Robust Steganography in Non-QRS Regions of 2D ECG for Securing Patients' Confidential Information in E-Healthcare Paradigm

Author(s):  
Neetika Soni ◽  
Indu Saini ◽  
Butta Singh

The upsurge in the communication infrastructure and development in internet of things (IoT) has promoted e-healthcare services to provide remote assistance to homebound patients. It, however, increases the demand to protect the confidential information from intentional and unintentional access by unauthorized persons. This chapter is focused on steganography-based data hiding technique for ECG signal in which the selected ECG samples of non-QRS region are explored to embed the secret information. An embedding site selection (ESS) algorithm is designed to find the optimum embedding locations. The performance of the method is evaluated on the basis of statistical parameters and clinically supportive measures. The efficiency is measured in terms of embedding capacity and BER while key space measures its robustness. The implementation has been tested on standard MIT-BIH arrhythmia database of 2 mins and 5 mins duration and found that the proposed technique embarks the proficiency to securely hide the secret information at minimal distortion.

2021 ◽  
Vol 266 ◽  
pp. 09006
Author(s):  
L.A. Balagyozyan ◽  
R.G. Hakobyan

Information exchanged between two parties is often targeted by a third party. Steganography in images is often used for handling threats, such as, in this case, an attacker suspecting the existence of confidential information. But even in this case, if a pattern is used, e.g., hiding the information in successive or every third pixel, the attacker might discover the pattern, and the following revelation of the secret information will cause no difficulties. To avoid such vulnerabilities, the information is hidden in the frames of graphical animation. In the frames, the positions of the pixels selected to store confidential information in the given work are determined by the values of a mathematical function. These actions will ensure the high secrecy of information.


2021 ◽  
Vol 15 (2) ◽  
pp. 81-91
Author(s):  
Shruti Kanga ◽  
Nikola Kranjčić ◽  
Suraj Kumar Singh ◽  
Selim Raja ◽  
Bojan Durin

Healthcare site selection assumes an imperative part in healthcare development and management. From part of the public authority, proper medical site selection will help the distribution of clinical assets, coordinating with the arrangement of medical care with the social and economic demands, organizing the metropolitan and rural healthcare administration advancement, and facilitating social logical inconsistencies. Site suitability analysis is a variety of analysis utilized in GIS to work out the simplest place or site for one thing. The main objective of the current study was to select a site for new healthcare services with geospatial technologies to intermix spatial and non-spatial data to create a weighted result. The current study had been done into three phases, where many processes are intermixed into a single phase. In the first phase of analysis, distance, density, and proximity were mapped to seek out poor and lower accessible areas of healthcare from existing healthcare. To selecting new healthcare sites, four-factor criteria (Buffer around road and rail, land use land cover and buffer around settlement,) and some constrain criteria considered in the second phase of analysis. Finally, the shortest network path analysis has been done in the third phase to determine the shortest and best route from selected healthcare sites towards district medical college. The current study presents some suitable sites in the poor and inaccessible areas of the district. This study will be very helpful for the decision support system of healthcare management in the future.


PLoS ONE ◽  
2021 ◽  
Vol 16 (9) ◽  
pp. e0256821
Author(s):  
Lorenzo Jaime Yu Flores ◽  
Ramon Rafael Tonato ◽  
Gabrielle Ann dela Paz ◽  
Valerie Gilbert Ulep

Site selection of health facilities is critical in ensuring universal access to basic healthcare services. However, in many low and middle-income countries (LMICs) like the Philippines, site selection is traditionally based on political and pragmatic considerations. Moreover, literature that demonstrates the application of facility location models in the Philippine healthcare setting remains scarce, and their usage in actual facility planning is even more limited. In this study, we proposed a variation of cooperative covering maximal models to identify the optimal location of primary care facilities. We demonstrated the feasibility of implementing such a model by using open source data on an actual city in the Philippines. Our results generated multiple candidate locations of primary care facilities depending on the equity and efficiency parameters. This approach could be used as one of the critical considerations in evidence-based, multi-criterion health facility location decisions of governments, and can also be adapted in other industries, given the model’s use of readily available open source datasets.


Author(s):  
Manashee Kalita ◽  
Swanirbhar Majumder

In this smart age, smart gadgets with internet connectivity have become a necessity. While enjoying these facilities, one must count the security of their private or confidential information. With due time, a lot of cryptographic methods have been developed for enforcing security. On the other hand, with the advancement of technologies, the intruders and hackers have also developed their skills and tools. Therefore, many times we fail to protect our information. To get rid of this situation, the developers have to focus on some other method besides cryptography. Steganography can be considered as the solution to overcome this problem, as it is the technique which conceals the existence of any secret information in a usual media file. Moreover, inclusion of biometric with steganography enhances the security level, as biometric systems are dominating the field of authentication. Here, various techniques of steganography, biometrics, and steganography using biometrics will be discussed. Finally, the present scenario of steganography using biometrics will be demonstrated.


1978 ◽  
Vol 16 (2) ◽  
pp. 256
Author(s):  
Jack Prothroe

A continuing concern in the oil and gas business is the protection of secret information which may be fundamental to the success of company in developing prospects. This paper discusses the extent to which the law will afford protection to such information, either through damage actions for its misuse or injunctions to restrain its use. The author discusses the circumstances under which information may become "confidential", and the guidelines developed by the courts in number of different circumstances. Reference is made to the scope of s. 7(e) of the Trade Marks Act; and the paper examines number of practical considerations which may arise in attempting to protect confidential information through the courts.


Cryptography ◽  
2020 ◽  
pp. 355-372
Author(s):  
V. Lokeswara Reddy

Information security using data hiding in video provides high embedding capacity and security. Steganography is one of the oldest data protecting methodologies deals with the embedding of data. Video Steganography hides secret information file within a video. Present day communications are treated to be “un-trusted” in terms of security, i.e. they are relatively easy to be hacked. The proposed technique is invented to hide secret information into a video file keeping two considerations in mind which are size and security of the cover video file. At the sender side, the secret information which is to be hidden is encoded into cover video file. Double layered security for the secret data can be achieved by encrypting confidential information and by embedding confidential information into cover video file frames using encrypted embedding technique.


Sign in / Sign up

Export Citation Format

Share Document