2019
DOI: 10.1007/978-3-030-24308-1_14
|View full text |Cite
|
Sign up to set email alerts
|

Electronic Medical Information Encryption Using Modified Blowfish Algorithm

Abstract: Security and privacy of patients' information remains a major issue of concern among health practitioners. Therefore, measures must be put in place to ensure that unauthorized individual do not have access to this information. However, the adoption of digital alternative of retrieving and documenting medical information has further opened it up to more attacks. This article presents a modified blowfish algorithm for securing textual and graphical medical information. The F-function used in generating round sub… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…This LSB technique is proficient in entrenching comparatively huge undisclosed data in a concealment object [35] by substituting the LSBs of the concealment object pixels with the hidden data bits [36,37]. In the field of medical textual information hiding, several approaches have been suggested for various goals [38][39][40][41][42]. In recent years, different mechanisms of image steganography have been implemented [43][44][45][46][47][48][49][50][51][52][53][54][55][56][57].…”
Section: Related Workmentioning
confidence: 99%
“…This LSB technique is proficient in entrenching comparatively huge undisclosed data in a concealment object [35] by substituting the LSBs of the concealment object pixels with the hidden data bits [36,37]. In the field of medical textual information hiding, several approaches have been suggested for various goals [38][39][40][41][42]. In recent years, different mechanisms of image steganography have been implemented [43][44][45][46][47][48][49][50][51][52][53][54][55][56][57].…”
Section: Related Workmentioning
confidence: 99%
“…Though several techniques aimed at curtailing the growing hazards of these attacks have been reported in literature, many have not been able to fully address all scope of the problem. Several security techniques have been proposed towards preventing data and information from unauthorized attacks [6][7][8], and attackers continually devise new security vulnerabilities that could be exploited. Therefore, new techniques aimed at detecting and preventing these attacks are essential.…”
Section: Cross-site Scripting (Xss) Attacksmentioning
confidence: 99%
“…Compared to traditional security protocols based on various data encrypted algorithms, such as elliptic curve cryptography (ECC), [ 1 ] identity‐based encryption, [ 2 ] fully homomorphic encryption [ 3 ] and ring learning with errors, [ 4 ] triple data encryption standard (DES), [ 5 ] Rivest–Shamir–Adleman (RSA), [ 6 ] and so on, the recently advertised Physical Unclonable Function (PUF) is easier to create, but virtually impossible to duplicate. [ 7 ] More importantly, PUFs can thwart physical attacks because the secrecy of a PUF stems from the inherent complexity of a given system only when needed.…”
Section: Introductionmentioning
confidence: 99%