An Adaptive Enhanced Technique for Locked Target Detection and Data Transmission over Internet of Healthcare Things

Author:

Khan MuhammadORCID,Khan Jawad,Sehito NabilaORCID,Mahmood Khalid,Ali HaiderORCID,Bari InamORCID,Arif MuhammadORCID,Ghoniem Rania

Abstract

The incredible advancements in data transmission technology have opened up more potentials for data security than ever before. Numerous methods for data protection have been developed during the previous decades, including steganography and cryptography. The security and integrity of medical data have emerged as major barriers for healthcare service systems as the Internet of Things has evolved dramatically in the healthcare business. Communication between two devices securely is a difficult problem. Numerous cryptographic algorithms are already available, including data encryption standard (DES), Rivest–Shamir–Adleman (RSA), and advanced encryption standard (AES). In this paper, we present a hybrid security model for the protection of diagnostic text data contained in medical photographs. The proposed model is built by combining a proposed hybrid encryption system with either a 2D Discrete Wavelet Transform 1 Level (2D-DWT-1L) or a 2D Discrete Wavelet Transform 2 Level (2D-DWT-2L) steganography technique. The suggested model encrypts secret data and hides them using 2D-DWT-3L. As text covers, color and grayscale images are employed. The suggested system’s performance was tested using PSNR, SSIM, MSE, and Correlation. Associated to state-of-the-art approaches, the proposed model masked personal patient data with high capacity, imperceptibility and minimum deterioration in the received stego-image. We use MATLAB to build the proposed mechanism, and measures such as throughput and execution time are used to assess performance.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Reference24 articles.

1. Smart-City-based Data Fusion Algorithm for Internet of Things;Khan;Comput. Mater. Contin.,2022

2. IoT-based secure healthcare monitoring system;Sharma;Proceedings of the IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT),2019

3. Unsupervised Learning Discriminative MIG Detectors in Nonhomogeneous Clutter

4. One-Step Persymmetric GLRT for Subspace Signals

5. Internet of Things (IoT) in high-risk Environment, Health and Safety (EHS) industries: A comprehensive review;Thibaud;Decis. Support Syst.,2018

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Artificial Intelligence (AI) and Internet of Things (IoT) Applications in Sustainable Technology;Advanced Technologies and Societal Change;2024-08-31

2. A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications;Computers in Human Behavior;2024-04

3. Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors;2024 4th International Conference on Data Engineering and Communication Systems (ICDECS);2024-03-22

4. Enhancing Wireless Mesh Network Performance Through AI-Based Routing Algorithms;2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI);2023-11-23

5. Enhancing Data Transmission Reliability in Cluttered Environments using Adaptive Wireless Sensors;2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI);2023-11-23

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3