access icon openaccess Facilitating and securing offline e-medicine service through image steganography

E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation.

Inspec keywords: steganography; biomedical communication; smart cards; security of data; health care; medical image processing; electronic health records; image coding; access control; information networks; cryptographic protocols

Other keywords: card authentication; offline health care services; offline e-medicine service facilitation; Internet; networking technology; e-medicine booths; data embedding procedure; single user authentication; smart cards; e-medicine server system; offline e-medicine service security; image steganography; card owner identity verification; e-medicine system physical structure; patient reports

Subjects: Biomedical measurement and imaging; Cryptography theory; Optical, image and video signal processing; Protocols; Medical administration; Medical and biomedical uses of fields, radiations, and radioactivity; health physics; Computer communications; Computer vision and image processing techniques; Information networks; Biomedical communication; Patient diagnostic methods and instrumentation; Cryptography; Data security; Biology and medical computing

References

    1. 1)
    2. 2)
      • 11. Liou, Y.P., Lin, J., Wang, S.S.: ‘A new dynamic ID-based remote user authentication scheme using smart cards’. Proc. of 16th Information Security Conf. 2006, Taiwan, pp. 198205.
    3. 3)
    4. 4)
    5. 5)
    6. 6)
    7. 7)
      • 9. Liao, I., Lee, C.C., Hwang, M.S.: ‘Security enhancement for a dynamic ID-based remote user authentication scheme’. Proc. of the Int. Conf. on Next Generation Web Services Practices (NWeSP‘05), Seoul Korea, 2005, pp. 43740.
    8. 8)
    9. 9)
      • 20. Zhao, H., Wang, H., Khan, M.K.: ‘Statistical analysis of several reversible data hiding algorithms’. Proc. Multimedia Tools and Applications, 2009, DOI: 10.1007/s11042-009-0380-y.
    10. 10)
    11. 11)
      • 15. Rura, L., Issac, B., Haldar, M.K.: ‘Secure electronic voting system based on image steganography’. 2011 IEEE Conf. on Open Systems (ICOS 2011), 2011.
    12. 12)
    13. 13)
    14. 14)
    15. 15)
    16. 16)
      • 7. Brindha, S., Vennila, I.: ‘Hiding fingerprint in face using scattered LSB embedding steganographic technique for smart card based authentication system’, Int. J. Comput. Appl., 2011, 26, (10), pp. 5155.
    17. 17)
    18. 18)
    19. 19)
    20. 20)
    21. 21)
    22. 22)
    23. 23)
      • 5. Tian, H., Zhou, K., Hong, J., et al: ‘An M-sequence based steganography model for voice over IP’. IEEE Int. Conf. on Communications (ICC 2009), 2009.
http://iet.metastore.ingenta.com/content/journals/10.1049/htl.2013.0026
Loading

Related content

content/journals/10.1049/htl.2013.0026
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading