A Playfair Cipher-based Secured Patients' Information Transaction System
- 1. Department of Computer Science & Engineering, Daffodil International University, Dhaka, Bangladesh.
Description
Secured patient’s information transaction between doctors and expert doctors from home and abroad, from remote to global for many reasons. A secured patients’ information transaction system has been designed developed and implemented in Java programming language that can be used for patient information communication using Playfair symmetric key cryptographic technique. The proposed system first prepared a table of text space matrix using a keyword without repeating character and then performed encryption on the patient’s sensitive information to produce ciphertext and then sent it to the destination. In the receiving end first prepare a text space matrix with the same keyword and then performed decryption on the receiving ciphertext to the retrieve the patients’ information as plaintext. This proposed system has been implemented in Java code, produced several outputs for inputs and are analyzed. This can be applied where higher level security services are required.
Files
A Playfair Cipher -Formatted Paper.pdf
Files
(404.0 kB)
Name | Size | Download all |
---|---|---|
md5:c9d4189e73a09092d11bd125408e7453
|
404.0 kB | Preview Download |
Additional details
References
- Nosrati, M., Karimi, R., & Hariri, M. (2011). An introduction to steganography methods. World Applied Programming, 1 (3), 191–195.
- Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2), 26-34.
- Sandeep, Naveen, K., A., ReddyGangadri, G. (2015). A Novel Modified Play-Fair Image Steganography by Using 9 by 4 Matrixes. International Journal of Scientific & Engineering Research.8.2008-2015.
- Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752.
- Softonic. (2015) Xiao Steganography. {Online}. Available: https://xiao-steganography.en.softonic.com/
- Aljamea, M. M., Iliopoulos, C. S., & Samiruzzaman, M. (2016, March). Detection of url in image steganography. In Proceedings of the International Conference on Internet of things and Cloud Computing (pp. 1-6).
- Ravindra Babu, K., Kumar, S. U., Babu, A. V., Aditya, I. S., & Komuraiah, P. (2011). An extension to traditional playfair cryptographic method.
- Hamad, S. (2014). Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data. International Journal of Electrical & Computer Engineering (2088-8708), 4(1).
- Dsouza, D. J., & Girish, S. (2018). A method of data hiding in QR code using image steganography. International Journal of Advance Research, Ideas and Innovations in Technology, 4, 1111-1113.
- Bhattacharyya, S., Chand, N., & Chakraborty, S. (2014). A modified encryption technique using Playfair cipher 10 by 9 matrix with six iteration steps. International Journal of Advanced Research in Computer Engineering & Technology, 3(2), 307-312.