding patient confidential data) and as well as after watermarks (i.e., hidden data) are removed from the watermarked data.

162 citations


"Audio Transmission of Medical Repor..." refers background in this paper

  • ...In [8], a wavelet­based ECG steganography has been proposed that provides double­ layered security....

    [...]

Proceedings ArticleDOI
14 Sep 2012
TL;DR: This paper describes the different key factor of digital signature with the working ofdigital signature, through various methods and procedures involved in signing the data or message by using digital signature, and introduces algorithms used in digital signatures.
Abstract: There are different types of encryption techniques are being used to ensure the privacy of data transmitted over internet. Digital Signature is a mathematical scheme which ensures the privacy of conversation, integrity of data, authenticity of digital message/sender and non-repudiation of sender. Digital Signature is embedded in some hardware device or also exits as a file on a storage device. Digital Signature are signed by third party some certifying authority. This paper describe the different key factor of digital signature with the working of digital signature, through various methods and procedures involved in signing the data or message by using digital signature. It introduces algorithms used in digital signatures.

95 citations


"Audio Transmission of Medical Repor..." refers methods in this paper

  • ...Here, the authentication of the medical center is introduced by protecting the stego audio file with the pri­ vate key of the medical center; it is then sent to the embassy [18] (Figure 5)....

    [...]

  • ...32 IEEE ConsumEr ElECtronICs magazInE ^ september 2018 public key of the medical center using the process of reverse digital signature [18]....

    [...]

Journal ArticleDOI
TL;DR: This paper utilizes sequence alignment techniques for detecting complex data-leak patterns and achieves good detection accuracy in recognizing transformed leaks, and implements a parallelized version of the algorithms in graphics processing unit that achieves high analysis throughput.
Abstract: The leak of sensitive data on computer systems poses a serious threat to organizational security. Statistics show that the lack of proper encryption on files and communications due to human errors is one of the leading causes of data loss. Organizations need tools to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., to detect sensitive information being stored or transmitted in the clear. However, detecting the exposure of sensitive information is challenging due to data transformation in the content. Transformations (such as insertion and deletion) result in highly unpredictable leak patterns. In this paper, we utilize sequence alignment techniques for detecting complex data-leak patterns. Our algorithm is designed for detecting long and inexact sensitive data patterns. This detection is paired with a comparable sampling algorithm, which allows one to compare the similarity of two separately sampled sequences. Our system achieves good detection accuracy in recognizing transformed leaks. We implement a parallelized version of our algorithms in graphics processing unit that achieves high analysis throughput. We demonstrate the high multithreading scalability of our data leak detection method required by a sizable organization.

67 citations


"Audio Transmission of Medical Repor..." refers background in this paper

  • ...Studies have shown that demonetization would further increase the number of online shoppers [1]....

    [...]

Journal ArticleDOI
TL;DR: The novelty of the proposed approach is to use CACO in ECG Steganography, to identify Multiple Scaling Factors (MSFs) that will provide a better tradeoff compared to uniform Single Scaling Factor (SSF) and the results validate that the tradeoff curve obtained through MSFs is better than the tradeoffs obtained for any SSF.
Abstract: ECG steganography is performed using DWT-SVD and quantization watermarking scheme.Imperceptibility-robustness tradeoff is investigated.Continuous Ant Colony Optimization provides optimized Multiple Scaling Factors.MSFs are superior to SSF in providing better imperceptibility-robustness tradeoff. ECG Steganography ensures protection of patient data when ECG signals embedded with patient data are transmitted over the internet. Steganography algorithms strive to recover the embedded patient data entirely and to minimize the deterioration in the cover signal caused by the embedding. This paper presents a Continuous Ant Colony Optimization (CACO) based ECG Steganography scheme using Discrete Wavelet Transform and Singular Value Decomposition. Quantization techniques allow embedding the patient data into the ECG signal. The scaling factor in the quantization techniques governs the tradeoff between imperceptibility and robustness. The novelty of the proposed approach is to use CACO in ECG Steganography, to identify Multiple Scaling Factors (MSFs) that will provide a better tradeoff compared to uniform Single Scaling Factor (SSF). The optimal MSFs significantly improve the performance of ECG steganography which is measured by metrics such as Peak Signal to Noise Ratio, Percentage Residual Difference, Kullback-Leibler distance and Bit Error Rate. Performance of the proposed approach is demonstrated on the MIT-BIH database and the results validate that the tradeoff curve obtained through MSFs is better than the tradeoff curve obtained for any SSF. The results also advocate appropriate SSFs for target imperceptibility or robustness.

66 citations