A Detailed Survey on Bit Plane Complexity Segmentation (BPCS) and RSA Algorithm for Secured Medical Data Transfer

Author(s):  
D.N.V.S.L.S. Indira ◽  
Kavitha Chaduvula
2018 ◽  
Vol 7 (2) ◽  
pp. 260-265 ◽  
Author(s):  
Yulia Fatma ◽  
Harun Mukhtar ◽  
Muhammad Taufik

The internet network is growing rapidly and has a great impact on human life. The development of the internet network has enabled many people to exchange information or messages,one of tham by using email media. Apparently the internet is a path that in ni not too safe because it is a common communication media that can be used by everyone so prone to tapping information or messages. Therefore, security and confidentiality are needed in data communications. One may to keep messages safe is to use steganography technique. The steganography method used is the method of message insertion using BPCS (Bit Plane Complexity Segmentation). Before the message is inserted, the message is first encrypted using cryptography techniques. The cryptographic algorithm used is RSA algorithm. RSA algorithm consists of encryption algorithm and decryption algorithm. The confidential message is encrypted using RSA encryption algorithm and inserted using the insertion method of BPCS. With the technique of steganography on the image media then the delivery of a secret message will have a good level of security because it can not be detected directly by the senses of human vision. Keywords: cryptography, steganography, RSA, method BPCS   Abstrak Jaringan internet berkembang dengan pesat dan memberikan pengaruh besar bagi kehidupan manusia. Perkembangan jaringan Internet telah memungkinkan banyak orang untuk saling bertukar informasi atau pesan salah satunya dengan media email. Ternyata, internet merupakan jalur yang tidak terlalu aman karna merupakan media komunikasi umum yang dapat digunakan semua orang sehingga rawan penyadapan informasi atau pesan. Oleh karena itu, keamanan dan kerahasiaan sangat dibutuhkan dalam komunikasi data. Salah satu cara untuk menjaga keamanan pesan adalah menggunakan teknik steganografi. Metode steganografi yang digunakan adalah metode penyisipan pesan, dengan menggunakan metode BPCS (Bit Plane Complexity Segmentation). Sebelum pesan disisipkan terlebih dahulu pesan tersebut dienkripsi dengan menggunakan teknik kriptografi. Algoritma kriptografi yang digunakan adalah algoritma RSA. Algoritma RSA terdiri dari algoritma enkripsi dan algoritma dekripsi. Pesan rahasia disandikan menggunakan algoritma enkripsi RSA dan disisipkan menggunakan metode penyisipan BPCS. Dengan adanya teknik steganografi pada media citra maka pengiriman suatu pesan yang bersifat rahasia akan memiliki tingkat keamanan yang baik karena tidak dapat dideteksi langsung oleh indera penglihatan manusia. Keywords: Kriptografi, Steganogari, RSA, Metode BPCS


2018 ◽  
Author(s):  
Junaidy Budi Sanger

Information exchange in a network could lead into some problems, such as privacy problem, authentication problem, data integrity problem, and non-repudiation problem. Thus, precise security acts are needed to solve those problems. Digital signature is a solution to solve those problems. Digital signature is basically just like a written signature, which is used to authenticate documents. The difference is that the written signature usually describes the name of a signer whereas the digital signature consists of cryptography codes of a message and a sender. Digital signature using hash function is one of the most used digital signatures. Unfortunately, this kind of digital signature can not solve all given problems, such as privacy problem and non repudiation problem. Therefore, RSA algorithm is needed to solve that problem. The result of this research is the implementation of digital signature along with RSA algorithm and MD5 hash function in a data transfer application.


Author(s):  
Igor Dugonjić ◽  
Mihajlo Travar ◽  
Gordan Bajić

Regional PACS and other shared medical systems are primary intended for sharing medical images. In these systems, the number of users is significantly increased in relation to local systems, and the fact is that the public network is very frequently used for data transfer. As medical data are very sensitive, such situation creates considerable risk regarding privacy, integrity and right to access to these data. This paper includes the most frequent risks and methods to solve these issues as well as recommendations for safe use of cloud computing systems in order to implement these systems.


Author(s):  
Chandrasekaran R. ◽  
Hemalatha R. J. ◽  
Josephin Arockia Dhivya A. ◽  
Thamizhvani T. R.

Wireless sensor networking plays an important role in sensor signal communication and data transfer. The WSN is one of the trending fields in medical data mining. WSN provides the connecting link between the real physical world and virtual environment. In this study, the various WSN network algorithm, topologies, architectures, and their applications to medical technology are discussed. This study will be useful for the readers to know about various communicative technologies and standards followed in biomedical technology.


Author(s):  
I. Apostolakis ◽  
A. Chryssanthou ◽  
I. Varlamis

A significant issue in health related applications is protecting a patient’s profile data from unauthorized access. In the case of telemedicine systems a patient’s medical profile and other medical information is transferred over the network from the examination lab to the doctor’s office in order for the doctor to be able to perform a diagnosis. The medical information transferred across the network should be encrypted, secured and protected until it reaches its final destination. Patients’ medical profiles should be accessible by their doctors in order to support diagnosis and care, but must also be protected from other patients, medical companies and others who are not certified by the patient to access his medical data. A very important element of virtual communities is trust. Trust should be built upon the same specifications for secure data transfer and leveled access with medical information. Furthermore, trust requires a strict policy based mechanism, which defines roles, access rights and limitation among community members, as well as a flexible identification mechanism, which allows anonymity of patients, while in the same time guarantees the truthfulness of doctors’ identity and expertise.


2011 ◽  
pp. 1190-1204
Author(s):  
I. Apostolakis ◽  
A. Chryssanthou ◽  
I. Varlamis

A significant issue in health related applications is protecting a patient’s profile data from unauthorized access. In the case of telemedicine systems a patient’s medical profile and other medical information is transferred over the network from the examination lab to the doctor’s office in order for the doctor to be able to perform a diagnosis. The medical information transferred across the network should be encrypted, secured and protected until it reaches its final destination. Patients’ medical profiles should be accessible by their doctors in order to support diagnosis and care, but must also be protected from other patients, medical companies and others who are not certified by the patient to access his medical data. A very important element of virtual communities is trust. Trust should be built upon the same specifications for secure data transfer and leveled access with medical information. Furthermore, trust requires a strict policy based mechanism, which defines roles, access rights and limitation among community members, as well as a flexible identification mechanism, which allows anonymity of patients, while in the same time guarantees the truthfulness of doctors’ identity and expertise.


Author(s):  
С.А. Сайганов ◽  
В.И. Мазуров ◽  
В.В. Голдобин ◽  
С.В. Лобзин ◽  
Е.Г. Клочева ◽  
...  

В статье отражены перспективы оказания медицинской помощи пациентам пожилого и старческого возраста с цереброваскулярной патологией с использованием портативного телемедицинского комплекса. Проведен анализ телемедицинского взаимодействия врач-консультант-пациент для оказания медицинской помощи, обсуждены критерии выбора медицинских приборов в составе телемедицинского комплекса, организационно-правовые аспекты передачи, хранения и доступа к медицинской информации, приведены важные клинические особенности цереброваскулярной патологии у пациентов старших возрастных групп, определяющие необходимость привлечения высококвалифицированных специалистов, а также возможности использования разрабатываемого портативного комплекса. The article discusses perspectives of medical care in elderly and senile patients with cerebrovascular pathology with portable telemedical complex use. Analysis of telemedical cooperation physician-consultant-patient and discussion of medical equipment criteria for telemedical complex selection and organizational together with legal issues of medical data transfer, storage and access were performed. The important clinical features of cerebrovascular pathology in elderly patients were presented, which determined necessity of highly qualified medical specialist involvement in management of such patients. The opportunities of portable medical complex usage were discussed.


2018 ◽  
Vol 7 (2.14) ◽  
pp. 559
Author(s):  
Sharath Aradhyamath ◽  
Joy Paulose

Healthcare data is crucial in patient’s surveillance. To give the finest treatment to patients the data should be of the best quality. Many security threats affect the integrity and ingenuity of the medical data. In the recent times, medical data can be accessed anytime and anywhere with the help of an overwhelming technology called the Internet of Things (IoT). IoT has numerous applications based on healthcare, however, it facilitates data misuse such as data breach and health care fraud. Sensitive and protected data is stolen and modified by an unauthorized person. Due to these data abuses, it degrades the quality of medical data and service. In this paper, secure data transfer is done in IoT based healthcare to enhance the security of the medical data. Data confidentiality can be achieved using encryption algorithms such as Tiny Encryption Algorithm (TEA) which is lightweight and suitable for resource constraint devices. The results of the proposed system show that the modified TEA overcomes the drawback of the equivalent key and also provides a better security to healthcare data.


Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6096
Author(s):  
Longze Wang ◽  
Jing Wu ◽  
Rongfang Yuan ◽  
Delong Zhang ◽  
Jinxin Liu ◽  
...  

The emerging blockchain technology has injected new vitality into the energy market, especially the peer-to-peer power trading of microgrid systems. However, with the increase of energy blockchain projects, the difficulty of data communication and value islands between blockchain networks have become open issues. Thus, in this paper, we propose a dynamic adaptive cross-chain trading mode for multi-microgrid joint operation. The novelty is to design a proof of credit threshold consensus mechanism to achieve effective information verification. This consensus mechanism can ensure the adaptive consistency of cross-chain information without changing the existing blockchain architecture of each system. At the same time, we design a corresponding key management interoperability protocol based on RSA algorithm and Chinese remainder theorem, which can realize data transfer and information consensus for cross-chain transactions. The theoretical analysis verifies that the cross-chain communication information is effective and the system is able to protect against the attack of malicious nodes. Finally, a cross-chain simulation experiment is established to analyze the operation efficiency. The result shows that this cross-chain trading takes place within seconds, which basically meets the response requirements for multi-microgrid joint operation.


Sign in / Sign up

Export Citation Format

Share Document