Security enhancement in image steganography for medical integrity verification system

Author(s):  
M. S. Sreekutty ◽  
P. S. Baiju
2020 ◽  
Vol 39 (4) ◽  
pp. 5027-5036
Author(s):  
You Lu ◽  
Qiming Fu ◽  
Xuefeng Xi ◽  
Zhenping Chen

Data outsourcing has gradually become a mainstream solution, but once data is outsourced, data owners will without the control of the data hardware, there is a possibility that the integrity of the data will be destroyed objectively. Many current studies have achieved low network overhead cloud data set verification by designing algorithmic structures (e.g., hashing, Merkel verification trees); however, cloud service providers may not recognize the incompleteness of cloud data to avoid liability or business factors fact. There is a need to build a secure, reliable, non-tamperable, and non-forgeable verification system for accountability. Blockchain is a chain-like data structure constructed by using data signatures, timestamps, hash functions, and proof-of-work mechanisms. Using blockchain technology to build an integrity verification system can achieve fault accountability. Blockchain is a chain-like data structure constructed by using data signatures, timestamps, hash functions, and proof-of-work mechanisms. Using blockchain technology to build an integrity verification system can achieve fault accountability. This paper uses the Hadoop framework to implement data collection and storage of the HBase system based on big data architecture. In summary, based on the research of blockchain cloud data collection and storage technology, based on the existing big data storage middleware, a large flow, high concurrency and high availability data collection and processing system has been realized.


Author(s):  
Lizzy Tengana ◽  
Jesus Solano ◽  
Alejandra Castelblanco ◽  
Esteban Rivera ◽  
Christian Lopez ◽  
...  

Author(s):  
M. Czerminska ◽  
J. Kukluk ◽  
C. Molodowitch ◽  
R.A. Cormack ◽  
J.H. Killoran

This paper proposes a Bio-key generation method for integrity checking in fingerprint verification system. A major drawback in traditional cryptography is random key generation and those keys need to be remembered by the user. To overcome such drawback the crypto-Bio-key generation system is introduced. In this system, there are three process to follow. Initially, a revocable transformation of the compressed fingerprint feature data using transformation key for security enhancement. Secondly, the key exchange technique using Elliptic curve cryptography (ECC) to generate secret key. Finally SHA256 hash function generates the Bio-key for high level integrity checking.


2019 ◽  
Vol 73 ◽  
pp. 259-267 ◽  
Author(s):  
Steven Camacho ◽  
Dora M. Ballesteros L ◽  
Diego Renza

Sign in / Sign up

Export Citation Format

Share Document