Protection of Records and Data Authentication based on Secret Shares and Watermarking

Zulfiqar Ali, Muhammad Imran, Sally I McClean, Naveed Khan, Muhammad Shoaib

Research output: Contribution to journalArticle

56 Downloads (Pure)

Abstract

The rapid growth in communication technology facilitates the health industry in many aspects from transmission of sensor's data to real-time diagnosis using cloud-based frameworks. However, the secure transmission of data and its authenticity become a challenging task, especially, for health-related applications. The medical information must be accessible to only the relevant healthcare staff to avoid any unfortunate circumstances for the patient as well as for the healthcare providers. Therefore, a method to protect the identity of a patient and authentication of transmitted data is proposed in this study. The proposed method provides dual protection. First, it encrypts the identity using Shamir’s secret sharing scheme without the increase in dimension of the original identity. Second, the identity is watermarked using zero-watermarking to avoid any distortion into the host signal. The experimental results show that the proposed method encrypts, embeds and extracts identities reliably. Moreover, in case of malicious attack, the method distorts the embedded identity which provides a clear indication of fabrication. An automatic disorder detection system using Mel-frequency cepstral coefficients and Gaussian mixture model is also implemented which concludes that malicious attacks greatly impact on the accurate diagnosis of disorders.
Original languageEnglish
Pages (from-to)1-14
Number of pages14
JournalFuture Generation Computer Systems
Publication statusAccepted/In press - 22 Jan 2019

Fingerprint Dive into the research topics of 'Protection of Records and Data Authentication based on Secret Shares and Watermarking'. Together they form a unique fingerprint.

  • Cite this