scispace - formally typeset
Journal ArticleDOI

Compression-Then-Encryption-Based Secure Watermarking Technique for Smart Healthcare System

Ashima Anand, +3 more
- 01 Oct 2020 - 
- Vol. 27, Iss: 4, pp 133-143
TLDR
A compression-then-encryption-based dual watermarking to protect the EPR data for the healthcare system, which produces several significant features and offers better performance in terms of robustness and security.
Abstract
The smart healthcare system is an electronic patient records (EPR) sharing system, which significantly helps sharing of EPR data and provides appropriate medical assistance for the patients and a more suitable platform for the potential researchers. However, the security of EPR data is still a major issue in such systems. In this paper, we develop a compression-then-encryption-based dual watermarking to protect the EPR data for the healthcare system, which produces several significant features. Experiments conducted on a large set of medical data indicate the capability of our proposed method for smart healthcare. Finally, when compared with the existing technique, the proposed work offers better performance in terms of robustness and security.

read more

Citations
More filters
Journal ArticleDOI

Recent trends in image watermarking techniques for copyright protection: a survey

TL;DR: In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations.
Journal ArticleDOI

Data hiding in encryption–compression domain

TL;DR: It is established that this robust and secure data hiding scheme to transmit grayscale image in encryption-then-compression domain has a better ability to recover concealed mark than conventional ones at low cost.
Journal ArticleDOI

Recent advances in multimedia security and information hiding

TL;DR: In the age of information, a large amount of multimedia data is being generated and transmitted from various sources, including health care, census, survey, e-commerce, sensors, genome sequencing, internet search, customer interactions, and social media, where security and privacy is a major issue.
Journal ArticleDOI

Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents

TL;DR: In this article, a joint encryption then compression based watermarking technique for digital document security is proposed, which offers a tool for confidentiality, copyright protection, and strong compression performance of the system.
Journal ArticleDOI

Towards Integrating Image Encryption with Compression: A Survey

TL;DR: The various approaches taken to consider joint encryption and compression, assessing both their merits and their limitations are reviewed, offering a consideration of the different technical perspectives.
References
More filters
Journal ArticleDOI

On the Security of Permutation-Only Image Encryption Schemes

TL;DR: It is proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosenplaintext attack, which significantly outperforms the state-of-theart cryptanalytic methods.
Journal ArticleDOI

An improved DWT-SVD domain watermarking for medical information security

TL;DR: Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.
Journal ArticleDOI

Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network

TL;DR: The proposed robust and secure DWT, DCT and SVD based multiple watermarking techniques for protecting digital contents over unsecure social networks may find potential solutions in prevention of personal identity theft and unauthorized multimedia content sharing on online social networks/open channel.
Journal ArticleDOI

Watermarking techniques for medical data authentication: a survey

TL;DR: General concepts of watermarking, major characteristics, recent applications, concepts of embedding and recovery process of watermarks, and the summary of various techniques are highlighted in brief.
Journal ArticleDOI

Chaotic based secure watermarking approach for medical images

TL;DR: Experimental evaluation shows that using combination of NSCT, RDWT, SVD and chaotic encryption makes the approach robust, imperceptible, secure and suitable for medical applications.
Related Papers (5)