Enhancing medical data security using tiny encryption algorithm and least significant bit steganography

Data is the new oil of today. With this, data security becomes highly imperative. This is even more true for healthcare institutions since patient data is crucial for their correct treatment by doctors. In the absence of patient data, lives cannot be saved and this results in a hospital being unable...

Full description

Saved in:
Bibliographic Details
Published inAIP conference proceedings Vol. 2796; no. 1
Main Authors Bansal, Malti, Sirpal, Varun, Jain, Tanmaya, Ujjwal, Nangia, Uma
Format Journal Article Conference Proceeding
LanguageEnglish
Published Melville American Institute of Physics 14.07.2023
Subjects
Online AccessGet full text
ISSN0094-243X
1551-7616
DOI10.1063/5.0149166

Cover

Abstract Data is the new oil of today. With this, data security becomes highly imperative. This is even more true for healthcare institutions since patient data is crucial for their correct treatment by doctors. In the absence of patient data, lives cannot be saved and this results in a hospital being unable to deliver quality healthcare services. Medical data in the form of Electronic Health Records (EHRs) contains data including, but not limited to, medical history of patient and family, diagnosis reports such as X-Ray, Ultrasound, Blood Tests, etc., unique identification documents such as social security numbers, passport, and financial information such as bank account number, signature, etc. In the past, one data breach for a healthcare institution cost upwards of $2 million on an average. This clearly shows the severity of the issueat hand. However, due to the advancement by attackers in their attack strategies, it is of utmost importance to increase the security with which medical data is being transported. Healthcare institutions usually apply only one security measure such as firewalls, cryptography, or steganography in their system. This is not sufficient in today’s scenario. In this paper, we have proposed a framework for enhancing medical data security using a combination of cryptography and steganography. In Section-1, we have given an introduction to cryptography, steganography and their types. In Section-2, we have explained the working of the Tiny Encryption Algorithm (TEA), the code for the same written in C and results using known test vectors. In Section-3, we have described our proposed framework for enhancing medical data security, employing TEA and Least Significant Bit (LSB) Steganography to achieve the same. The programming for the same has been performed in Python. Lastly, in Section-4, we have given a brief conclusion and the future prospects for the current work.
AbstractList Data is the new oil of today. With this, data security becomes highly imperative. This is even more true for healthcare institutions since patient data is crucial for their correct treatment by doctors. In the absence of patient data, lives cannot be saved and this results in a hospital being unable to deliver quality healthcare services. Medical data in the form of Electronic Health Records (EHRs) contains data including, but not limited to, medical history of patient and family, diagnosis reports such as X-Ray, Ultrasound, Blood Tests, etc., unique identification documents such as social security numbers, passport, and financial information such as bank account number, signature, etc. In the past, one data breach for a healthcare institution cost upwards of $2 million on an average. This clearly shows the severity of the issueat hand. However, due to the advancement by attackers in their attack strategies, it is of utmost importance to increase the security with which medical data is being transported. Healthcare institutions usually apply only one security measure such as firewalls, cryptography, or steganography in their system. This is not sufficient in today’s scenario. In this paper, we have proposed a framework for enhancing medical data security using a combination of cryptography and steganography. In Section-1, we have given an introduction to cryptography, steganography and their types. In Section-2, we have explained the working of the Tiny Encryption Algorithm (TEA), the code for the same written in C and results using known test vectors. In Section-3, we have described our proposed framework for enhancing medical data security, employing TEA and Least Significant Bit (LSB) Steganography to achieve the same. The programming for the same has been performed in Python. Lastly, in Section-4, we have given a brief conclusion and the future prospects for the current work.
Author Sirpal, Varun
Nangia, Uma
Jain, Tanmaya
Bansal, Malti
Ujjwal
Author_xml – sequence: 1
  givenname: Malti
  surname: Bansal
  fullname: Bansal, Malti
  organization: Department of Electronics and Communication Engineering, Delhi Technological University (DTU)
– sequence: 2
  givenname: Varun
  surname: Sirpal
  fullname: Sirpal, Varun
  organization: Department of Electrical Engineering, Delhi Technological University (DTU)
– sequence: 3
  givenname: Tanmaya
  surname: Jain
  fullname: Jain, Tanmaya
  organization: Department of Electrical Engineering, Delhi Technological University (DTU)
– sequence: 4
  surname: Ujjwal
  fullname: Ujjwal
  organization: Department of Electrical Engineering, Delhi Technological University (DTU)
– sequence: 5
  givenname: Uma
  surname: Nangia
  fullname: Nangia, Uma
  organization: Department of Electrical Engineering, Delhi Technological University (DTU)
BookMark eNotUEtrwzAYM6ODtd0O-weG3Qbp_MWPxMdRugcUdtlgt_AlsVOX1Mli55B_v5T2JISEhLQiC995Q8gjsA0wxV_khoHQoNQNWYKUkGQK1IIsGdMiSQX_vSOrEI6MpTrL8iVpdv6AvnK-oSdTuwpbWmNEGkw1Di5OdAxnLTo_UeOrYeqj6zzFtulm-XCi6GvaGgyRBtd4Z-cIH2npZh5Ng75rBuwP0z25tdgG83DFNfl5231vP5L91_vn9nWf9MB5TLA2MrfWViVKJmthmLValKmG1Iia8xIwU9Yw5GmegZAlFwZkWeZa6CwHydfk6ZLbD93faEIsjt04-LmySHOegQKt0tn1fHGFykU8Lyr6wZ1wmApgxfnIQhbXI_k_QJRozQ
CODEN APCPCS
ContentType Journal Article
Conference Proceeding
Copyright Author(s)
2023 Author(s). Published by AIP Publishing.
Copyright_xml – notice: Author(s)
– notice: 2023 Author(s). Published by AIP Publishing.
DBID 8FD
H8D
L7M
DOI 10.1063/5.0149166
DatabaseName Technology Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DatabaseTitle Technology Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DatabaseTitleList Technology Research Database

DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 1551-7616
Editor Rao, K V Sambasiva
Rao, P Rama Koteswara
Editor_xml – sequence: 1
  givenname: K V Sambasiva
  surname: Rao
  fullname: Rao, K V Sambasiva
  organization: NRI Institute Of Technology
– sequence: 2
  givenname: P Rama Koteswara
  surname: Rao
  fullname: Rao, P Rama Koteswara
  organization: NRI Institute Of Technology
ExternalDocumentID acp
Genre Conference Proceeding
GroupedDBID -~X
23M
5GY
AAAAW
AABDS
AAEUA
AAPUP
AAYIH
ABJNI
ACBRY
ACZLF
ADCTM
AEJMO
AFATG
AFHCQ
AGKCL
AGLKD
AGMXG
AGTJO
AHSDT
AJJCW
ALEPV
ALMA_UNASSIGNED_HOLDINGS
ATXIE
AWQPM
BPZLN
F5P
FDOHQ
FFFMQ
HAM
M71
M73
RIP
RQS
SJN
~02
8FD
ABJGX
ADMLS
H8D
L7M
ID FETCH-LOGICAL-p133t-ade58fffcba505d4e0ff94b2912e4d33b1a76fe0a3287145b34e15bb894978153
ISSN 0094-243X
IngestDate Mon Jun 30 06:02:59 EDT 2025
Fri Jun 21 00:10:37 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License 0094-243X/2023/2796/020001/6/$30.00
Published by AIP Publishing.
LinkModel OpenURL
MeetingName RESEARCH ADVANCEMENTS AND INNOVATIONS IN COMPUTING, COMMUNICATIONS AND INFORMATION TECHNOLOGIES: ICRAIC2IT
MergedId FETCHMERGED-LOGICAL-p133t-ade58fffcba505d4e0ff94b2912e4d33b1a76fe0a3287145b34e15bb894978153
Notes ObjectType-Conference Proceeding-1
SourceType-Conference Papers & Proceedings-1
content type line 21
PQID 2837161962
PQPubID 2050672
PageCount 6
ParticipantIDs proquest_journals_2837161962
scitation_primary_10_1063_5_0149166
PublicationCentury 2000
PublicationDate 20230714
PublicationDateYYYYMMDD 2023-07-14
PublicationDate_xml – month: 07
  year: 2023
  text: 20230714
  day: 14
PublicationDecade 2020
PublicationPlace Melville
PublicationPlace_xml – name: Melville
PublicationTitle AIP conference proceedings
PublicationYear 2023
Publisher American Institute of Physics
Publisher_xml – name: American Institute of Physics
References Provos, Honeyman (c2) 2003; 1
Razaque (c5) 2019; 7
Bansal, Dabbas, Kathuria (c24) 2017; 6
Li, Lou, Ren (c7) 2010; 17
Subramanian, Elharrouss, Al-Maadeed, Bouridane (c8) 2021; 9
Bansal, Priya (c19) 2021; 145
Bansal, Ranjan (c23) 2017; 6
Bansal, Priya (c15) 2022; 68
Wheeler, Needham (c10) 1995; 1008
Bansal, Sirpal (c13) 2021; 1916
Hu (c12) 2010; 3
Bansal, Sirpal, Choudhary (c17) 2022; 68
References_xml – volume: 1
  start-page: 32
  year: 2003
  ident: c2
  article-title: Hide and seek: an intro-duction to steganography
  publication-title: IEEE Security & Privacy
– volume: 6
  start-page: 86
  year: 2017
  ident: c23
  article-title: CMOS Instrumentation Amplifier Design
  publication-title: International Journal of Electronics
– volume: 6
  start-page: 97
  year: 2017
  ident: c24
  article-title: Analysis of ECG Signals using AD8232 SensingModule
  publication-title: International Journal of Electronics, Electrical and Computational System (IJEECS)
– volume: 68
  start-page: 123
  year: 2022
  ident: c17
  article-title: Advancing e-Government Using Internet of Things
  publication-title: Mobile Computing and Sustainable Informatics. Lecture Notes on Data Engineering and Communications Technologies
– volume: 3
  start-page: 50
  year: 2010
  ident: c12
  article-title: Cryptanalysis of TEA Using Quantum-Inspired Genetic Algorithms
  publication-title: J. Softw. Eng. Appl.
– volume: 1916
  start-page: 012041
  year: 2021
  ident: c13
  article-title: Fog Computing-based Internet of Things and its Applications in Healthcare
  publication-title: Journal of Physics Conference Series
– volume: 145
  year: 2021
  ident: c19
  article-title: Performance Comparison of MQTT and CoAP Protocols in Different Simulation Environments
  publication-title: Inventive Communication and Computational Technologies. Lecture Notes inNetworks and Systems
– volume: 17
  start-page: 51
  year: 2010
  ident: c7
  article-title: Data security and privacy in wireless body area networks
  publication-title: IEEE Wireless Communications
– volume: 9
  start-page: 23409
  year: 2021
  ident: c8
  article-title: Image Steganography: A Review of the Recent Advances
  publication-title: IEEE Access
– volume: 1008
  year: 1995
  ident: c10
  article-title: TEA, a tiny encryption algorithm
  publication-title: Fast Software Encryption. FSE 1994. Lecture Notes in Computer Science
– volume: 7
  start-page: 168774
  year: 2019
  ident: c5
  article-title: Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
  publication-title: IEEE Access
– volume: 68
  start-page: 95
  year: 2022
  ident: c15
  article-title: Machine Learning Perspective in VLSI Computer Aided Design at Different Abstraction Levels
  publication-title: Mobile Computing and Sustainable Informatics. Lecture Notes on Data Engineering and Communications Technologies
SSID ssj0029778
Score 2.3353431
Snippet Data is the new oil of today. With this, data security becomes highly imperative. This is even more true for healthcare institutions since patient data is...
SourceID proquest
scitation
SourceType Aggregation Database
Publisher
SubjectTerms Algorithms
Cryptography
Data integrity
Electronic health records
Health care
Health services
Social security
Steganography
Title Enhancing medical data security using tiny encryption algorithm and least significant bit steganography
URI http://dx.doi.org/10.1063/5.0149166
https://www.proquest.com/docview/2837161962
Volume 2796
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1551-7616
  dateEnd: 20241102
  omitProxy: false
  ssIdentifier: ssj0029778
  issn: 0094-243X
  databaseCode: ADMLS
  dateStart: 20000101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ3LT-MwEIctKELsbXkJdllkCcQl8m4TO68j2i0CVB4SrdRbZCd2QUKhS8OB_et3JnEeFRUSXKI2rdxqPseescfzI-Q4ykKtskAxLoRgIirVAP2UxSIWoYy5EQYDxavr4HwsLif-pBVBLE-XFOpn-m_puZLPUIV7wBVPyX6AbNMo3IDXwBeuQBiubxkvnWpOL24xcbwuFtt-Z97tC4P8Hstq5NNqKx33ZWQhnbnVrnNeygWD4iF_daCZ59dqGJGP0yf4-L4S0XhEkR8H0z0wuQh4OOoB3hd6KvNu2Wu7guBxXJp02xXEZmtoIT2hTEBNuwuGEAgyT5TqvTBz2OHSd1kYVKcl6_HUCyuN2m7PeTNQg2cE1sWSqQIc1CXFsK9vkrPxcJiMBpPRyewvQ50w3E-3oimrZM3jMFr1yNrpn6vhXRNkgz9bzb7239bVpAL-q_m1hWhiA1yNKuuh41iMvpKd9sglvW3obZIVnW-RdWuebTJtEFKLkCJCWiOkJUKKCGmLkDYIKSCkJULaQUgBIV1AuEPGZ4PR73NmNTLYzOW8YDLTfmSMSZUEXzYTum9MLJQXu54WGefKlWFgdF9yDI2Fr7jQrq9UFKO0IEx3u6SXP-V6j9AoSsNIZ1KqoC94ZpTHfanByPA06zDK9slBbbXEPgTzBIsnQdAQB94-OWosmcyqUilJmeIQ8MRPrOm_vd_Id_Kl7aEHpFc8v-gf4PUV6tCC_g-TZGC7
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=AIP+conference+proceedings&rft.atitle=Enhancing+medical+data+security+using+tiny+encryption+algorithm+and+least+significant+bit+steganography&rft.date=2023-07-14&rft.pub=American+Institute+of+Physics&rft.issn=0094-243X&rft.eissn=1551-7616&rft.volume=2796&rft.issue=1&rft_id=info:doi/10.1063%2F5.0149166&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0094-243X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0094-243X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0094-243X&client=summon