A Secure Electronic Prescription System Using Steganography with Encryption Key Implementation

نویسندگان

  • Adebayo Omotosho
  • Omotanwa Adegbola
  • Mikail Olayemi Olaniyi
  • Justice Emuoyibofarhe
چکیده

Over the years health care has seen major improvement due to the introduction information and communication technology with electronic medical prescription being one the areas benefiting from it. Within the overall context of protection of health care information, privacy of prescription data needs special treatment. This paper presents an eprescription system that addresses some challenges pertaining to the prescription privacy protection in the process of drug prescription. The developed system uses spread spectrum image steganography algorithm with Advanced Encryption Standard (AES) key implementation to provide a secure means of delivering medical prescription to the parties involved. The architecture for encoding and decoding was implemented with an electronic health record. The software development tools used were PHP and MySQL database management system for front end and backend data management respectively. The designed system demonstration shows that the synergistic combination of steganography and cryptography technologies in medical prescription is capable of providing a secure transmission to properly provide security for patient’s medical prescription. Keywords-prescription; eprescription, cryptography, steganography;AES and spread spectrum

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Idea Of Using The Steganography As Encryption Tool

the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...

متن کامل

Character Recognition and Transmission of Characters Using Network Security

This paper deals with character recognition of characters of vehicle number plate and these recognized characters are transmitted through secure network channel by using encryption & decryption techniques. This paper includes implementation of automatic number plate recognition, which ensures a process of number plate detection, processes of proper characters segmentation, normalization and rec...

متن کامل

Steganography An Art of Hiding Data

In today’s world the art of sending & displaying the hidden information especially in public places, has received more attention and faced many challenges. Therefore, different methods have been proposed so far for hiding information in different cover media. In this paper a method for hiding of information on the billboard display is presented. It is well known that encryption provides secure ...

متن کامل

Image Encryption Using Huffman Coding for Steganography, Elliptic Curve Cryptography and DWT for Compression

An abstract is a brief summary of a research article or in-depth analysis of a particular subject or discipline, and is often used to help the reader quickly ascertain the paper's purpose. Images can be encrypted in several ways, by using different techniques and different encryption methods. In this paper, I am using Huffman Coding method for image steganography, Elliptic Curve Cryptography fo...

متن کامل

Case Study: An Implementation of a Secure Steganographic System

In this paper, we present the development of a Windows-based application implemented on the Microsoft .NET platform as a framework to allow a user to first compress and encrypt a secret message then hide its content into a cover image or audio file as well as extracting and retrieving the original data. A secure and robust steganographic system is achieved by applying and combining compression,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1502.01264  شماره 

صفحات  -

تاریخ انتشار 2014