© The Institution of Engineering and Technology
E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation.
References
-
-
1)
-
22. Hong, W., Chen, T.-S.: ‘A local variance-controlled reversible data hiding method using prediction and histogram-shifting’, J. Syst. Softw., 2010, 83.12, pp. 2653–2663 (doi: 10.1016/j.jss.2010.08.047).
-
2)
-
11. Liou, Y.P., Lin, J., Wang, S.S.: ‘A new dynamic ID-based remote user authentication scheme using smart cards’. Proc. of 16th Information Security Conf. 2006, Taiwan, pp. 198–205.
-
3)
-
23. Lin, C.-C.: ‘An information hiding scheme with minimal image distortion’, Comput. Stand. Interfaces, 2011, 33, (5), pp. 477–484 (doi: 10.1016/j.csi.2011.02.003).
-
4)
-
C.-F. Lee ,
H.-L. Chen
.
A novel data hiding scheme based on modulus function.
J. Syst. Softw.
,
5 ,
832 -
843
-
5)
-
14. Pang, L., Sun, M.-H., Luo, S.-S., et al: ‘Full privacy preserving electronic voting scheme’, J. China Univ. Posts Telecommun., 2012, 19, (4), pp. 86–93 (doi: 10.1016/S1005-8885(11)60287-2).
-
6)
-
13. Khan, M.K., Kim, S.K., Alghathbar, K.: ‘Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme’, Comput. Commun., 2011, 34, pp. 305–9 (doi: 10.1016/j.comcom.2010.02.011).
-
7)
-
9. Liao, I., Lee, C.C., Hwang, M.S.: ‘Security enhancement for a dynamic ID-based remote user authentication scheme’. Proc. of the Int. Conf. on Next Generation Web Services Practices (NWeSP‘05), Seoul Korea, 2005, pp. 437–40.
-
8)
-
1. Chen, C.-C., Tsai, Y.-H.: ‘Adaptive reversible image watermarking scheme’, J. Syst. Softw., 2011, 84, (3), pp. 428–434 (doi: 10.1016/j.jss.2010.11.891).
-
9)
-
20. Zhao, H., Wang, H., Khan, M.K.: ‘Statistical analysis of several reversible data hiding algorithms’. Proc. Multimedia Tools and Applications, 2009, .
-
10)
-
6. Ulutas, M., Ulutas, G., Nabiyev, V.V.: ‘Medical image security and EPR hiding using Shamir's secret sharing scheme’, J. Syst. Softw., 2011, 84, (3), pp. 341–353 (doi: 10.1016/j.jss.2010.11.928).
-
11)
-
15. Rura, L., Issac, B., Haldar, M.K.: ‘Secure electronic voting system based on image steganography’. 2011 IEEE Conf. on Open Systems (ICOS 2011), 2011.
-
12)
-
28. Hong, W., Chen, T.S.: ‘A novel data embedding method using adaptive pixel pair matching’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (1), pp. 176–184 (doi: 10.1109/TIFS.2011.2155062).
-
13)
-
L. Kamstra ,
H.J.A.M. Heijmans
.
Reversible data embedding into images using wavelet techniques and sorting.
IEEE Trans. Image Process.
,
12 ,
2082 -
2090
-
14)
-
C.-L. Liu ,
S.-R. Liao
.
High-performance JPEG steganography using complementary embedding strategy.
Pattern Recog.
,
2945 -
2955
-
15)
-
19. Huang, F., Luo, W., Huang, J.: ‘Steganalysis of JPEG steganography with complementary embedding strategy’, IET Inf. Secur., 2011, 5, (1), pp. 10–18 (doi: 10.1049/iet-ifs.2009.0080).
-
16)
-
7. Brindha, S., Vennila, I.: ‘Hiding fingerprint in face using scattered LSB embedding steganographic technique for smart card based authentication system’, Int. J. Comput. Appl., 2011, 26, (10), pp. 51–55.
-
17)
-
E.-J. Yoon ,
E.-K. Ryu ,
K.-Y. Yoo
.
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme.
Comput. Secur.
,
1 ,
50 -
56
-
18)
-
N. Provos ,
P. Honeyman
.
Hide and seek: an introduction to steganography.
IEEE Secur. Priv.
,
3 ,
32 -
44
-
19)
-
18. Yang, C.-H., Weng, C.-Y., Wang, S.-J., Sun, H.-M.: ‘Varied PVD + LSB evading detection programs to spatial domain in data embedding systems’, J. Syst. Softw., 2010, 83, (10), pp. 1635–1643 (doi: 10.1016/j.jss.2010.03.081).
-
20)
-
12. Wang, Y.Y., Kiu, J.Y., Xiao, F.X., Dan, J.: ‘A more efficient and secure dynamic ID based remote user authentication scheme’, Comput. Commun., 2009, 32, (4), pp. 583–5 (doi: 10.1016/j.comcom.2008.11.008).
-
21)
-
A.K. Das
.
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards.
IET Inf. Secur.
,
3 ,
145 -
151
-
22)
-
17. Hong, W., Chen, T.-S., Luo, C.-W.: ‘Data embedding using pixel value differencing and diamond encoding with multiple-base notational system’, J. Syst. Softw., 2012, 85, (5), pp. 1166–1175 (doi: 10.1016/j.jss.2011.12.045).
-
23)
-
5. Tian, H., Zhou, K., Hong, J., et al: ‘An M-sequence based steganography model for voice over IP’. IEEE Int. Conf. on Communications (ICC 2009), 2009.
http://iet.metastore.ingenta.com/content/journals/10.1049/htl.2013.0026
Related content
content/journals/10.1049/htl.2013.0026
pub_keyword,iet_inspecKeyword,pub_concept
6
6