scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Generation of novel encrypted code using cryptography for multiple level data security for Electronic Patient Record

TL;DR: A complete Graphical User Interface (GUI) has been developed for both encoder-transmitter and decoder- receiver section and it is shown that the proposed algorithm more unbreakable.
Abstract: Current paper represents a new type of encrypted Electronic Patient Record (EPR) code used for data encryption and content protection. EPR is a collection of several private information related to a patient which needs data authenticity, data security as well as safe and secured transmission. The proposed methodology used both cryptography and image processing techniques to build a new type of encrypted information code in image format which can be transmitted and used like bar code, QR code but even more secure. The success rate of recovery of data is 100% for both short and long messages. The information can also be retrieved at the receiver side exactly same without any loss of information. Use of RSA and DES algorithm consequently, with three keys and followed by some image processing techniques like complement, flip make the proposed algorithm more unbreakable. In this paper a complete Graphical User Interface (GUI) has been developed for both encoder-transmitter and decoder- receiver section.
Citations
More filters
Journal ArticleDOI
TL;DR: A modified Blowfish encryption that uses128-bit block size and 128-bit key to comply with minimum requirements as an encryption standard is proposed and the added derivation improved the avalanche of the modified blowfish.
Abstract: Cryptography guarantees security in communication through encryption. This paper proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to comply with minimum requirements as an encryption standard. The modification retained the original structure for easy migration but utilized two S-boxes to save memory. A derivation was added to prevent symmetry. The algorithm’s performance was evaluated using time, and avalanche. Upon testing, the modified blowfish is slower with key, encryption, and decryption average of 26.99ms, 1651.83ms, and 2765.04ms compared to blowfish with 21.65ms, 1297.76ms and 2176.59ms due to block size difference. Applying 128-bit block size increases security by decreasing the chances of having duplicate blocks that may leak information. The modified Blowfish is faster compared to Twofish with an encryption and decryption average time of 2418.08ms and 4002.70ms. The added derivation improved the avalanche of the modified blowfish. Blowfish achieved 47.14% while modified Blowfish attained 52.86%.

12 citations


Cites background from "Generation of novel encrypted code ..."

  • ...Cryptography is the practice and study of information hiding and achieving security by encoding messages to make them non-readable [5]....

    [...]

Book ChapterDOI
01 Jan 2020
TL;DR: The objective of the second part is to explain and investigate the existing author’s method to steganography based on the Catalan numbers in the design of medical software and implement the proposed solution in the Java programming language.
Abstract: This chapter presents the possibilities of applying cryptography and steganography in design advanced methods of medical software. The proposed solution has two modules: medical data encryption and medical data hiding. In the first module for the encryption of patient data a Catalan crypto-key is used combined with the LatticePath combinatorial problem. In the second module for hiding patient data, the Catalan stego-key and medical image is used. The objective of the second part is to explain and investigate the existing author’s method to steganography based on the Catalan numbers in the design of medical software. The proposed solution is implemented in the Java programming language. In the experimental part, cryptanalysis and steganalysis of the proposed solution were given. Cryptanalysis is based on time and storage complexity, leaking information and machine learning-based identification of the encryption method. Also, steganalysis is based on the amount of information per pixel in stego image, approximate entropy and bit distribution in stego-images. Implementation of Encryption and Data Hiding in E-Health Application

4 citations

Journal ArticleDOI
TL;DR: The incorporation of the encryption was successful based on testing and checking done on the input terminal and the database server, and performance results show that without encryption, saving took an average of 87.8ms while encrypted, it acquired 88.8m, a difference of 1ms can be noted.
Abstract: EMR helped improve services to patients by delivering organization and accuracy of patient information, but issues regarding security breaches and medical identity theft are growing concerns This paper enhance the current EMR system by integrating modified encryption The simulation used modified Blowfish algorithm in an EMR system that focuses on four goals: 1) define the requirements, 2) design and identify features, 3) develop the EMR incorporating added security mechanism using modified Blowfish algorithm, and 4) test the application with sample data Based on the results, the incorporation of the encryption was successful based on testing and checking done on the input terminal and the database server Data inputted on the EMR system was successfully encrypted before transmission and decrypted only on the terminal for viewing Performance results show that without encryption, saving took an average of 878ms while encrypted, it acquired 888ms, a difference of 1ms can be noted The minimal difference is because of the size of the data The average decryption time of all records using modified algorithm took 1342ms while using plaintext took 1322ms The decryption time is higher by 20ms due to the application of the decryption algorithm

3 citations


Cites background from "Generation of novel encrypted code ..."

  • ...Cryptography is the study of information hiding and achieving security by encoding messages to make them non-readable [6] [7]....

    [...]

Journal ArticleDOI
TL;DR: In this paper, the modified Blowfish algorithm (MBA) was analyzed and enhanced with two derivation processes in the f-function which was originally placed to prevent symmetry, and the derivation case was analyzed using avalanche effect and time efficiency.
Abstract: This study analyzed and enhanced the modified Blowfish algorithm (MBA) encryption. The modification retained the original structure, process and the use of two S-boxes in the MBA but presented two derivation processes in the f-function which was originally placed to prevent symmetry. The derivation case’s performance was analyzed using avalanche effect and time efficiency. After comparing the first and second derivation process presented in the MBA, the second derivation further improved the avalanche effect by 5.47%, thus improving security. The performance also showed that the second modification is faster by 39.48% in encryption time, and 38.34% faster in decryption time. The first derivation case in the modified Blowfish was slower in time because of the difference in the placement of the shift rotation. The key generation time was found to be independent of the input size while the encryption and decryption time was found to be directly proportional to file size. With this, the second modification is considered to be better.

1 citations

References
More filters
Journal ArticleDOI
01 Mar 2002
TL;DR: A data-hiding technique capable of hiding EPR related data such as diagnostic reports, electrocardiogram, and digital signatures from doctors or a hospital into a mark image and allows all of the hidden data to be separated and restored perfectly by authorized users.
Abstract: A data-hiding technique called the "bipolar multiple-number base" was developed to provide capabilities of authentication, integration, and confidentiality for an electronic patient record (EPR) transmitted among hospitals through the Internet. The proposed technique is capable of hiding those EPR related data such as diagnostic reports, electrocardiogram, and digital signatures from doctors or a hospital into a mark image. The mark image could be the mark of a hospital used to identify the origin of an EPR. Those digital signatures from doctors and a hospital could be applied for the EPR authentication. Thus, different types of medical data can be integrated into the same mark image. The confidentiality is ultimately achieved by decrypting the EPR related data and digital signatures with an exact copy of the original mark image. The experimental results validate the integrity and the invisibility of the hidden EPR related data. This newly developed technique allows all of the hidden data to be separated and restored perfectly by authorized users.

187 citations

Journal ArticleDOI
TL;DR: A dedicated PACS security server is proposed that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information.

170 citations

Journal ArticleDOI
TL;DR: Two types of error control-coding techniques are proposed to enhance reliability of transmission and storage of medical images interleaved with patient information to reduce storage and transmission overheads.

95 citations

Journal ArticleDOI
TL;DR: A new type of information hiding skill in biomedical images is proposed through a combination of cryptography and digital watermarking to achieve the enhancement in confidential and authenticated data storage and secured transmission.
Abstract: In this paper a new type of information hiding skill in biomedical images is proposed through a combination of cryptography and digital watermarking to achieve the enhancement in confidential and authenticated data storage and secured transmission. Here patient's name and doctor's name are considered as patient's information which is encrypted using cryptography and embedded in the scan image of that patient through watermarking. RSA algorithm is used for encryption and higher order bit LSB replacement technique is used for embedding the information. The private keys are also embedded in the cover image to have better security and accurate recovery of the hidden information. The outcome of the proposed methodology shows that the hidden information doesn't affect the cover image and it can be recovered efficiently even from several noisy images. The strength of the proposed embedding scheme is also supported by several image quality matrices.

3 citations