Abstract
Electronic Health Record, which comprises of medical imagery, patient history, prescription and clinical observations is a highly sensitive data. This data is not generally sent over the network in its original form as it is prone to numerous security related issues. Generally, some encryption algorithms are applied on the data (medical image) before transmission over the network. However, resource constrained devices cannot perform complex encryption sand the process of encryption is entrusted to some third party like Cloud. But this third-party encryption requires the privacy of data to be preserved. After ensuring the privacy and performing third party encryption, the encrypted data can be securely transmitted over the network. This concept is used in the proposed work and a secure data transmission method is implemented. We have used two encryption techniques viz, chaotic encryption and bitplane encryption on the medical image which gives extra security to the image. While using the facilities of cloud for encryption (chaotic) the proposed method ensures that the cloud administrators get no hint about the information present in the data that is sent to them. In addition, the authenticity of the medical images is ensured and the encryption time obtained is small (must criterion for real time applications). The objectives of our work are verified by experimentations that are carried out on various medical images. The experimental results and theoretical analysis confirm the effectiveness of proposed work in terms of encryption time, security and authenticity.
Similar content being viewed by others
References
Ball MJ, Lillis J (2001) E-health: transforming the physician/patient relationship. Int J Med Inform 61(1):1–10
Ghazvini A, Shukur Z (2013) Security challenges and success factors of electronic healthcare system. Procedia Technol. 11:212–219
Hewitt C (2008) Orgs for scalable, robust, privacy-friendly client cloud computing. Internet Comput. 12(5):96–99
Z Xia, L Jiang, X Ma, W Yang, P Ji, N Xiong, “A privacy-preserving outsourcing scheme for image local binary pattern in secure industrial internet of things,” IEEE Transactions on Industrial Informatics, https://doi.org/10.1109/TII.2019.2913217, (2019)
Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457–3470
Venkatesh A, Eastaff MS (2018) A study of data storage security issues in cloud computing. International Journal of Scientific Research in Computer Science, Engineering and Information Technology 3(1):1741–1745
Huang Z, Zhang M, Zhang Y (2019) Toward efficient encrypted image retrieval in cloud environment. IEEE Access 7:174541–174550
Dong N, Jonker H, Pang J (2011) Challenges in ehealth: from enabling to enforcing privacy. International Symposium on Foundations of Health Informatics Engineering and Systems:195–206
Elhoseny M, Ramírez-González G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608
Love VD (2011) IT security strategy: is your health care organization doing everything it can to protect patient information. Journal of Health Care Compliance 13(6):21–64
Wu H (2018) Multi-objective decision-making for Mobile cloud offloading: a survey. IEEE Access 6:3962–3976
Qi H, Abdullah G (2012) Research on mobile cloud computing: Review, trend and perspectives. In: Digital Information and Communication Technology and its Applications (DICTAP), pp. 195–202
Wang X, Jin Z (2019) An overview of Mobile cloud computing for pervasive healthcare. IEEE Access 7:66774–66791
Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 53(3):97–105
Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. International Conference on the Theory and Applications of Cryptographic Techniques:127–144
Yao AC (1982) Protocols for secure computations. In: 23th Annual Symposium on Foundations of Computer Science (sfcs), pp. 160–164
Yao ACC (1986) How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science (sfcs), pp. 162–167
Murakami K, Hanyu R, Zhao Q, Kaneda Y (2013) Improvement of security in cloud systems based on steganography. In: International Joint Conference on Awareness Science and Technology and Ubi-Media Computing (iCAST-UMEDIA), pp. 503–508
Kaur A, Kaur R, Kumar N (2015) A review on image steganography techniques. Int J Comput Appl 123(4):20–24
Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 76(8):10599–10633
Sharma P, Kumar P (2016) Review of various image steganography and steganalysis techniques. International Journal of Advanced Research in Computer Science and Software Engineering 6(7):152–159
Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Journal of Expert systems with Applications 46:293–306
Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. J Pattern Recognit 37(3):469–474
Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876–19897
Xiang T, Hu J, Sun J (2015) Outsourcing chaotic selective image encryption to the cloud with steganography. Digital Signal Process. 43:28–37
Sajjad M, Muhammad K, Baik SW, Rho S, Jan Z, Yeo SS, Mehmood I (2017) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl 76(3):3519–3536
Liu B, Chen T, Fu P, Zhen Y, Pan JS (2019) Method of target recognition in high-resolution remote sensing image based on visual saliency mechanism and ROI region extraction. Journal of Internet Technology 20(5):1333–1341
Dinghui Z, Qiujie G, Yonghua P, Xinghua Z (2008) Discrete chaotic encryption and decryption of digital images. International Conference on Computer Science and Software Engineering 3:849–852
Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos image encryption algorithm. Chaos, Solution and Fractals 40(5):2191–2199
Salleh M, Ibrahim S, Isnin IF (2003) Enhanced chaotic image encryption algorithm based on Baker's map. Proceedings of IEEE Conference on Circuits and Systems 2:508–511
Hong L, Li C (2008) A novel color image encryption approach based on multi-chaotic system. In: Proceedings of 2nd IEEE International Conference on Anti-counterfeiting, Security and Identification, pp. 223–226
Honglei Y, Guang-shou W (2009) The compounded chaotic sequence research in image encryption algorithm. In: Proceedings of WRI Global Congress on Intelligent Systems, vol. 3. pp. 252–256
Rohith S, Bhat KNH, Sharma A (2014) Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register. In: International Conference on Advances in Electronics, Computers and Communications (ICAECC), pp. 1–6
Singh S, Singh A (2013) A review on the various recent steganography techniques. International Journal of Computer Science and Network 2(6):142–156
Raphael AJ, Sundaram V (2010) Cryptography and steganography-a survey. International Journal of Computer and Technology Applications 2(3):626–630
Vijay PP, Patil NC (2016) Gray scale image segmentation using OTSU Thresholding optimal approach. J For Res 2(5):20–24
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38
El-Latif AAA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075–21083
EL-Latif AAA, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92–102
A. A. A. EL-Latif, B. Abd-El-Atty, E. M. Abou-Nassar, S. E. Venegas-Andraca, “ Controlled alternate quantum walks based privacy preserving healthcare images in internet of things,” Optics and laser technology, https://doi.org/10.1016/j.optlastec.2019.105942, 2020.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Afzal, I., Parah, S.A., Hurrah, N.N. et al. Secure patient data transmission on resource constrained platform. Multimed Tools Appl 83, 15001–15026 (2024). https://doi.org/10.1007/s11042-020-09139-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09139-3