Light weight cryptography-based data hiding system for Internet of Medical Things

被引:2
|
作者
Pesaru, Swetha [1 ]
Mallenahalli, Naresh K. [2 ]
Vardhan, B. Vishnu [3 ]
机构
[1] Jawaharlal Nehru Technol Univ Hyderabad, Dept Comp Sci & Engn, Kukatpally 500085, Telangana, India
[2] Natl Remote Sensing Ctr, Hyderabad, India
[3] JNTUH Coll Engn, Dept Comp Sci & Engn, Manthani, India
关键词
Internet of Medical Things; electrical curve cryptography; Feistel block cipher; redundant discrete wavelet transform; cryptography; steganography; DATA-TRANSMISSION; SECURITY; ISSUES;
D O I
10.1080/20479700.2022.2161145
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The integration of the Internet of Things (IoT) with medical systems is known as the Internet of Medical Things (IoMT), and these devices involve in medical applications such as real-time diagnosis, remote patient monitoring, and real-time medicine prescriptions etc. However, one of the contentions that create challenges in medical services is the integrity and confidentiality of medical information on the IoMT platform. Another important issue with attaining medical record security is information confidentiality for patient records via the IoMT. Therefore, this work mainly focuses on a lightweight cryptography-based data hiding (LWC-DH) system, which is developed by combining LWC approaches with a steganography model for securing medical data. Initially, medical data is divided into even and odd characters, where even characters are encrypted using elliptic curve cryptography (ECC) and odd characters are encrypted using Feistel block cipher (FBC) cryptography. Then, redundant discrete wavelet transforms (RDWT) based steganography is applied for hiding the encrypted message in the cover image. The simulation results show that the proposed LWC-DH system performs superior in terms of peak signal-to-noise ratio (PSNR), structural similarity (SSIM) index, and mean square error (MSE) as compared to state-of-the-art approaches. In addition, the proposed LWC-DH system also produces low computation time as compared to conventional cryptography approaches.
引用
收藏
页数:14
相关论文
共 50 条
  • [2] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [3] Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT)
    Mahalle, Parikshit N.
    Prasad, Neeli Rashmi
    Prasad, Ramjee
    2014 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2014,
  • [4] Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
    An, Rui
    Feng, Hui
    Liu, Qin
    Li, Li
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 857 - 878
  • [5] An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things
    Sowjanya, K.
    Dasgupta, Mou
    Ray, Sangram
    Obaidat, Mohammad S.
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 2154 - 2163
  • [6] ViMDH: Visible-Imperceptible Medical Data Hiding for Internet of Medical Things
    Anand, Ashima
    Singh, Amit Kumar
    Zhou, Huiyu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 849 - 856
  • [7] Cryptography-based location privacy protection in the Internet of Vehicles
    Routis G.
    Katsouris G.
    Roussaki I.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (08) : 3119 - 3139
  • [8] STUDY OF CRYPTOGRAPHY-BASED CYBERSPACE DATA SECURITY
    Yang, Tonghao
    Yu, Bin
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [9] Encryption System for Hiding Information Based on Internet of Things
    Naman H.A.
    Hussien N.A.
    Al-dabag M.L.
    AlRikabi H.T.S.
    International Journal of Interactive Mobile Technologies, 2021, 15 (02) : 172 - 183
  • [10] THE IMPLEMENTATION OF A CRYPTOGRAPHY-BASED SECURE OFFICE SYSTEM
    MUELLERSCHLOER, C
    WAGNER, NR
    AFIPS CONFERENCE PROCEEDINGS, 1982, 51 : 487 - +