- Communities& Collections
- Browse Items by:
- Issue Date
- Author
- Title
- Subject
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.adviser | -Aziz Gutub, Adnan Abdul-Aziz | - |
dc.contributor.author | Bin-Hureib, Eshraq Suliman | - |
dc.date.accessioned | 2021-09-01T07:37:27Z | - |
dc.date.available | 2021-09-01T07:37:27Z | - |
dc.date.issued | 2021 | en_US |
dc.identifier.uri | http://dorar.uqu.edu.sa//uquui/handle/20.500.12248/130828 | - |
dc.description | 118 ورقة. | en_US |
dc.description.abstract | 4 Abstract As medical records are routinely digitized, cybersecurity is becoming a growing concern for the medical profession . Doctors need access to patient information to make important, quick decisions about patient health care. However, patient has the right to make a decision how and once they may access or share your information as the federal government regulates the management of electronic media and Protect Health Information (PHI) through the Health Insurance Portability and Accountability Act (HIPAA) of 1996. So two layer security system proposed to handle this problem . This system applies a secured and robust approach and encryption algorithms which help in securing confidential data and patient information from different forms of attacks such as technical failure and malware. The two approaches are elliptic curve cryptography and image stenography. Two layer security is most secure system in case that an image steganography process is predicted, data still protected because of the first layer, which is the cryptography.. The target problem of this research is hiding and protecting decide when, how, and to what extent others may access their health information. Patient privacy maintains confidentiality and only shares medical records with those who need it to provide or improve medical care. If their records are used for research purposes, researchers must obtain their informed consent. This may include using their medical information anonymously to conduct research. To solve this problem, we proposed a tow layers security system can let the doctors by public key add their patients diagnoses on their records and hide them inside images like X Ray, Ct Scan and magnetic resonance imaging (MRI) to prevent suspicion about them. The research uses practices like elliptic curve cryptography (ecc) and steganography for solving the problems. The limitations for the practices include inability of the previous model in protecting information and ensuring secured system. The solutions that have been found in this research are the techniques to defend information and their diagnosis and many documents in medical field from being hacked. This is carried out via imposing two layers of two-strategy Elliptic curve cryptography and photo steganography. Some important features of the solution are as follows: First layer has the feature of encrypting the textual content material by the utilization of ECC; then, the second layer is Steganography, used to conceal the encrypted textual content material inside the photograph with the useful resource of picture steganography (Zöllner, et al., 1998). Selecting ECC, it constitutes a technique for cryptography used as a secret key by relying on the algebraic form of elliptic curves over finite fields. It is also considered as being a favoured wish for the utilisation as public key. Furthermore, it can be used in many varieties of media along with in 5 scientific file laptops and in regions such as X-Ray, CT scan, and MRI scan. Selecting Image Steganography, which is an approach to give up the 1/3 of persona to have an appearance or address issues covering files, alongside with the archives that are encrypted. Selecting the Least Significant Bit algorithm for steganography, it is oftentimes used as a convenient steganography algorithm and a good deal with less complication. As the idea of the system depends on the use of the public key to enter the information or data in the patient's file so that no person can look at it except by using the private key accessed only authorised people. The solutions have been validated using case studies and benchmarks. For example, testing two types of cryptography (ECC and RSA) and two type of steganography to stumble on the big difference between them and clear the fantastic horrible factors of each of them. The approach can be used by implying on any person, crew of human beings or organization to cowl and and techniques and strategies or the quintessential defines information. Experimental results are indicative of the fact the chosen technique is highly sufficient and effective for securing all kind of attacks without causing any significant distortions between the cover image . Furthermore, from the performance evaluation, it has been found that both of the combinations used in the research are useful. In case of the combination of elliptic curve cryptography and stenography, confidential information can be protected with the help of keys as elliptic curve is employed for forming smaller and faster cipher hotkeys. This keys are capable of providing secret protections. In case of the combination of elliptic curve cryptography and 1-LSB and 2- LSB image stenography, message can be hidden in the media files. The public key used in this system is responsible for encrypting the data and once the other need gets the data, the private key decodes it again. Key Words: information, PHI, HIPPA, RSA, .ECC, Image Steganography, encryption, hiding, X-Ray CT scan, MR | en_US |
dc.language.iso | انجليزي | en_US |
dc.publisher | جامعة أم القرى | en_US |
dc.relation.isformatof | مكتبة الملك عبدالله بن عبدالعزيز الجامعية | en_US |
dc.subject | البيانات الشخصية حماية | en_US |
dc.subject | أمن الحاسبات الإلكترونية | en_US |
dc.title | تحسين وتعزيز أمن البيانات الطبية بالدمج بين تقنيتين التشفير بالمنحنيات اإلهليجية والتخبئة باستخدام الصور | en_US |
dc.title.alternative | Enhancing Medical Data Security via Combining Elliptic Curve Cryptography Image Steganography | en_US |
dc.identifier.callnum | 24654 | - |
dc.type.format | ماجستير | en_US |
dc.publisher.country | المملكة العربية السعودية | en_US |
dc.relation.collage | الحاسب الآلي ونظم المعلومات | en_US |
dc.type.status | مجاز | en_US |
dc.rights.hold | Yes | en_US |
dc.rights.digital | Yes | en_US |
dc.publisher.city | مكة المكرمة | en_US |
dc.date.issuedhijri | 1442 | en_US |
dc.relation.dep | الحاسب الآلي | en_US |
dc.rights.digitized | Yes | en_US |
Appears in Collections : | الرسائل العلمية المحدثة |
Files in This Item :
File | Description | Size | Format | |
---|---|---|---|---|
24641.pdf " Restricted Access" | الرسالة الكاملة | 31.95 MB | Adobe PDF | View/OpenRequest a copy |
abse24641.pdf " Restricted Access" | ملخص الرسالة بالإنجليزي | 352.34 kB | Adobe PDF | View/OpenRequest a copy |
cont24641.pdf " Restricted Access" | فهرس الموضوعات | 670.6 kB | Adobe PDF | View/OpenRequest a copy |
indu24641.pdf " Restricted Access" | المقدمة | 1.14 MB | Adobe PDF | View/OpenRequest a copy |
title24641.pdf " Restricted Access" | غلاف | 295.42 kB | Adobe PDF | View/OpenRequest a copy |
Items in D-Library are protected by copyright, with all rights reserved, unless otherwise indicated.
Comments (0)