Enhancing medical data security using tiny encryption algorithm and least significant bit steganography
Data is the new oil of today. With this, data security becomes highly imperative. This is even more true for healthcare institutions since patient data is crucial for their correct treatment by doctors. In the absence of patient data, lives cannot be saved and this results in a hospital being unable...
        Saved in:
      
    
          | Published in | AIP conference proceedings Vol. 2796; no. 1 | 
|---|---|
| Main Authors | , , , , | 
| Format | Journal Article Conference Proceeding | 
| Language | English | 
| Published | 
        Melville
          American Institute of Physics
    
        14.07.2023
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 0094-243X 1551-7616  | 
| DOI | 10.1063/5.0149166 | 
Cover
| Abstract | Data is the new oil of today. With this, data security becomes highly imperative. This is even more true for healthcare institutions since patient data is crucial for their correct treatment by doctors. In the absence of patient data, lives cannot be saved and this results in a hospital being unable to deliver quality healthcare services. Medical data in the form of Electronic Health Records (EHRs) contains data including, but not limited to, medical history of patient and family, diagnosis reports such as X-Ray, Ultrasound, Blood Tests, etc., unique identification documents such as social security numbers, passport, and financial information such as bank account number, signature, etc. In the past, one data breach for a healthcare institution cost upwards of $2 million on an average. This clearly shows the severity of the issueat hand. However, due to the advancement by attackers in their attack strategies, it is of utmost importance to increase the security with which medical data is being transported. Healthcare institutions usually apply only one security measure such as firewalls, cryptography, or steganography in their system. This is not sufficient in today’s scenario. In this paper, we have proposed a framework for enhancing medical data security using a combination of cryptography and steganography. In Section-1, we have given an introduction to cryptography, steganography and their types. In Section-2, we have explained the working of the Tiny Encryption Algorithm (TEA), the code for the same written in C and results using known test vectors. In Section-3, we have described our proposed framework for enhancing medical data security, employing TEA and Least Significant Bit (LSB) Steganography to achieve the same. The programming for the same has been performed in Python. Lastly, in Section-4, we have given a brief conclusion and the future prospects for the current work. | 
    
|---|---|
| AbstractList | Data is the new oil of today. With this, data security becomes highly imperative. This is even more true for healthcare institutions since patient data is crucial for their correct treatment by doctors. In the absence of patient data, lives cannot be saved and this results in a hospital being unable to deliver quality healthcare services. Medical data in the form of Electronic Health Records (EHRs) contains data including, but not limited to, medical history of patient and family, diagnosis reports such as X-Ray, Ultrasound, Blood Tests, etc., unique identification documents such as social security numbers, passport, and financial information such as bank account number, signature, etc. In the past, one data breach for a healthcare institution cost upwards of $2 million on an average. This clearly shows the severity of the issueat hand. However, due to the advancement by attackers in their attack strategies, it is of utmost importance to increase the security with which medical data is being transported. Healthcare institutions usually apply only one security measure such as firewalls, cryptography, or steganography in their system. This is not sufficient in today’s scenario. In this paper, we have proposed a framework for enhancing medical data security using a combination of cryptography and steganography. In Section-1, we have given an introduction to cryptography, steganography and their types. In Section-2, we have explained the working of the Tiny Encryption Algorithm (TEA), the code for the same written in C and results using known test vectors. In Section-3, we have described our proposed framework for enhancing medical data security, employing TEA and Least Significant Bit (LSB) Steganography to achieve the same. The programming for the same has been performed in Python. Lastly, in Section-4, we have given a brief conclusion and the future prospects for the current work. | 
    
| Author | Sirpal, Varun Nangia, Uma Jain, Tanmaya Bansal, Malti Ujjwal  | 
    
| Author_xml | – sequence: 1 givenname: Malti surname: Bansal fullname: Bansal, Malti organization: Department of Electronics and Communication Engineering, Delhi Technological University (DTU) – sequence: 2 givenname: Varun surname: Sirpal fullname: Sirpal, Varun organization: Department of Electrical Engineering, Delhi Technological University (DTU) – sequence: 3 givenname: Tanmaya surname: Jain fullname: Jain, Tanmaya organization: Department of Electrical Engineering, Delhi Technological University (DTU) – sequence: 4 surname: Ujjwal fullname: Ujjwal organization: Department of Electrical Engineering, Delhi Technological University (DTU) – sequence: 5 givenname: Uma surname: Nangia fullname: Nangia, Uma organization: Department of Electrical Engineering, Delhi Technological University (DTU)  | 
    
| BookMark | eNotUEtrwzAYM6ODtd0O-weG3Qbp_MWPxMdRugcUdtlgt_AlsVOX1Mli55B_v5T2JISEhLQiC995Q8gjsA0wxV_khoHQoNQNWYKUkGQK1IIsGdMiSQX_vSOrEI6MpTrL8iVpdv6AvnK-oSdTuwpbWmNEGkw1Di5OdAxnLTo_UeOrYeqj6zzFtulm-XCi6GvaGgyRBtd4Z-cIH2npZh5Ng75rBuwP0z25tdgG83DFNfl5231vP5L91_vn9nWf9MB5TLA2MrfWViVKJmthmLValKmG1Iia8xIwU9Yw5GmegZAlFwZkWeZa6CwHydfk6ZLbD93faEIsjt04-LmySHOegQKt0tn1fHGFykU8Lyr6wZ1wmApgxfnIQhbXI_k_QJRozQ | 
    
| CODEN | APCPCS | 
    
| ContentType | Journal Article Conference Proceeding  | 
    
| Copyright | Author(s) 2023 Author(s). Published by AIP Publishing.  | 
    
| Copyright_xml | – notice: Author(s) – notice: 2023 Author(s). Published by AIP Publishing.  | 
    
| DBID | 8FD H8D L7M  | 
    
| DOI | 10.1063/5.0149166 | 
    
| DatabaseName | Technology Research Database Aerospace Database Advanced Technologies Database with Aerospace  | 
    
| DatabaseTitle | Technology Research Database Aerospace Database Advanced Technologies Database with Aerospace  | 
    
| DatabaseTitleList | Technology Research Database | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Physics | 
    
| EISSN | 1551-7616 | 
    
| Editor | Rao, K V Sambasiva Rao, P Rama Koteswara  | 
    
| Editor_xml | – sequence: 1 givenname: K V Sambasiva surname: Rao fullname: Rao, K V Sambasiva organization: NRI Institute Of Technology – sequence: 2 givenname: P Rama Koteswara surname: Rao fullname: Rao, P Rama Koteswara organization: NRI Institute Of Technology  | 
    
| ExternalDocumentID | acp | 
    
| Genre | Conference Proceeding | 
    
| GroupedDBID | -~X 23M 5GY AAAAW AABDS AAEUA AAPUP AAYIH ABJNI ACBRY ACZLF ADCTM AEJMO AFATG AFHCQ AGKCL AGLKD AGMXG AGTJO AHSDT AJJCW ALEPV ALMA_UNASSIGNED_HOLDINGS ATXIE AWQPM BPZLN F5P FDOHQ FFFMQ HAM M71 M73 RIP RQS SJN ~02 8FD ABJGX ADMLS H8D L7M  | 
    
| ID | FETCH-LOGICAL-p133t-ade58fffcba505d4e0ff94b2912e4d33b1a76fe0a3287145b34e15bb894978153 | 
    
| ISSN | 0094-243X | 
    
| IngestDate | Mon Jun 30 06:02:59 EDT 2025 Fri Jun 21 00:10:37 EDT 2024  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 1 | 
    
| Language | English | 
    
| License | 0094-243X/2023/2796/020001/6/$30.00 Published by AIP Publishing.  | 
    
| LinkModel | OpenURL | 
    
| MeetingName | RESEARCH ADVANCEMENTS AND INNOVATIONS IN COMPUTING, COMMUNICATIONS AND INFORMATION TECHNOLOGIES: ICRAIC2IT | 
    
| MergedId | FETCHMERGED-LOGICAL-p133t-ade58fffcba505d4e0ff94b2912e4d33b1a76fe0a3287145b34e15bb894978153 | 
    
| Notes | ObjectType-Conference Proceeding-1 SourceType-Conference Papers & Proceedings-1 content type line 21  | 
    
| PQID | 2837161962 | 
    
| PQPubID | 2050672 | 
    
| PageCount | 6 | 
    
| ParticipantIDs | proquest_journals_2837161962 scitation_primary_10_1063_5_0149166  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 20230714 | 
    
| PublicationDateYYYYMMDD | 2023-07-14 | 
    
| PublicationDate_xml | – month: 07 year: 2023 text: 20230714 day: 14  | 
    
| PublicationDecade | 2020 | 
    
| PublicationPlace | Melville | 
    
| PublicationPlace_xml | – name: Melville | 
    
| PublicationTitle | AIP conference proceedings | 
    
| PublicationYear | 2023 | 
    
| Publisher | American Institute of Physics | 
    
| Publisher_xml | – name: American Institute of Physics | 
    
| References | Provos, Honeyman (c2) 2003; 1 Razaque (c5) 2019; 7 Bansal, Dabbas, Kathuria (c24) 2017; 6 Li, Lou, Ren (c7) 2010; 17 Subramanian, Elharrouss, Al-Maadeed, Bouridane (c8) 2021; 9 Bansal, Priya (c19) 2021; 145 Bansal, Ranjan (c23) 2017; 6 Bansal, Priya (c15) 2022; 68 Wheeler, Needham (c10) 1995; 1008 Bansal, Sirpal (c13) 2021; 1916 Hu (c12) 2010; 3 Bansal, Sirpal, Choudhary (c17) 2022; 68  | 
    
| References_xml | – volume: 1 start-page: 32 year: 2003 ident: c2 article-title: Hide and seek: an intro-duction to steganography publication-title: IEEE Security & Privacy – volume: 6 start-page: 86 year: 2017 ident: c23 article-title: CMOS Instrumentation Amplifier Design publication-title: International Journal of Electronics – volume: 6 start-page: 97 year: 2017 ident: c24 article-title: Analysis of ECG Signals using AD8232 SensingModule publication-title: International Journal of Electronics, Electrical and Computational System (IJEECS) – volume: 68 start-page: 123 year: 2022 ident: c17 article-title: Advancing e-Government Using Internet of Things publication-title: Mobile Computing and Sustainable Informatics. Lecture Notes on Data Engineering and Communications Technologies – volume: 3 start-page: 50 year: 2010 ident: c12 article-title: Cryptanalysis of TEA Using Quantum-Inspired Genetic Algorithms publication-title: J. Softw. Eng. Appl. – volume: 1916 start-page: 012041 year: 2021 ident: c13 article-title: Fog Computing-based Internet of Things and its Applications in Healthcare publication-title: Journal of Physics Conference Series – volume: 145 year: 2021 ident: c19 article-title: Performance Comparison of MQTT and CoAP Protocols in Different Simulation Environments publication-title: Inventive Communication and Computational Technologies. Lecture Notes inNetworks and Systems – volume: 17 start-page: 51 year: 2010 ident: c7 article-title: Data security and privacy in wireless body area networks publication-title: IEEE Wireless Communications – volume: 9 start-page: 23409 year: 2021 ident: c8 article-title: Image Steganography: A Review of the Recent Advances publication-title: IEEE Access – volume: 1008 year: 1995 ident: c10 article-title: TEA, a tiny encryption algorithm publication-title: Fast Software Encryption. FSE 1994. Lecture Notes in Computer Science – volume: 7 start-page: 168774 year: 2019 ident: c5 article-title: Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain publication-title: IEEE Access – volume: 68 start-page: 95 year: 2022 ident: c15 article-title: Machine Learning Perspective in VLSI Computer Aided Design at Different Abstraction Levels publication-title: Mobile Computing and Sustainable Informatics. Lecture Notes on Data Engineering and Communications Technologies  | 
    
| SSID | ssj0029778 | 
    
| Score | 2.3353431 | 
    
| Snippet | Data is the new oil of today. With this, data security becomes highly imperative. This is even more true for healthcare institutions since patient data is... | 
    
| SourceID | proquest scitation  | 
    
| SourceType | Aggregation Database Publisher  | 
    
| SubjectTerms | Algorithms Cryptography Data integrity Electronic health records Health care Health services Social security Steganography  | 
    
| Title | Enhancing medical data security using tiny encryption algorithm and least significant bit steganography | 
    
| URI | http://dx.doi.org/10.1063/5.0149166 https://www.proquest.com/docview/2837161962  | 
    
| Volume | 2796 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1551-7616 dateEnd: 20241102 omitProxy: false ssIdentifier: ssj0029778 issn: 0094-243X databaseCode: ADMLS dateStart: 20000101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ3LT-MwEIctKELsbXkJdllkCcQl8m4TO68j2i0CVB4SrdRbZCd2QUKhS8OB_et3JnEeFRUSXKI2rdxqPseescfzI-Q4ykKtskAxLoRgIirVAP2UxSIWoYy5EQYDxavr4HwsLif-pBVBLE-XFOpn-m_puZLPUIV7wBVPyX6AbNMo3IDXwBeuQBiubxkvnWpOL24xcbwuFtt-Z97tC4P8Hstq5NNqKx33ZWQhnbnVrnNeygWD4iF_daCZ59dqGJGP0yf4-L4S0XhEkR8H0z0wuQh4OOoB3hd6KvNu2Wu7guBxXJp02xXEZmtoIT2hTEBNuwuGEAgyT5TqvTBz2OHSd1kYVKcl6_HUCyuN2m7PeTNQg2cE1sWSqQIc1CXFsK9vkrPxcJiMBpPRyewvQ50w3E-3oimrZM3jMFr1yNrpn6vhXRNkgz9bzb7239bVpAL-q_m1hWhiA1yNKuuh41iMvpKd9sglvW3obZIVnW-RdWuebTJtEFKLkCJCWiOkJUKKCGmLkDYIKSCkJULaQUgBIV1AuEPGZ4PR73NmNTLYzOW8YDLTfmSMSZUEXzYTum9MLJQXu54WGefKlWFgdF9yDI2Fr7jQrq9UFKO0IEx3u6SXP-V6j9AoSsNIZ1KqoC94ZpTHfanByPA06zDK9slBbbXEPgTzBIsnQdAQB94-OWosmcyqUilJmeIQ8MRPrOm_vd_Id_Kl7aEHpFc8v-gf4PUV6tCC_g-TZGC7 | 
    
| linkProvider | EBSCOhost | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=AIP+conference+proceedings&rft.atitle=Enhancing+medical+data+security+using+tiny+encryption+algorithm+and+least+significant+bit+steganography&rft.date=2023-07-14&rft.pub=American+Institute+of+Physics&rft.issn=0094-243X&rft.eissn=1551-7616&rft.volume=2796&rft.issue=1&rft_id=info:doi/10.1063%2F5.0149166&rft.externalDBID=NO_FULL_TEXT | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0094-243X&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0094-243X&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0094-243X&client=summon |