Published April 19, 2021 | Version v1
Journal article Open

A Playfair Cipher-based Secured Patients' Information Transaction System

  • 1. Department of Computer Science & Engineering, Daffodil International University, Dhaka, Bangladesh.

Description

Secured patient’s information transaction between doctors and expert doctors from home and abroad, from remote to global for many reasons. A secured patients’ information transaction system has been designed developed and implemented in Java programming language that can be used for patient information communication using Playfair symmetric key cryptographic technique. The proposed system first prepared a table of text space matrix using a keyword without repeating character and then performed encryption on the patient’s sensitive information to produce ciphertext and then sent it to the destination. In the receiving end first prepare a text space matrix with the same keyword and then performed decryption on the receiving ciphertext to the retrieve the patients’ information as plaintext. This proposed system has been implemented in Java code, produced several outputs for inputs and are analyzed. This can be applied where higher level security services are required.

Files

A Playfair Cipher -Formatted Paper.pdf

Files (404.0 kB)

Name Size Download all
md5:c9d4189e73a09092d11bd125408e7453
404.0 kB Preview Download

Additional details

References

  • Nosrati, M., Karimi, R., & Hariri, M. (2011). An introduction to steganography methods. World Applied Programming, 1 (3), 191–195.
  • Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2), 26-34.
  • Sandeep, Naveen, K., A., ReddyGangadri, G. (2015). A Novel Modified Play-Fair Image Steganography by Using 9 by 4 Matrixes. International Journal of Scientific & Engineering Research.8.2008-2015.
  • Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752.
  • Softonic. (2015) Xiao Steganography. {Online}. Available: https://xiao-steganography.en.softonic.com/
  • Aljamea, M. M., Iliopoulos, C. S., & Samiruzzaman, M. (2016, March). Detection of url in image steganography. In Proceedings of the International Conference on Internet of things and Cloud Computing (pp. 1-6).
  • Ravindra Babu, K., Kumar, S. U., Babu, A. V., Aditya, I. S., & Komuraiah, P. (2011). An extension to traditional playfair cryptographic method.
  • Hamad, S. (2014). Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data. International Journal of Electrical & Computer Engineering (2088-8708), 4(1).
  • Dsouza, D. J., & Girish, S. (2018). A method of data hiding in QR code using image steganography. International Journal of Advance Research, Ideas and Innovations in Technology, 4, 1111-1113.
  • Bhattacharyya, S., Chand, N., & Chakraborty, S. (2014). A modified encryption technique using Playfair cipher 10 by 9 matrix with six iteration steps. International Journal of Advanced Research in Computer Engineering & Technology, 3(2), 307-312.