Protection of Records and Data Authentication based on Secret Shares and Watermarking

Zulfiqar Ali, Muhammad Imran, Sally I McClean, Naveed Khan, Muhammad Shoaib

Research output: Contribution to journalArticle

Abstract

The rapid growth in communication technology facilitates the health industry in many aspects from transmission of sensor's data to real-time diagnosis using cloud-based frameworks. However, the secure transmission of data and its authenticity become a challenging task, especially, for health-related applications. The medical information must be accessible to only the relevant healthcare staff to avoid any unfortunate circumstances for the patient as well as for the healthcare providers. Therefore, a method to protect the identity of a patient and authentication of transmitted data is proposed in this study. The proposed method provides dual protection. First, it encrypts the identity using Shamir’s secret sharing scheme without the increase in dimension of the original identity. Second, the identity is watermarked using zero-watermarking to avoid any distortion into the host signal. The experimental results show that the proposed method encrypts, embeds and extracts identities reliably. Moreover, in case of malicious attack, the method distorts the embedded identity which provides a clear indication of fabrication. An automatic disorder detection system using Mel-frequency cepstral coefficients and Gaussian mixture model is also implemented which concludes that malicious attacks greatly impact on the accurate diagnosis of disorders.
LanguageEnglish
Pages1-14
Number of pages14
JournalFuture Generation Computer Systems
Publication statusAccepted/In press - 22 Jan 2019

Fingerprint

Watermarking
Authentication
Health
Fabrication
Communication
Sensors
Industry

Cite this

@article{67b1bfc602a544ee9496370f819f6fdd,
title = "Protection of Records and Data Authentication based on Secret Shares and Watermarking",
abstract = "The rapid growth in communication technology facilitates the health industry in many aspects from transmission of sensor's data to real-time diagnosis using cloud-based frameworks. However, the secure transmission of data and its authenticity become a challenging task, especially, for health-related applications. The medical information must be accessible to only the relevant healthcare staff to avoid any unfortunate circumstances for the patient as well as for the healthcare providers. Therefore, a method to protect the identity of a patient and authentication of transmitted data is proposed in this study. The proposed method provides dual protection. First, it encrypts the identity using Shamir’s secret sharing scheme without the increase in dimension of the original identity. Second, the identity is watermarked using zero-watermarking to avoid any distortion into the host signal. The experimental results show that the proposed method encrypts, embeds and extracts identities reliably. Moreover, in case of malicious attack, the method distorts the embedded identity which provides a clear indication of fabrication. An automatic disorder detection system using Mel-frequency cepstral coefficients and Gaussian mixture model is also implemented which concludes that malicious attacks greatly impact on the accurate diagnosis of disorders.",
author = "Zulfiqar Ali and Muhammad Imran and McClean, {Sally I} and Naveed Khan and Muhammad Shoaib",
year = "2019",
month = "1",
day = "22",
language = "English",
pages = "1--14",
journal = "Future Generation Computer Systems",
issn = "0167-739X",
publisher = "Elsevier",

}

Protection of Records and Data Authentication based on Secret Shares and Watermarking. / Ali, Zulfiqar; Imran, Muhammad; McClean, Sally I; Khan, Naveed; Shoaib, Muhammad.

In: Future Generation Computer Systems, 22.01.2019, p. 1-14.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Protection of Records and Data Authentication based on Secret Shares and Watermarking

AU - Ali, Zulfiqar

AU - Imran, Muhammad

AU - McClean, Sally I

AU - Khan, Naveed

AU - Shoaib, Muhammad

PY - 2019/1/22

Y1 - 2019/1/22

N2 - The rapid growth in communication technology facilitates the health industry in many aspects from transmission of sensor's data to real-time diagnosis using cloud-based frameworks. However, the secure transmission of data and its authenticity become a challenging task, especially, for health-related applications. The medical information must be accessible to only the relevant healthcare staff to avoid any unfortunate circumstances for the patient as well as for the healthcare providers. Therefore, a method to protect the identity of a patient and authentication of transmitted data is proposed in this study. The proposed method provides dual protection. First, it encrypts the identity using Shamir’s secret sharing scheme without the increase in dimension of the original identity. Second, the identity is watermarked using zero-watermarking to avoid any distortion into the host signal. The experimental results show that the proposed method encrypts, embeds and extracts identities reliably. Moreover, in case of malicious attack, the method distorts the embedded identity which provides a clear indication of fabrication. An automatic disorder detection system using Mel-frequency cepstral coefficients and Gaussian mixture model is also implemented which concludes that malicious attacks greatly impact on the accurate diagnosis of disorders.

AB - The rapid growth in communication technology facilitates the health industry in many aspects from transmission of sensor's data to real-time diagnosis using cloud-based frameworks. However, the secure transmission of data and its authenticity become a challenging task, especially, for health-related applications. The medical information must be accessible to only the relevant healthcare staff to avoid any unfortunate circumstances for the patient as well as for the healthcare providers. Therefore, a method to protect the identity of a patient and authentication of transmitted data is proposed in this study. The proposed method provides dual protection. First, it encrypts the identity using Shamir’s secret sharing scheme without the increase in dimension of the original identity. Second, the identity is watermarked using zero-watermarking to avoid any distortion into the host signal. The experimental results show that the proposed method encrypts, embeds and extracts identities reliably. Moreover, in case of malicious attack, the method distorts the embedded identity which provides a clear indication of fabrication. An automatic disorder detection system using Mel-frequency cepstral coefficients and Gaussian mixture model is also implemented which concludes that malicious attacks greatly impact on the accurate diagnosis of disorders.

M3 - Article

SP - 1

EP - 14

JO - Future Generation Computer Systems

T2 - Future Generation Computer Systems

JF - Future Generation Computer Systems

SN - 0167-739X

ER -