Mathematically Based Assessment of the Accuracy of Protection of Cardiac Data Realized with the Help of Cryptography and Steganography
Open Access
- 27 January 2022
- journal article
- research article
- Published by MDPI AG in Mathematics
- Vol. 10 (3), 390
- https://doi.org/10.3390/math10030390
Abstract
This paper describes the application of cryptography and steganography in the protection of cardiac databases. The original cardiac data studied were transformed using a Daubechies wavelet transform. The next step is to conduct Energy Packing Efficiency-based compression. A watermark is added to the received data to protect against unauthorized access, before hybrid cryptography is performed using a suitably selected encryption algorithm. The presented and analyzed algorithm includes protection using public and symmetric key cryptography. The proposed software algorithm is performed on real electrocardiographic, photoplethysmographic, and Holter cardio data. We have evaluated the effectiveness of the applied approach and concluded that a sufficient level of protection of the studied data has been achieved, with methods of authentication and accuracy applied to the users.Keywords
Funding Information
- Bulgarian Science Fund (KP-06-N22/5, 07.12.2018)
This publication has 28 references indexed in Scilit:
- A partition-theoretic proof of Fermat’s Two Squares TheoremDiscrete Mathematics, 2016
- Bio-Inspired Cryptographic Techniques in Information Management ApplicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- A deterministic algorithm for integer factorizationMathematics of Computation, 2015
- Secure chaotic transmission of electrocardiography signals with acousto-optic modulation under profiled beam propagationApplied Optics, 2015
- Secret-Sharing Schemes for Very Dense GraphsJournal of Cryptology, 2014
- Medical image watermarking using RSA encryption in wavelet domainPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Wavelet-Based Watermarking and Compression for ECG Signals with Verification EvaluationSensors, 2014
- On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve CryptographyLecture Notes in Computer Science, 2008
- Cryptanalysis of short RSA secret exponentsIEEE Transactions on Information Theory, 1990
- A theory for multiresolution signal decomposition: the wavelet representationIEEE Transactions on Pattern Analysis and Machine Intelligence, 1989