D-Library Repositry

//uquui/

Reports Community

Annual Report Collection

 2021

 تحسين وتعزيز أمن البيانات الطبية بالدمج بين تقنيتين التشفير بالمنحنيات اإلهليجية والتخبئة باستخدام الصور

 Bin-Hureib, Eshraq Suliman


//uquui/handle/20.500.12248/130828
Full metadata record
DC FieldValueLanguage
dc.contributor.adviser-Aziz Gutub, Adnan Abdul-Aziz-
dc.contributor.authorBin-Hureib, Eshraq Suliman-
dc.date.accessioned2021-09-01T07:37:27Z-
dc.date.available2021-09-01T07:37:27Z-
dc.date.issued2021en_US
dc.identifier.urihttp://dorar.uqu.edu.sa//uquui/handle/20.500.12248/130828-
dc.description118 ورقة.en_US
dc.description.abstract4 Abstract As medical records are routinely digitized, cybersecurity is becoming a growing concern for the medical profession . Doctors need access to patient information to make important, quick decisions about patient health care. However, patient has the right to make a decision how and once they may access or share your information as the federal government regulates the management of electronic media and Protect Health Information (PHI) through the Health Insurance Portability and Accountability Act (HIPAA) of 1996. So two layer security system proposed to handle this problem . This system applies a secured and robust approach and encryption algorithms which help in securing confidential data and patient information from different forms of attacks such as technical failure and malware. The two approaches are elliptic curve cryptography and image stenography. Two layer security is most secure system in case that an image steganography process is predicted, data still protected because of the first layer, which is the cryptography.. The target problem of this research is hiding and protecting decide when, how, and to what extent others may access their health information. Patient privacy maintains confidentiality and only shares medical records with those who need it to provide or improve medical care. If their records are used for research purposes, researchers must obtain their informed consent. This may include using their medical information anonymously to conduct research. To solve this problem, we proposed a tow layers security system can let the doctors by public key add their patients diagnoses on their records and hide them inside images like X Ray, Ct Scan and magnetic resonance imaging (MRI) to prevent suspicion about them. The research uses practices like elliptic curve cryptography (ecc) and steganography for solving the problems. The limitations for the practices include inability of the previous model in protecting information and ensuring secured system. The solutions that have been found in this research are the techniques to defend information and their diagnosis and many documents in medical field from being hacked. This is carried out via imposing two layers of two-strategy Elliptic curve cryptography and photo steganography. Some important features of the solution are as follows: First layer has the feature of encrypting the textual content material by the utilization of ECC; then, the second layer is Steganography, used to conceal the encrypted textual content material inside the photograph with the useful resource of picture steganography (Zöllner, et al., 1998). Selecting ECC, it constitutes a technique for cryptography used as a secret key by relying on the algebraic form of elliptic curves over finite fields. It is also considered as being a favoured wish for the utilisation as public key. Furthermore, it can be used in many varieties of media along with in 5 scientific file laptops and in regions such as X-Ray, CT scan, and MRI scan. Selecting Image Steganography, which is an approach to give up the 1/3 of persona to have an appearance or address issues covering files, alongside with the archives that are encrypted. Selecting the Least Significant Bit algorithm for steganography, it is oftentimes used as a convenient steganography algorithm and a good deal with less complication. As the idea of the system depends on the use of the public key to enter the information or data in the patient's file so that no person can look at it except by using the private key accessed only authorised people. The solutions have been validated using case studies and benchmarks. For example, testing two types of cryptography (ECC and RSA) and two type of steganography to stumble on the big difference between them and clear the fantastic horrible factors of each of them. The approach can be used by implying on any person, crew of human beings or organization to cowl and and techniques and strategies or the quintessential defines information. Experimental results are indicative of the fact the chosen technique is highly sufficient and effective for securing all kind of attacks without causing any significant distortions between the cover image . Furthermore, from the performance evaluation, it has been found that both of the combinations used in the research are useful. In case of the combination of elliptic curve cryptography and stenography, confidential information can be protected with the help of keys as elliptic curve is employed for forming smaller and faster cipher hotkeys. This keys are capable of providing secret protections. In case of the combination of elliptic curve cryptography and 1-LSB and 2- LSB image stenography, message can be hidden in the media files. The public key used in this system is responsible for encrypting the data and once the other need gets the data, the private key decodes it again. Key Words: information, PHI, HIPPA, RSA, .ECC, Image Steganography, encryption, hiding, X-Ray CT scan, MRen_US
dc.language.isoانجليزيen_US
dc.publisherجامعة أم القرىen_US
dc.relation.isformatofمكتبة الملك عبدالله بن عبدالعزيز الجامعيةen_US
dc.subjectالبيانات الشخصية حمايةen_US
dc.subjectأمن الحاسبات الإلكترونيةen_US
dc.titleتحسين وتعزيز أمن البيانات الطبية بالدمج بين تقنيتين التشفير بالمنحنيات اإلهليجية والتخبئة باستخدام الصورen_US
dc.title.alternativeEnhancing Medical Data Security via Combining Elliptic Curve Cryptography Image Steganographyen_US
dc.identifier.callnum24654-
dc.type.formatماجستيرen_US
dc.publisher.countryالمملكة العربية السعوديةen_US
dc.relation.collageالحاسب الآلي ونظم المعلوماتen_US
dc.type.statusمجازen_US
dc.rights.holdYesen_US
dc.rights.digitalYesen_US
dc.publisher.cityمكة المكرمةen_US
dc.date.issuedhijri1442en_US
dc.relation.depالحاسب الآليen_US
dc.rights.digitizedYesen_US
Appears in Collections :الرسائل العلمية المحدثة

Files in This Item :
File Description SizeFormat 
24641.pdf
"   Restricted Access"
الرسالة الكاملة31.95 MBAdobe PDFView/Open
Request a copy
abse24641.pdf
"   Restricted Access"
ملخص الرسالة بالإنجليزي352.34 kBAdobe PDFView/Open
Request a copy
cont24641.pdf
"   Restricted Access"
فهرس الموضوعات670.6 kBAdobe PDFView/Open
Request a copy
indu24641.pdf
"   Restricted Access"
المقدمة1.14 MBAdobe PDFView/Open
Request a copy
title24641.pdf
"   Restricted Access"
غلاف295.42 kBAdobe PDFView/Open
Request a copy

Comments (0)



Items in D-Library are protected by copyright, with all rights reserved, unless otherwise indicated.