Providing Security to Health Data and Images Using Cloud-Based Watermarking and Visual Cryptography

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-22 Number-2
Year of Publication : 2015
Authors : Kavita Athnikar, Prajakta Shirke, Snehal Tajave, Mukta Tarkasband
  10.14445/22312803/IJCTT-V22P113

MLA

Kavita Athnikar, Prajakta Shirke, Snehal Tajave, Mukta Tarkasband "Providing Security to Health Data and Images Using Cloud-Based Watermarking and Visual Cryptography". International Journal of Computer Trends and Technology (IJCTT) V22(2):68-71, April 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
The health information of individual which is provided to the medical foundations, they store the record of individual through the web. Record is kept as an electronic health record which is received by cloud computing. For the security purpose cloud computing is utilized, from which all the health record are spared in cloud. In this paper, technique is proposed by utilizing the idea of watermarking with the construction modeling of cloud computing. Strategy is outline with the end goal of mitigating the risk of insider revelations. Our configuration represents to all the necessity of the cloud oriented design system. We have additionally utilized the idea of visual cryptography. By using basic concept of cryptography we provide security to images.

References
[1]Z.Yu, C. Thomborson, C. Wang, J. Wang “A Cloud-Based Watermarking Method for Health Data Security.” 978-1-4673- 2362-8/12/$31.00 ©2012 IEEE.
[2]S. Gao, D. Mioc, X. Yi, F. Anton, E. Oldfield, and D. Coleman, “Towards Web-based representation and processing of health information,” International Journal of Health Geographics, vol. 8, no. 1, p. 3, 2009.
[3]T. C. Rindfleisch, “Privacy, information technology, and health care,” COMMUNICATIONS of The ACM, vol. 40, no. 8, pp. 93– 100, Aug. 1997.
[4]M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A Berkeley view of cloud computing,” EECS Department, University of California, Berkeley, Tech. Rep., Feb. 2009.
[5]A. Brown and B. Weihl, “An update on Google Health and Google PowerMeter,” Jun. 2011. [Online]. Available: http://googleblog. blogspot.co.nz/2011/06/update-on-google-healthand- google.html.
[6]N. Gohring, “Microsoft says HealthVault still going strong,” Computer-World, Jun. 2011. [Online]. Available: http://www.computerworld.com/s/article/9217970/Microsoft says HealthVault still going strong.
[7]Microsoft, “Extending the value of electronic health records through interoperability,” Feb. 2011. [Online]. Available: http://www.microsoft. com/presspass/features/2011/feb11/02- 21himss.mspx.
[8]Kavita Athnikar, Prajakta Shirke, Snehal Tajave, Mukta Tarkasband. "A Cloud-Based Watermarking Method for Health Data and Image Security". International Journal of Computer Trends and Technology (IJCTT) V16 (3):119-120, Oct 2014. ISSN: 2231-2803.www.ijcttjournal.org. [Online]. Available: http://www.ijcttjournal.org/archives/ijctt-v16p129.pdf

Keywords
Health data security, cloud computing, water marking.