Literature DB >> 35582243

Efficient Security and Authentication for Edge-Based Internet of Medical Things.

Shabir A Parah1, Javaid A Kaw1, Paolo Bellavista2, Nazir A Loan1, G M Bhat3, Khan Muhammad4, Victor Hugo C de Albuquerque5,6.   

Abstract

Internet of Medical Things (IoMT)-driven smart health and emotional care is revolutionizing the healthcare industry by embracing several technologies related to multimodal physiological data collection, communication, intelligent automation, and efficient manufacturing. The authentication and secure exchange of electronic health records (EHRs), comprising of patient data collected using wearable sensors and laboratory investigations, is of paramount importance. In this article, we present a novel high payload and reversible EHR embedding framework to secure the patient information successfully and authenticate the received content. The proposed approach is based on novel left data mapping (LDM), pixel repetition method (PRM), RC4 encryption, and checksum computation. The input image of size [Formula: see text] is upscaled by using PRM that guarantees reversibility with lesser computational complexity. The binary secret data are encrypted using the RC4 encryption algorithm and then the encrypted data are grouped into 3-bit chunks and converted into decimal equivalents. Before embedding, these decimal digits are encoded by LDM. To embed the shifted data, the cover image is divided into [Formula: see text] blocks and then in each block, two digits are embedded into the counter diagonal pixels. For tamper detection and localization, a checksum digit computed from the block is embedded into one of the main diagonal pixels. A fragile logo is embedded into the cover images in addition to EHR to facilitate early tamper detection. The average peak signal to noise ratio (PSNR) of the stego-images obtained is 41.95 dB for a very high embedding capacity of 2.25 bits per pixel. Furthermore, the embedding time is less than 0.2 s. Experimental results reveal that our approach outperforms many state-of-the-art techniques in terms of payload, imperceptibility, computational complexity, and capability to detect and localize tamper. All the attributes affirm that the proposed scheme is a potential candidate for providing better security and authentication solutions for IoMT-based smart health.

Entities:  

Keywords:  Authentication; COVID-19; Internet of Medical Things (IoMT); emotion care; imperceptibility; reversibility; security; smart health

Year:  2020        PMID: 35582243      PMCID: PMC8956370          DOI: 10.1109/JIOT.2020.3038009

Source DB:  PubMed          Journal:  IEEE Internet Things J        ISSN: 2327-4662            Impact factor:   9.471


  4 in total

1.  Pairwise prediction-error expansion for efficient reversible data hiding.

Authors:  Bo Ou; Xiaolong Li; Yao Zhao; Rongrong Ni; Yun-Qing Shi
Journal:  IEEE Trans Image Process       Date:  2013-12       Impact factor: 10.856

2.  A Survey of Healthcare Internet-of-Things (HIoT): A Clinical Perspective.

Authors:  Hadi Habibzadeh; Karthik Dinesh; Omid Rajabi Shishvan; Andrew Boggio-Dandry; Gaurav Sharma; Tolga Soyata
Journal:  IEEE Internet Things J       Date:  2019-10-09       Impact factor: 9.471

3.  Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications.

Authors:  Nazir A Loan; Shabir A Parah; Javaid A Sheikh; Jahangir A Akhoon; Ghulam M Bhat
Journal:  J Biomed Inform       Date:  2017-08-03       Impact factor: 6.317

4.  Hiding clinical information in medical images: A new high capacity and reversible data hiding technique.

Authors:  Shabir A Parah; Farhana Ahad; Javaid A Sheikh; G M Bhat
Journal:  J Biomed Inform       Date:  2017-01-12       Impact factor: 6.317

  4 in total
  7 in total

1.  Feature Extraction Approach for Speaker Verification to Support Healthcare System Using Blockchain Security for Data Privacy.

Authors:  Shrikant Upadhyay; Mohit Kumar; Ashwani Kumar; Ramesh Karnati; Gouse Baig Mahommad; Sara A Althubiti; Fayadh Alenezi; Kemal Polat
Journal:  Comput Math Methods Med       Date:  2022-07-25       Impact factor: 2.809

2.  Mathematical analysis of COVID-19 pandemic by using the concept of SIR model.

Authors:  Harish Garg; Abdul Nasir; Naeem Jan; Sami Ullah Khan
Journal:  Soft comput       Date:  2021-08-28       Impact factor: 3.732

Review 3.  Double layer security using crypto-stego techniques: a comprehensive review.

Authors:  Aiman Jan; Shabir A Parah; Muzamil Hussan; Bilal A Malik
Journal:  Health Technol (Berl)       Date:  2021-10-13

4.  SCLAVOEM: hyper parameter optimization approach to predictive modelling of COVID-19 infodemic tweets using smote and classifier vote ensemble.

Authors:  Taiwo Olaleye; Adebayo Abayomi-Alli; Kayode Adesemowo; Oluwasefunmi Tale Arogundade; Sanjay Misra; Utku Kose
Journal:  Soft comput       Date:  2022-03-15       Impact factor: 3.732

5.  A Novel Approach to Skin Lesion Segmentation: Multipath Fusion Model with Fusion Loss.

Authors:  Adi Alhudhaif; Hakan Ocal; Necaattin Barisci; İsmail Atacak; Majid Nour; Kemal Polat
Journal:  Comput Math Methods Med       Date:  2022-07-29       Impact factor: 2.809

6.  Machine Learning and Electrocardiography Signal-Based Minimum Calculation Time Detection for Blood Pressure Detection.

Authors:  Majid Nour; Derya Kandaz; Muhammed Kursad Ucar; Kemal Polat; Adi Alhudhaif
Journal:  Comput Math Methods Med       Date:  2022-07-19       Impact factor: 2.809

7.  Multithreshold Segmentation and Machine Learning Based Approach to Differentiate COVID-19 from Viral Pneumonia.

Authors:  Shaik Mahaboob Basha; Aloísio Vieira Lira Neto; Samah Alshathri; Mohamed Abd Elaziz; Shaik Hashmitha Mohisin; Victor Hugo C De Albuquerque
Journal:  Comput Intell Neurosci       Date:  2022-08-20
  7 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.