Skip to main content
Erschienen in: Wireless Personal Communications 2/2021

02.01.2021

Musically Modified Substitution-Box for Clinical Signals Ciphering in Wireless Telecare Medical Communicating Systems

verfasst von: Arindam Sarkar, Joydeep Dey, Sunil Karforma

Erschienen in: Wireless Personal Communications | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Telecare medical communication system (TMCS) is an essential component in today’s fast moving era. Patients are privileged to have wireless online medical facilities from their remote locations. Probability of noscomial infections is absolutely zero in such wireless TMCS. Data Security of heterogeneous patients during the wireless communication is a big challenge. Patients’ data privacy is highly confidential and need enhanced encryption measures. Intruding leads to the medical data adulterations in such telecare systems. This paper proposes a modified Advanced Encryption Standards (AES) based on the biometric generated key. Binary biometric key were generated from the patients’ fingerprints. S-box of AES has been enhanced by the musical involvement of metaheuristic harmony search algorithm. Clinical electrocardiogram (ECG) signals were carried out to enhance the security mechanism of the TMCS. Different tests were carried on the proposed technique, which in turn gets wise bench-mark outcomes. Statistical analyses were conducted to counterfeit the intruding. This proposed technique is suitable for wireless TCMS with higher degree of patients’ privacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Wu, Z.-Y., Tseng, Y.-J., Chung, Y., Chen, Y.-C., & Lai, F. (2012). A reliable user authentication and key agreement scheme for web-based hospital-acquired infection surveillance information system. Journal of Medical Systems, 36, 2547–2555.CrossRef Wu, Z.-Y., Tseng, Y.-J., Chung, Y., Chen, Y.-C., & Lai, F. (2012). A reliable user authentication and key agreement scheme for web-based hospital-acquired infection surveillance information system. Journal of Medical Systems, 36, 2547–2555.CrossRef
3.
Zurück zum Zitat Srividya, R., & Ramesh, B. (2019). Implementation of AES using biometric. International Journal of Electrical and Computer Engineering (IJECE), 9(5), 4266–4276.CrossRef Srividya, R., & Ramesh, B. (2019). Implementation of AES using biometric. International Journal of Electrical and Computer Engineering (IJECE), 9(5), 4266–4276.CrossRef
4.
Zurück zum Zitat Bansal, R., Sehgal, P., & Bedi, P. (2011). Minutiae extraction from fingerprint images—A review. IJCSI International Journal of Computer Science Issues, 8(5), 3. Bansal, R., Sehgal, P., & Bedi, P. (2011). Minutiae extraction from fingerprint images—A review. IJCSI International Journal of Computer Science Issues, 8(5), 3.
6.
Zurück zum Zitat Arunachalam, M., & Subramanian, K. (2015). AES based multimodal biometric authentication using cryptographic level fusion with fingerprint and finger knuckle print. The International Arab Journal of Information Technology, 12, 5. Arunachalam, M., & Subramanian, K. (2015). AES based multimodal biometric authentication using cryptographic level fusion with fingerprint and finger knuckle print. The International Arab Journal of Information Technology, 12, 5.
7.
Zurück zum Zitat Gonzalez, R. C., & Woods, R. E. (1992). Digital Image Processing (4th ed.). New York: Pearson. Gonzalez, R. C., & Woods, R. E. (1992). Digital Image Processing (4th ed.). New York: Pearson.
15.
Zurück zum Zitat Krawczyk, S., & Jain, A. K. (2005). Securing electronic medical records using biometric authentication. In T. Kanade, A. Jain, & N. K. Ratha (Eds.), Audio- and Video-Based Biometric Person Authentication. AVBPA 2005 (Lecture Notes in Computer Science) (Vol. 3546). Berlin: Springer. https://doi.org/10.1007/11527923_115.CrossRef Krawczyk, S., & Jain, A. K. (2005). Securing electronic medical records using biometric authentication. In T. Kanade, A. Jain, & N. K. Ratha (Eds.), Audio- and Video-Based Biometric Person Authentication. AVBPA 2005 (Lecture Notes in Computer Science) (Vol. 3546). Berlin: Springer. https://​doi.​org/​10.​1007/​11527923_​115.CrossRef
16.
Zurück zum Zitat Gritzalis, D., & Lambrinoudakis, C. (2004). A security architecture for interconnecting health information systems. International Journal of Medical Informatics, 73(3), 305–309.CrossRef Gritzalis, D., & Lambrinoudakis, C. (2004). A security architecture for interconnecting health information systems. International Journal of Medical Informatics, 73(3), 305–309.CrossRef
18.
Zurück zum Zitat Nayak, J., Subbanna Bhat, P., Acharya, U. R., & Sathish Kumar, M. (2009). Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. Journal of Medical Systems, 33, 163–171.CrossRef Nayak, J., Subbanna Bhat, P., Acharya, U. R., & Sathish Kumar, M. (2009). Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. Journal of Medical Systems, 33, 163–171.CrossRef
20.
Zurück zum Zitat Sarkar, A., Dey, J., Chatterjee, M., Bhowmik, A., & Karforma, S. (2019). Neural soft computing based secured transmission of intraoral gingivitis image in e-health care. Indonesian Journal of Electrical Engineering and Computer Science, 14(1), 178–184.CrossRef Sarkar, A., Dey, J., Chatterjee, M., Bhowmik, A., & Karforma, S. (2019). Neural soft computing based secured transmission of intraoral gingivitis image in e-health care. Indonesian Journal of Electrical Engineering and Computer Science, 14(1), 178–184.CrossRef
21.
Zurück zum Zitat Nandakumar, K., & Jain, A. K. (2004). Local correlation-based fingerprint matching. In ICVGIP, pp. 503–508. Nandakumar, K., & Jain, A. K. (2004). Local correlation-based fingerprint matching. In ICVGIP, pp. 503–508.
22.
Zurück zum Zitat Wang, X., Gao, X. Z., & Zenger, K. (2015). The overview of harmony search. In An Introduction to Harmony Search Optimization Method (Springer Briefs in Applied Sciences and Technology). Cham: Springer, Print ISBN: 978-3-319-08355-1.CrossRef Wang, X., Gao, X. Z., & Zenger, K. (2015). The overview of harmony search. In An Introduction to Harmony Search Optimization Method (Springer Briefs in Applied Sciences and Technology). Cham: Springer, Print ISBN: 978-3-319-08355-1.CrossRef
23.
Zurück zum Zitat Assad, A., & Deep, K. (2018). A hybrid harmony search and simulated annealing algorithm for continuous optimization. Journal of Information Sciences—Informatics and Computer Science, Intelligent Systems, Applications, 450(C), 246–266. Assad, A., & Deep, K. (2018). A hybrid harmony search and simulated annealing algorithm for continuous optimization. Journal of Information Sciences—Informatics and Computer Science, Intelligent Systems, Applications, 450(C), 246–266.
25.
Zurück zum Zitat Chen, H., & Chen, H. (2011). A novel algorithm of fingerprint encryption using minutiae-based transformation. Pattern Recognition Letters, 32(2), 305–309.CrossRef Chen, H., & Chen, H. (2011). A novel algorithm of fingerprint encryption using minutiae-based transformation. Pattern Recognition Letters, 32(2), 305–309.CrossRef
26.
Zurück zum Zitat Krishna Prasad, K., & Aithal, P. S. (2018). A study on fingerprint hash code generation based on MD5 algorithm and freeman chain code. International Journal of Computational Research and Development, 3(1), 13–22. Krishna Prasad, K., & Aithal, P. S. (2018). A study on fingerprint hash code generation based on MD5 algorithm and freeman chain code. International Journal of Computational Research and Development, 3(1), 13–22.
27.
Zurück zum Zitat Lee, S., Lee, G. G., Jang, E. S., & Kim, W. Y. (2006). Fast affine transform for real-time machine vision applications. In D. S. Huang, K. Li, & G. W. Irwin (Eds.), Intelligent Computing. ICIC 2006 (Lecture Notes in Computer Science) (Vol. 4113). Berlin: Springer. https://doi.org/10.1007/11816157_147.CrossRef Lee, S., Lee, G. G., Jang, E. S., & Kim, W. Y. (2006). Fast affine transform for real-time machine vision applications. In D. S. Huang, K. Li, & G. W. Irwin (Eds.), Intelligent Computing. ICIC 2006 (Lecture Notes in Computer Science) (Vol. 4113). Berlin: Springer. https://​doi.​org/​10.​1007/​11816157_​147.CrossRef
28.
Zurück zum Zitat Geem, Z. W., Kim, J. H., & Loganathan, G. V. (2001). A new heuristic optimization algorithm: Harmony search. Simulation, 76, 60–68.CrossRef Geem, Z. W., Kim, J. H., & Loganathan, G. V. (2001). A new heuristic optimization algorithm: Harmony search. Simulation, 76, 60–68.CrossRef
29.
Zurück zum Zitat Murillo-Escobar, M. A., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R. M., & Del Campo, O. R. A. (2015). A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Processing, 109, 119–131.CrossRef Murillo-Escobar, M. A., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R. M., & Del Campo, O. R. A. (2015). A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Processing, 109, 119–131.CrossRef
30.
Zurück zum Zitat Karthigaikumar, P., Anitha Christy, N., & Siva Mangai, N. M. (2015). PSP CO2: An efficient hardware architecture for AES algorithm for high throughput. Wireless Personal Communications, 85, 305–323.CrossRef Karthigaikumar, P., Anitha Christy, N., & Siva Mangai, N. M. (2015). PSP CO2: An efficient hardware architecture for AES algorithm for high throughput. Wireless Personal Communications, 85, 305–323.CrossRef
31.
Zurück zum Zitat Bhowmik, A., Karforma, S., Dey, J., & Sarkar, A. (2020). A way of safeguard using concept of recurrence relation and fuzzy logic against security breach in wireless communication. International Journal of Computer Science Engineering, 9(4), 297–311.CrossRef Bhowmik, A., Karforma, S., Dey, J., & Sarkar, A. (2020). A way of safeguard using concept of recurrence relation and fuzzy logic against security breach in wireless communication. International Journal of Computer Science Engineering, 9(4), 297–311.CrossRef
Metadaten
Titel
Musically Modified Substitution-Box for Clinical Signals Ciphering in Wireless Telecare Medical Communicating Systems
verfasst von
Arindam Sarkar
Joydeep Dey
Sunil Karforma
Publikationsdatum
02.01.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07894-y

Weitere Artikel der Ausgabe 2/2021

Wireless Personal Communications 2/2021 Zur Ausgabe

Neuer Inhalt