scispace - formally typeset
Book ChapterDOI

Highly Protective Framework for Medical Identity Theft by Combining Data Hiding with Cryptography

TLDR
The hybrid encryption technique is combined with an LDPC coder for efficient information between the sender and receiver and improves the hiding capacity by 11.36% than SISO, 48.48% than OFDM, and 68.96% than MIMO.
Abstract
Medical identity theft is more common since it is easy to steal the patient’s record details and sell it for illegal medical trades. It happens in medical track records, personal healthcare accounts, recorded online insurance services, social security numbers, and other personally identifiable information (PII) which are disguised and used in the name of others. In this research, the proposed approach combines data hiding with hybrid encryption algorithms such as Modified Elliptic Curve Cryptography (MECC) encryption based on MIMO-OFDM framework. The hybrid encryption technique is combined with an LDPC coder for efficient information between the sender and receiver. Thereby, it improves the hiding capacity by 11.36% than SISO, 48.48% than OFDM, and 68.96% than MIMO. The sensitivity values are measured through the parameter number of pixels changes rate (NPCR) and unified average changing intensity (UACI) and obtained as 99.70 and 33.48 respectively. Correlation between adjacent pixels (CP) is increased compared to previous works. For SNR (Signal to Noise Ratio) at 30 dB CP is obtained as 0.9985. Simulation is carried out in MATLAB 2019a.

read more

Citations
More filters
Journal ArticleDOI

Smart driving license system in Rto using IoT technology

TL;DR: In this paper , the authors have developed a system for automated driving license system test for two-wheelers where manmade work is monitored by computerized work and the proposed system will automate the entire process from verifying the person to monitoring and verifying the driving test taken by the candidate.
Proceedings ArticleDOI

The Adaptive Security of Cloud Information Management Encrypted with Cryptographic Network Coding

TL;DR: In this paper , the authors investigate the feasibility of using secure network coding methods to provide a safe cloud repository for frequently updated data, and demonstrate how several of these schemes may be utilized to build Secure cloud storage protocol (SCSP I) for dynamic information, and they build one such protocol.
References
More filters
Journal ArticleDOI

Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography

TL;DR: The study modeled the system and implemented it to be tested to explore the relation between security, capacity and data dependency, and the main outcome proved applicability to be adopting 3-LSB approach to give acceptable security with practical capacity preferred.
Journal ArticleDOI

Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem

TL;DR: An asymmetric image encryption algorithm based on an elliptic curve cryptosystem (ECC) that makes the key transmission and management relatively simple and secure and exhibits both the strong security and the high efficiency.
Journal ArticleDOI

Sea-skyline-based image stabilization of a buoy-mounted catadioptric omnidirectional vision system

TL;DR: The experimental results and analysis show that the proposed approach is capable of acquiring stable video in real-time marine monitoring tasks and that the target detection is sufficiently effective, efficient, and accurate for a real- time ship target detection application.
Journal ArticleDOI

Data hiding technique in steganography for information security using number theory

TL;DR: An efficient steganography method is proposed for the transfer of secret data in digital images using number theory using the Fibonacci sequence and gives high quality of stego images in terms of peak signal-to-noise ratio (PSNR).
Proceedings ArticleDOI

An improved method for reversible data hiding steganography combined with cryptography

TL;DR: The main objective of the proposed work is to provide extra layer of security by introducing cryptography along with steganography to encrypt and embed the confidential information to be sent over a non-secure channel.
Related Papers (5)