2021
DOI: 10.1155/2021/8827055
|View full text |Cite
|
Sign up to set email alerts
|

A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography

Abstract: Safe conveyance of medical data across unsecured networks nowadays is an essential issue in telemedicine. With the exponential growth of multimedia technologies and connected networks, modern healthcare is a huge step ahead. Authentication of a diagnostic image obtained from a specialist at a remote location which is from the sender is one of the most challenging tasks in an automated healthcare setup. Intruders were found to be able to efficiently exploit securely transmitted messages from previous literature… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 58 publications
0
10
0
Order By: Relevance
“…The elliptic curve integrated encryption technique (ECIES) is used to encrypt the packets within the mobile nodes before they are sent to the cloud-based services [26]. Sending data securely from one place to another is essential as demand for internet services increases since most attackers (hackers) routinely interrupt unprotected data transfers [27][28]. A dual security approach suggested by [29] created a trustworthy and secure connection by fusing two techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The elliptic curve integrated encryption technique (ECIES) is used to encrypt the packets within the mobile nodes before they are sent to the cloud-based services [26]. Sending data securely from one place to another is essential as demand for internet services increases since most attackers (hackers) routinely interrupt unprotected data transfers [27][28]. A dual security approach suggested by [29] created a trustworthy and secure connection by fusing two techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Ogundokun and Abikoye [16] proposed a modified LSB approach capable of concealing and preserving medical data in order to address the essential authentication problem. Their proposed method employed a logical bit shift operation.…”
Section: Introductionmentioning
confidence: 99%
“…One of the most promising methods is the Information Hiding Technique (IHT). Information hiding techniques deploy the method of inserting data into another one to confuse eavesdroppers and cyber-attackers [ 4 ]. Most of information hiding techniques utilizations are in copyright enforcement, securing data over unsecured communication channels, and data manipulation detection [ 5 ].…”
Section: Introductionmentioning
confidence: 99%