A Novel Security and Authentication Technique for Reliable Wireless Transmission of Healthcare Images in Smart Home and Mobile Health Systems Based on Digital Watermarking
نویسندگان
چکیده
The development of wireless technology enabled smart home and mobile health systems are on the rise and the integration of these smart home technologies to support healthcare is acquiring an increasing global significance. Teleradiology systems and various other telemedicine devices are being integrated into smart home technologies and these devices produce healthcare images that need to be transmitted to a central server or third party via various wireless networks. In this paper, we present a unique approach to improve the security and authentication of healthcare images based on digital watermarking. In this technique, the healthcare images are separated into the Region of Interest (ROI) and the Region of Non-Interest (RONI) and we implemented DWT (Discrete Wavelet Transform) algorithm to successfully embed a watermark into the RONI section of the healthcare images. The technique is robust in proving authentication of healthcare images and can be considered as a lossless technique, since the ROI of the images were not affected and the healthcare images were accurately recovered into the original state during the extraction process. Moreover, we will present some new ideas that will be used in our future research work.
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملIntelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کامل