Skip to main content
Log in

Secure patient data transmission on resource constrained platform

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Electronic Health Record, which comprises of medical imagery, patient history, prescription and clinical observations is a highly sensitive data. This data is not generally sent over the network in its original form as it is prone to numerous security related issues. Generally, some encryption algorithms are applied on the data (medical image) before transmission over the network. However, resource constrained devices cannot perform complex encryption sand the process of encryption is entrusted to some third party like Cloud. But this third-party encryption requires the privacy of data to be preserved. After ensuring the privacy and performing third party encryption, the encrypted data can be securely transmitted over the network. This concept is used in the proposed work and a secure data transmission method is implemented. We have used two encryption techniques viz, chaotic encryption and bitplane encryption on the medical image which gives extra security to the image. While using the facilities of cloud for encryption (chaotic) the proposed method ensures that the cloud administrators get no hint about the information present in the data that is sent to them. In addition, the authenticity of the medical images is ensured and the encryption time obtained is small (must criterion for real time applications). The objectives of our work are verified by experimentations that are carried out on various medical images. The experimental results and theoretical analysis confirm the effectiveness of proposed work in terms of encryption time, security and authenticity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10:

Similar content being viewed by others

References

  1. Ball MJ, Lillis J (2001) E-health: transforming the physician/patient relationship. Int J Med Inform 61(1):1–10

    Article  Google Scholar 

  2. Ghazvini A, Shukur Z (2013) Security challenges and success factors of electronic healthcare system. Procedia Technol. 11:212–219

    Article  Google Scholar 

  3. Hewitt C (2008) Orgs for scalable, robust, privacy-friendly client cloud computing. Internet Comput. 12(5):96–99

    Article  Google Scholar 

  4. Z Xia, L Jiang, X Ma, W Yang, P Ji, N Xiong, “A privacy-preserving outsourcing scheme for image local binary pattern in secure industrial internet of things,” IEEE Transactions on Industrial Informatics, https://doi.org/10.1109/TII.2019.2913217, (2019)

  5. Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457–3470

    Article  Google Scholar 

  6. Venkatesh A, Eastaff MS (2018) A study of data storage security issues in cloud computing. International Journal of Scientific Research in Computer Science, Engineering and Information Technology 3(1):1741–1745

    Google Scholar 

  7. Huang Z, Zhang M, Zhang Y (2019) Toward efficient encrypted image retrieval in cloud environment. IEEE Access 7:174541–174550

    Article  Google Scholar 

  8. Dong N, Jonker H, Pang J (2011) Challenges in ehealth: from enabling to enforcing privacy. International Symposium on Foundations of Health Informatics Engineering and Systems:195–206

  9. Elhoseny M, Ramírez-González G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608

    Article  Google Scholar 

  10. Love VD (2011) IT security strategy: is your health care organization doing everything it can to protect patient information. Journal of Health Care Compliance 13(6):21–64

    Google Scholar 

  11. Wu H (2018) Multi-objective decision-making for Mobile cloud offloading: a survey. IEEE Access 6:3962–3976

    Article  Google Scholar 

  12. Qi H, Abdullah G (2012) Research on mobile cloud computing: Review, trend and perspectives. In: Digital Information and Communication Technology and its Applications (DICTAP), pp. 195–202

    Google Scholar 

  13. Wang X, Jin Z (2019) An overview of Mobile cloud computing for pervasive healthcare. IEEE Access 7:66774–66791

    Article  Google Scholar 

  14. Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 53(3):97–105

    Article  Google Scholar 

  15. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. International Conference on the Theory and Applications of Cryptographic Techniques:127–144

  16. Yao AC (1982) Protocols for secure computations. In: 23th Annual Symposium on Foundations of Computer Science (sfcs), pp. 160–164

    Google Scholar 

  17. Yao ACC (1986) How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science (sfcs), pp. 162–167

    Google Scholar 

  18. Murakami K, Hanyu R, Zhao Q, Kaneda Y (2013) Improvement of security in cloud systems based on steganography. In: International Joint Conference on Awareness Science and Technology and Ubi-Media Computing (iCAST-UMEDIA), pp. 503–508

    Google Scholar 

  19. Kaur A, Kaur R, Kumar N (2015) A review on image steganography techniques. Int J Comput Appl 123(4):20–24

    Google Scholar 

  20. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 76(8):10599–10633

    Article  Google Scholar 

  21. Sharma P, Kumar P (2016) Review of various image steganography and steganalysis techniques. International Journal of Advanced Research in Computer Science and Software Engineering 6(7):152–159

    Google Scholar 

  22. Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Journal of Expert systems with Applications 46:293–306

    Article  Google Scholar 

  23. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. J Pattern Recognit 37(3):469–474

    Article  Google Scholar 

  24. Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876–19897

    Article  Google Scholar 

  25. Xiang T, Hu J, Sun J (2015) Outsourcing chaotic selective image encryption to the cloud with steganography. Digital Signal Process. 43:28–37

    Article  Google Scholar 

  26. Sajjad M, Muhammad K, Baik SW, Rho S, Jan Z, Yeo SS, Mehmood I (2017) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl 76(3):3519–3536

    Article  Google Scholar 

  27. Liu B, Chen T, Fu P, Zhen Y, Pan JS (2019) Method of target recognition in high-resolution remote sensing image based on visual saliency mechanism and ROI region extraction. Journal of Internet Technology 20(5):1333–1341

    Google Scholar 

  28. Dinghui Z, Qiujie G, Yonghua P, Xinghua Z (2008) Discrete chaotic encryption and decryption of digital images. International Conference on Computer Science and Software Engineering 3:849–852

    Google Scholar 

  29. Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos image encryption algorithm. Chaos, Solution and Fractals 40(5):2191–2199

    Article  MathSciNet  Google Scholar 

  30. Salleh M, Ibrahim S, Isnin IF (2003) Enhanced chaotic image encryption algorithm based on Baker's map. Proceedings of IEEE Conference on Circuits and Systems 2:508–511

    Google Scholar 

  31. Hong L, Li C (2008) A novel color image encryption approach based on multi-chaotic system. In: Proceedings of 2nd IEEE International Conference on Anti-counterfeiting, Security and Identification, pp. 223–226

    Google Scholar 

  32. Honglei Y, Guang-shou W (2009) The compounded chaotic sequence research in image encryption algorithm. In: Proceedings of WRI Global Congress on Intelligent Systems, vol. 3. pp. 252–256

    Google Scholar 

  33. Rohith S, Bhat KNH, Sharma A (2014) Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register. In: International Conference on Advances in Electronics, Computers and Communications (ICAECC), pp. 1–6

    Google Scholar 

  34. Singh S, Singh A (2013) A review on the various recent steganography techniques. International Journal of Computer Science and Network 2(6):142–156

    MathSciNet  Google Scholar 

  35. Raphael AJ, Sundaram V (2010) Cryptography and steganography-a survey. International Journal of Computer and Technology Applications 2(3):626–630

    Google Scholar 

  36. Vijay PP, Patil NC (2016) Gray scale image segmentation using OTSU Thresholding optimal approach. J For Res 2(5):20–24

    Google Scholar 

  37. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38

    Google Scholar 

  38. http://sipi.usc.edu/database/database.php?volume=misc

  39. El-Latif AAA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075–21083

    Article  Google Scholar 

  40. EL-Latif AAA, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92–102

    Article  Google Scholar 

  41. A. A. A. EL-Latif, B. Abd-El-Atty, E. M. Abou-Nassar, S. E. Venegas-Andraca, “ Controlled alternate quantum walks based privacy preserving healthcare images in internet of things,” Optics and laser technology, https://doi.org/10.1016/j.optlastec.2019.105942, 2020.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabir A. Parah.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Afzal, I., Parah, S.A., Hurrah, N.N. et al. Secure patient data transmission on resource constrained platform. Multimed Tools Appl 83, 15001–15026 (2024). https://doi.org/10.1007/s11042-020-09139-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09139-3

Keywords

Navigation