Secure transmission of medical information using IRIS recognition and steganography

Medical information is extremely high sensitive in nature. Tampering by a third party may result in identity theft and incorrect diagnosis. Hence, it is important to secure the transfer of medical information from the patient to the remote system where the specialist. The proposed work decomposes this problem into two sub-problems and proposes security solutions to each of them: (1) to secure the link between the patient and the device, and (2) to secure the link between the device and the network. Biometric identification is extremely an effective authentication. Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer and strengthening the security of the wireless link using steganography. The proposed authentication methods can be used for recording the medical data in a central database and for accessing medical records in various settings. An algorithm for visual cryptography and steganography is built using MATLAB platform. The proposed work considers iris images for authentication it was taken from CASIA Iris Image Database V4.0.

[1]  Ashok A. Ghatol,et al.  Iris recognition: an emerging biometric technology , 2007 .

[2]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[3]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[4]  Libor Masek,et al.  MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .

[5]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[6]  Wen-Pinn Fang,et al.  Non-expansion Visual Secret Sharing in Reversible Style , 2009 .

[7]  Arun Ross,et al.  Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.

[8]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[9]  Arun Ross,et al.  Visual cryptography for face privacy , 2010, Defense + Commercial Sensing.

[10]  Hong Zhao,et al.  Visual Cryptographic Scheme with High Image Quality , 2008, CIS.

[11]  Lahouari Ghouti,et al.  Protecting Fingerprint Data Using Watermarking , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).

[12]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[13]  Tzung-Her Chen,et al.  Multiple-Image Encryption by Rotating Random Grids , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[14]  M. Sujatha,et al.  Recognition of Human Iris Patterns for Biometric Identification , 2015 .

[15]  Chander Kant,et al.  Biometrics Security using Steganography , 2008 .

[16]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[17]  Arun Ross,et al.  Protecting Iris Images through Asymmetric Digital Watermarking , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.

[18]  Morampudi Naresh kumar,et al.  A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis , 2011 .