| Literature DB >> 33935374 |
Joydeep Dey1, Soumi Mukherjee2.
Abstract
In this era of wireless COVID-19 telehealth, visiting hospital for regular follow-ups could invite coronavirus in someone's body. Opting for proactive E-health services is the best thing. It helps the remote patients to share their confidential data through secured encryption. Telehealth services are emerging element in these proactive medical sciences. It helps the remote patients to share their confidential data through secured transmission. In this paper, amino acid guided matrix encoding scheme has been proposed. White blood cell count or Leukocute count is a dominant indicator of patients' health condition, even amid COVID-19. An abnormal growth in leukocyte count is mainly caused due to an infection, cancer, or any other severe symptoms. It initiates internal haematological inflammations, cardiovascular diseases, Type II diabetes, etc. Therefore, tracking leukocyte count may for disease diagnosis and further treatments. The leukocyte count is generally done in different pathologies, and the data evaluation needs the expertise of a pathologist. In this paper, a technique involving security measures to transmit the result of the histological test with the help of cryptography has been proposed. The data to be transferred to the concerned physician for further diagnosis with the help of proposed way of encryption using amino acids, which ensures no data loss, no data modification, no data theft in the middle of transmission. The proposed encryption method using the amino acid codes has produced results showing satisfactory performances such as p-values found to be 7.215544e-04 and 8.48904e-03 for the key stream and cipher key matrix monobit test respectively, and 8.10245e-04 and 8.10245e-04 for the key stream and cipher key matrix frequency test respectively. It may be used as a transmission module in any wireless COVID-19 Telehealth Systems.Entities:
Keywords: COVID-19; Electronic health; Isosceles triangle encryption; Leukocyte count
Year: 2021 PMID: 33935374 PMCID: PMC8075279 DOI: 10.1007/s11277-021-08534-9
Source DB: PubMed Journal: Wirel Pers Commun ISSN: 0929-6212 Impact factor: 1.671
Normal range of differential leukocyte count
| Types of WBC | Percentage of WBC types (%) | Normal range in mm3 |
|---|---|---|
| Neutrophils | 40–60 | 2500–8000 |
| Eosinophils | 1–4 | 50–500 |
| Basophils | 0.5–1 | 25–100 |
| Lymphocytes | 20–40 | 1000–4000 |
| Monocytes | 2–8 | 100–700 |
Fig. 1Differential leukocyte count [16]
Proposed amino acids assignment of different differential leukocyte counts
| Amino acid | Range in mm3 | Condition(s) | Common disease(s) |
|---|---|---|---|
| A | > 2400 | Neutropenia | Ulcer, Abscesses, Rashes, Wounds taking higher healing time |
| R | 2500–8000 | Normal neutrophils | Not applicable |
| N | < 10,000 | Neutrophilia | Herpes, Militarty TB, Hepatic Amoebiasis, Pneumocystis carinii |
| D | > 50 | Eosinopenia | Thymoma, Hypogammaglobulinemia, Stress Reactions, Cushing’s syndrome |
| H | 50–500 | Normal Eosinophils | Not Applicable |
| I | < 500 | Eosinophilia | Eosinophilia-myalgia-syndrome, Asthma, Eosinophilic Fasciitis |
| L | > 25 | Basopenia | Urticaria, Hyperthyroidism, Increase of Glucocorticoids |
| K | 25–100 | Normal Basophiles | Not Applicable |
| C | < 100 | Basophilia | CML, Ulcerative colitis, TB, Rheumatoid Arthritis, Inflammatory Bowel Disease (IBD) |
| Q | > 1000 | Lymphopenia | HIV, Hypersplenism, Leukemia, Aplastic Lupus, Myelodysplatic syndrome |
| E | 1000–4000 | Normal Lymphocyte | Not Applicable |
| F | < 4000 | Lymphophocytosis | Glandular fever, Chagas disease, Lymphoma, Toxoplasmosis, American-trypanosomiasis, TB |
| G | > 100 | Monocytopenia | Acute Myeloid Leukemia, Hairy cell leukemia, Aplastic anemia, MonoMAC syndrome |
| P | 100–700 | Normal Monocyte | Not Applicable |
| W | < 700 | Monocytosis | Sarcoidosis, Brucellosis, CMML |
Complementary method of amino acids in BLOSUM 50
| Amino acids | Complementary amino acids | Amino acids | Complementary amino acids |
|---|---|---|---|
| K | P | W | D |
| H | V | I | Q |
| R | C | L | N |
| N | L | F | A |
| G | E | C | R |
| A | F | V | H |
| Q | I | P | K |
| D | W | E | G |
Key orientation of cipher matrix
| Orientation | Key bits |
|---|---|
| Left top down | 00010 |
| Right top down | 11101 |
| Left down top | 01011 |
| Right down top | 11000 |
Fig. 2Encryption isosceles triangle
Monobit test for key stream
| Sl. No | Encryption technique | Expected proportion value | Observed proportion value | Status (proportion of passing) | |
|---|---|---|---|---|---|
| 1 | 0.942831 | 0.955011 | 7.778150e−02 | Result is fine | |
| 2 | 0.942831 | 0.969801 | 7.580168e−03 | Result is fine | |
| 3 | 0.942831 | 0.978022 | 8.647011e−02 | Result is fine | |
| 4 | 0.942831 | 0.978843 | 7.215544e−04 | Result is fine |
Monobit test for cipher key matrix
| Sl. No | Encryption technique | Expected proportion value | Observed proportion value | Status (proportion of passing) | |
|---|---|---|---|---|---|
| 1 | 0.920675 | 0.936572 | 7.547131e−03 | Result is fine | |
| 2 | 0.920675 | 0.964780 | 7.583698e−02 | Result is fine | |
| 3 | 0.920675 | 0.950017 | 7.587212e−02 | Result is fine | |
| 4 | 0.920675 | 0.941478 | 8.48904e−03 | Result is fine |
Frequency test for key stream
| Sl. No | Encryption technique | Expected proportion value | Observed proportion value | Status (proportion of passing) | |
|---|---|---|---|---|---|
| 1 | 0.972104 | 0.996472 | 8.55897e−02 | Result is fine | |
| 2 | 0.972104 | 0.987123 | 7.52369e−02 | Result is fine | |
| 3 | 0.972104 | 0.948717 | 7. 88746e−04 | Result is fine | |
| 4 | 0.972104 | 0.978960 | 8.10245e−04 | Result is fine |
Frequency test for cipher key matrix
| Sl. No | Encryption technique | Expected proportion value | Observed proportion value | Status (proportion of passing) | |
|---|---|---|---|---|---|
| 1 | RSA | 0.95680 | 0.969875 | 8.589731e−03 | Result is fine |
| 2 | AES 192bits | 0.95680 | 0.923044 | 6.87845e−02 | Result is fine |
| 3 | 3DES | 0.95680 | 0.901247 | 7.665871e−02 | Result is fine |
| 4 | Proposed | 0.95680 | 0.970125 | 8.879905e−03 | Result is fine |
Fig. 3Histogram of plain WBC
Fig. 4Histogram of WBC post proposed encryption
Differential WBC count report
| Days | Neutrophiles in mm3 | Eosinophils in mm3 | Basophils in mm3 | Lymphocytes in mm3 | Monocytes in mm3 |
|---|---|---|---|---|---|
| 1 | 3000 | 250 | 230 | 5500 | 600 |
| 2 | 3200 | 200 | 210 | 5200 | 650 |
| 3 | 3250 | 225 | 280 | 5850 | 680 |
Fig. 5WBC Count of a Healthy Individual
Fig. 6WBC Count of Chronic Myelogenous Leukemia
Comparison table with classical algorithms
| Comparison name/parameter | Selection Reason | Stream | RSA | AES(192 bits) | 3-DES | Proposed here |
|---|---|---|---|---|---|---|
| Monobit Test/ | To determine the proportion of ones and zeros | Key Stream | 7.778150e−02 | 7.580168e−03 | 8.647011e−2 | 7.215544e−04 |
| Frequency Test/ | To determine the proportion of ones and zeros within different blocks | Key Stream | 8.55897e−02 | 7.52369e−02 | 7. 88746e−04 | 8.10245e−04 |
| Monobit Test/ | To determine the proportion of ones and zeros | Cipher Key Matrix | 7.547131e−03 | 7.583698e−02 | 7.587212e−02 | 8.48904e−03 |
| Frequency Test/ | To determine the proportion of ones and zeros within different blocks | Cipher Key Matrix | 8.589731e−03 | 6.87845e−02 | 7.665871e−02 | 8.879905e−03 |
Comparison table with literature survey works
| Comparison criteria | Reason behind criteria selection | Yamuna et al. [ | Abdo et al. [ | Bazli et al. [ | Sohal et al. [ | Proposed here |
|---|---|---|---|---|---|---|
| Matrix computing | The matrices are hard to detect by the Intruder rather than plain text | Absent | Absent | Absent | Absent | Present |
| Security at public channel | Cipher text are likely to be hacked during the public paths | Absent | Absent | Present | Present | Present |
| Key generation | Encryption key is the base of symmetric key cryptography | Weak | Weak | Strong | Strong | Strong |
| Time complexity evaluation | The time complexity is a crucial parameter for any cryptographic system | Absent | Present | Absent | Absent | Absent |
| Standard graphs | Efficacy of the proposed encryption can be better understood by graphical representations | Absent | Absent | Absent | Absent | Present |
| Mat I = | A | I | W | G |
| P | R | C | Q | |
| L | K | E | D | |
| F | H | N | V |
| Mat II = | 1101 | 0001 | 0010 | 1001 |
| 0101 | 0011 | 1111 | 1011 | |
| 0100 | 0001 | 0110 | 1100 | |
| 0111 | 0000 | 1110 | 1010 |