Reference Hub1
Implementation of Encryption and Data Hiding in E-Health Application

Implementation of Encryption and Data Hiding in E-Health Application

Muzafer H. Saracevic, Aybeyan Selimi, Selver Pepić
ISBN13: 9781799812906|ISBN10: 1799812901|ISBN13 Softcover: 9781799812913|EISBN13: 9781799812920
DOI: 10.4018/978-1-7998-1290-6.ch002
Cite Chapter Cite Chapter

MLA

Saracevic, Muzafer H., et al. "Implementation of Encryption and Data Hiding in E-Health Application." Handbook of Research on Intelligent Data Processing and Information Security Systems, edited by Stepan Mykolayovych Bilan and Saleem Issa Al-Zoubi, IGI Global, 2020, pp. 25-42. https://doi.org/10.4018/978-1-7998-1290-6.ch002

APA

Saracevic, M. H., Selimi, A., & Pepić, S. (2020). Implementation of Encryption and Data Hiding in E-Health Application. In S. Bilan & S. Al-Zoubi (Eds.), Handbook of Research on Intelligent Data Processing and Information Security Systems (pp. 25-42). IGI Global. https://doi.org/10.4018/978-1-7998-1290-6.ch002

Chicago

Saracevic, Muzafer H., Aybeyan Selimi, and Selver Pepić. "Implementation of Encryption and Data Hiding in E-Health Application." In Handbook of Research on Intelligent Data Processing and Information Security Systems, edited by Stepan Mykolayovych Bilan and Saleem Issa Al-Zoubi, 25-42. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-1290-6.ch002

Export Reference

Mendeley
Favorite

Abstract

This chapter presents the possibilities of applying cryptography and steganography in design advanced methods of medical software. The proposed solution has two modules: medical data encryption and medical data hiding. In the first module for the encryption of patient data a Catalan crypto-key is used combined with the LatticePath combinatorial problem. In the second module for hiding patient data, the Catalan stego-key and medical image is used. The objective of the second part is to explain and investigate the existing author's method to steganography based on the Catalan numbers in the design of medical software. The proposed solution is implemented in the Java programming language. In the experimental part, cryptanalysis and steganalysis of the proposed solution were given. Cryptanalysis is based on time and storage complexity, leaking information and machine learning-based identification of the encryption method. Also, steganalysis is based on the amount of information per pixel in stego image, approximate entropy and bit distribution in stego-images.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.