Skip to main content

Advertisement

Log in

Crypto-Stegno based model for securing medical information on IOMT platform

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The integration of the Internet of Things in medical systems referred to as the Internet of Medical Things (IoMT), which supports medical events for instance real-time diagnosis, remote monitoring of patients, real-time drug prescriptions, among others. This aids the quality of services provided by the health workers thereby improve patients’ satisfaction. However, the integrity and confidentiality of medical information on the IoMT platform remain one of the contentions that causes problems in medical services. Another serious concern with achieving protection for medical records is information confidentiality for patient’s records over the IoMT environment. Therefore, this paper proposed a Crypto-Stegno model to secure medical information on the IoMT environment. The paper validates the system on healthcare information datasets and revealed extraordinary results in respect to the quality of perceptibility, extreme opposition to data loss, extreme embedding capability and security, which made the proposed system an authentic strategy for resourceful and efficient medical information on IoTM platform.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abd-El-Atty B, Iliyasu AM, Alaskar H, El-Latif A, Ahmed A (2020) A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors 20(11):3108

    Article  Google Scholar 

  2. Abikoye OC, Ojo UA, Awotunde JB, Ogundokun RO (2020) A safe and secured iris template using steganography and cryptography. Multimed Tools Appl 79(31–32):23483–23506

    Article  Google Scholar 

  3. Adeniyi EA, Ogundokun RO, Awotunde JB (2021) IoMT-based wearable body sensors network healthcare monitoring system. Stud Computational Intell 2021(933):103–121

    Article  Google Scholar 

  4. Akande NO, Abikoye CO, Adebiyi MO, Kayode AA, Adegun AA, Ogundokun RO (2019) Electronic medical information encryption using modified blowfish algorithm. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 11623 LNCS, pp. 166-179

  5. Akande ON, Abikoye OC, Kayode AA, Aro OT, Ogundokun OR (2020) A dynamic round triple data encryption standard cryptographic technique for data security. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 12254 LNCS, pp. 487-499

  6. Ali S, Islam N, Rauf A, Din IU, Guizani M, Rodrigues JJ (2018) Privacy and security issues in online social networks. Future Internet 10(12):114

    Article  Google Scholar 

  7. Ali AH, George LE, Zaidan AA, Mokhtar MR (2018) High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed Tools Appl 77(23):31487–31516

    Article  Google Scholar 

  8. Alsubaei F, Abuhussein A, Shiva S (2017) Security and privacy in the internet of medical things: taxonomy and risk assessment. In 2017 IEEE 42nd conference on local computer networks workshops (LCN workshops), pp. 112–120. IEEE, Singapore. https://doi.org/10.1109/LCN.Workshops.2017.72

  9. Anandarajan M, Malik S (2018) Protecting the internet of medical things: a situational crime-prevention approach. Cogent Medicine 5(1):1513349

    Article  Google Scholar 

  10. Awan KA, Din IU, Almogren A, Guizani M, Altameem A, Jadoon SU (2019) Robusttrust–a pro-privacy robust distributed trust management mechanism for internet of things. IEEE Access 7:62095–62106

    Article  Google Scholar 

  11. Ayo FE, Folorunso SO, Abayomi-Alli AA, Adekunle AO, Awotunde JB (2020) Network intrusion detection is based on deep learning model optimized with rule-based hybrid feature selection. Information Security Journal: A Global Perspective, 1–17

  12. Biglow J (2016) It stands to reason: an argument for article III standing based on the threat of future harm in data breach litigation. Minn JL Sci & Tech 17:943

    Google Scholar 

  13. Borgia E (2014) The internet of things vision: key features, applications and open issues. Comput Commun 54:1–31

    Article  Google Scholar 

  14. Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Systems 25(1):222–233

    Article  Google Scholar 

  15. Christiana AO, Oluwatobi AN, Victory GA, Oluwaseun OR (2019) A secured one time password authentication technique using (3, 3) visual cryptography scheme. In journal of physics: conference series (Vol. 1299, no. 1, p. 012059). IOP publishing

  16. Crandall R (1988) Some notes on steganography. Posted on steganography mailing list (1998). Source: http://www. Dia. Unisa. It/~ ads/corso security/www/CORSO-0203/steganografia/LINKS% 20LOCALI/matrixencoding. Pdf

  17. D'agapeyeff A (2016) Codes and ciphers-a history of cryptography. Read books ltd. technologies (INTELLECT) (pp. 1-7). IEEE

  18. Din IU, Guizani M, Kim BS, Hassan S, Khan MK (2018) Trust management techniques for the internet of things: a survey. IEEE Access 7:29763–29787

    Article  Google Scholar 

  19. Din IU, Almogren A, Guizani M, Zuair M (2019) A decade of internet of things: analysis in the light of healthcare applications. IEEE Access 7:89967–89979

    Article  Google Scholar 

  20. Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2020) Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput Applic, 32(15), 10979–10993

  21. Elhoseny M, Ramírez-González G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure 765 medical data transmission model for IoT-based healthcare systems. Ieee Access 6:20596–20608

  22. Farahani B, Firouzi F, Chang V, Badaroglu M, Constant N, Mankodiya K (2018) Towards fog-driven IoT eHealth: promises and challenges of IoT in medicine and healthcare. Futur Gener Comput Syst 78:659–676

    Article  Google Scholar 

  23. Filkins B (2019) Health Care Cyberthreat Report: Widespread Compromises Detected, Compliance Nightmare on Horizon. North Bethesda, SANS Institute, 2014

  24. Goforth C (2019) The Lawyer's Cryptionary: a resource for talking to clients about crypto-transactions. Campbell L Rev 41:47

    Google Scholar 

  25. Halperin D, Heydt-Benjamin TS, Fu K, Kohno T, Maisel WH (2008) Security and privacy for implantable medical devices. IEEE Pervasive Comput 7(1):30–39

    Article  Google Scholar 

  26. He Y, Xian H, Wang L, Zhang S (2020) Secure encrypted data deduplication based on data popularity. Mobile networks and applications, 1-10

  27. Hoffman DL, Novak TP (2018) Consumer and object experience in the internet of things: an assemblage theory approach. J Consum Res 44(6):1178–1204

    Article  Google Scholar 

  28. Hossain MS, Muhammad G (2016) Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring. Comput Netw 101:192–202

    Article  Google Scholar 

  29. Huang M, Liu A, Wang T, Huang C (2018) Green data gathering under delay differentiated services constraint for internet of things Wireless Communications and Mobile Computing, 2018

  30. Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66

    Article  Google Scholar 

  31. Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708

    Article  Google Scholar 

  32. Islam SU, Khattak HA, Pierson JM, Din IU, Almogren A, Guizani M, Zuair M (2019) Leveraging utilization as performance metric for CDN enabled energy efficient internet of things. Measurement 147:106814

    Article  Google Scholar 

  33. Jagadeeswari V, Subramaniyaswamy V, Logesh R, Vijayakumar VJHIS (2018) A study on medical internet of things and big data in personalized healthcare system. Health Inform Sci Syst 6(1):14

    Article  Google Scholar 

  34. Kapusta K, Qiu H, Memmi G (2019) Secure data sharing with fast access revocation through untrusted clouds. In 2019 10th IFIP international conference on new technologies, mobility and security (NTMS) (pp. 1-5). IEEE

  35. Kazeem Moses A, Joseph Bamidele A, Roseline Oluwaseun O, Misra S, Abidemi Emmanuel A (2021) Applicability of MMRR load balancing algorithm in cloud computing. Int J Comput Mathematics: Comput Syst Theory 6(1):7–20

    MathSciNet  Google Scholar 

  36. Khan M, Han K, Karthik SJWPC (2018) Designing smart control systems based on internet of things and big data analytics. Wirel Pers Commun 99(4):1683–1697

    Article  Google Scholar 

  37. Khan SU, Islam N, Jan Z, Din IU, Khan A, Faheem Y (2019) An e-health care services framework for the detection and classification of breast cancer in breast cytology images as an IoMT application. Futur Gener Comput Syst 98:286–296

    Article  Google Scholar 

  38. Khan SR, Sikandar M, Almogren A, Din IU, Fortino G, Guerrieri A (2020) IoMT-based computational approach for detecting brain tumor. Futur Gener Comput Syst 109:360–367

    Article  Google Scholar 

  39. Khan S, Abbas N, Nasir M, Haseeb K, Saba T, Rehman A, Mehmood Z (2020) Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT). Multimedia tools and applications, 1-21.

  40. Khari M, Garg AK, Gandomi AH, Gupta R, Patan R, Balusamy B (2019) Securing data in internet of things (IoT) using cryptography and steganography techniques. IEEE Trans Syst Man Cybernetics: Syst 50(1):73–80

    Article  Google Scholar 

  41. Kim J (2015) Energy-efficient dynamic packet downloading for medical IoT platforms. IEEE Trans Indust Inform 11(6):1653–1659

    Article  Google Scholar 

  42. Kingsley KA, Barmawi AM (2020) Improving data hiding capacity in code based steganography using multiple embedding. J Inform Hiding Multimedia Signal Process 11(1):14–43

    Google Scholar 

  43. Laishram D, Tuithung T (2018) A survey on digital image steganography: current trends and challenges. In proceedings of 3rd international conference on internet of things and connected technologies (ICIoTCT) (pp. 26-27)

  44. Lakshmanaprabu SK, Shankar K, Khanna A, Gupta D, Rodrigues JJ, Pinheiro PR, De Albuquerque VHC (2018) Effective features to classify big data using social internet of things. IEEE access 6:24196–24204

    Article  Google Scholar 

  45. Li T, Li H, Hu L, Li H (2020) A reversible steganography method with statistical features maintained based on the difference value. IEEE Access 8:12845–12855

    Article  Google Scholar 

  46. Mahmoud MM, Rodrigues JJ, Ahmed SH, Shah SC, Al-Muhtadi JF, Korotaev VV, De Albuquerque VHC (2018) Enabling technologies on cloud of things for smart healthcare. IEEE Access 6:31950–31967

    Article  Google Scholar 

  47. Mishra TK, Arvind N Design and Implementation of Text Cryptography for Multi-Languages and Resolving Type Cast Issues

  48. Molaei AM, Sedaaghi MH, Ebrahimnezhad H (2017) Steganography scheme based on reed-Muller code with improving payload and ability to retrieval of destroyed data for digital images. AUT J Electric Eng 49(1):53–62

    Google Scholar 

  49. Moosavi SR, Gia TN, Nigussie E, Rahmani AM, Virtanen S, Tenhunen H, Isoaho J (2016) End-to-end security scheme for mobility enabled healthcare internet of things. Futur Gener Comput Syst 64:108–124

    Article  Google Scholar 

  50. Mutlag AA, Ghani MKA, Arunkumar NA, Mohammed MA, Mohd O (2019) Enabling technologies for fog computing in healthcare IoT systems. Futur Gener Comput Syst 90:62–78

    Article  Google Scholar 

  51. Nanayakkara N, Halgamuge M, Syed A (2019) Security and privacy of internet of medical things (IoMT) based healthcare applications: a review

  52. Nassrullah HA, Flayyih WN, Nasrullah MA (2020) Enhancement of LSB audio steganography based on carrier and message characteristics. J Inform Hiding Multimed Signal Process 11(3):126–137

    Google Scholar 

  53. Ogundokun RO, Abikoye OC, Misra S, Awotunde JB (2020) Modified least significant bit technique for securing medical images. Lect Notes Business Inform Processing 402:553–565

    Article  Google Scholar 

  54. Rajendran S, Kulkarni V, Chaudhari S, Gupta PK (2020) An update on medical data steganography and encryption. In: In recent trends in image and signal processing in computer vision. Springer, Singapore, pp 181–199

    Google Scholar 

  55. Rawat P, Singh KD, Bonnin JM (2016) Cognitive radio for M2M and internet of things: a survey. Comput Commun 94:1–29

    Article  Google Scholar 

  56. Saračević M, Adamović S, Maček N, Elhoseny M, Sarhan S (2020) Cryptographic keys exchange model for smart city applications. IET Intell Transp Syst 14:1456–1464

    Article  Google Scholar 

  57. Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. john Wiley & sons

  58. Schuessler JH, Nagy D, Fulk HK, Dearing A (2017) Data breach Laws: do they work? J Appl Secur Res 12(4):512–524

    Article  Google Scholar 

  59. Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130

    Article  Google Scholar 

  60. Shanthakumari R, Malliga S (2019) Dual-layer security of image steganography based on IDEA and LSBG algorithm in the cloud environment. Sādhanā 44(5):119

    Article  MathSciNet  Google Scholar 

  61. Shin D, Hwang Y (2017) Integrated acceptance and sustainability evaluation of internet of medical things. Internet Res 27:1227–1254

    Article  Google Scholar 

  62. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164

    Article  Google Scholar 

  63. Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95–113

    Article  MATH  Google Scholar 

  64. Sun W, Cai Z, Liu F, Fang S, Wang G (2017) A survey of data mining technology on electronic medical records. In 2017 IEEE 19th international conference on e-health networking, applications and services (Healthcom) (pp. 1-6). IEEE

  65. Sun W, Cai Z, Li Y, Liu F, Fang S, Wang G (2018) Security and privacy in the medical internet of things: a review. Secur Commun Networks 2018:1–9

    Google Scholar 

  66. Taha MS, Rahim MSM, Lafta SA, Hashim MM, Alzuabidi HM (2019) Combination of steganography and cryptography: a short survey. In IOP conference series: materials science and engineering (Vol. 518, no. 5, p. 052003). IOP publishing

  67. Tahir S, Bakhsh ST, Abulkhair M, Alassafi MO (2019) An energy-efficient fog-to-cloud internet of medical things architecture. Int J Distribut Sens Networks 15(5):1550147719851977

    Google Scholar 

  68. Tan CC, Wang H, Zhong S, Li Q (2009) IBE-lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6):926–932

    Article  Google Scholar 

  69. Tang J, Liu A, Zhao M, Wang T (2018) An aggregate signature based trust routing for data gathering in sensor networks Security and Communication Networks, 2018

  70. Van Oorschot PC, Menezes AJ, Vanstone SA (1996) Handbook of applied cryptography. Crc Press

  71. Wang FH, Pan JS, Jain LC (2009) Digital watermarking techniques. In: Innovations in digital watermarking techniques (pp. 11–26). Springer, Berlin

    Chapter  Google Scholar 

  72. Williams, P. A., & Woodward, A. J. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical devices (Auckland, NZ), 8, 305.

  73. Wood A, Virone G, Doan T, Cao Q, Selavo L, Wu Y, ... Stankovic J (2006) ALARM-NET: wireless sensor networks for assisted-living and residential monitoring. University of Virginia Computer Science Department Technical Report, 2, 17

  74. Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5):1250–1258

    Article  Google Scholar 

  75. Yaqoob I, Ahmed E, Ur Rehman MH, Ahmed AIA, Al-garadi MA, Imran M, Guizani M (2017) The rise of ransomware and emerging security challenges in the Internet of Things. Computer Networks, 129, 444–458

  76. Yin M, Chen X, Wang Q, Wang W, Wang Y (2019) Dynamics on hybrid complex network: botnet modeling and analysis of medical IoT. Secur Commun Networks 2019:1–14

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roseline Oluwaseun Ogundokun.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ogundokun, R.O., Awotunde, J.B., Adeniyi, E.A. et al. Crypto-Stegno based model for securing medical information on IOMT platform. Multimed Tools Appl 80, 31705–31727 (2021). https://doi.org/10.1007/s11042-021-11125-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11125-2

Keywords

Navigation