EconPapers    
Economics at your fingertips  
 

Improved Security of E-Healthcare Images Using Hybridized Robust Zero-Watermarking and Hyper-Chaotic System along with RSA

Jaishree Jain, Arpit Jain, Saurabh Kumar Srivastava, Chaman Verma, Maria Simona Raboaca and Zoltán Illés
Additional contact information
Jaishree Jain: College of Computing Sciences and IT, Teerthanker Mahaveer University, Moradabad 244001, India
Arpit Jain: College of Computing Sciences and IT, Teerthanker Mahaveer University, Moradabad 244001, India
Saurabh Kumar Srivastava: College of Computing Sciences and IT, Teerthanker Mahaveer University, Moradabad 244001, India
Chaman Verma: Department of Media and Educational Informatics, Faculty of Informatics, Eötvös Loránd University, 1053 Budapest, Hungary
Maria Simona Raboaca: National Research and Development Institute for Cryogenic and Isotopic Technologies—ICSI Rm, 240050 Ramnicu Valcea, Romania
Zoltán Illés: Department of Media and Educational Informatics, Faculty of Informatics, Eötvös Loránd University, 1053 Budapest, Hungary

Mathematics, 2022, vol. 10, issue 7, 1-16

Abstract: With the rapid advancements of the internet of things (IoT), several applications have evolved with completely dissimilar structures and requirements. However, the fifth generation of mobile cellular networks (5G) is unable to successfully support the dissimilar structures and requirements. The sixth generation of mobile cellular networks (6G) is likely to enable new and unidentified applications with varying requirements. Therefore, 6G not only provides 10 to 100 times the speed of 5G, but 6G can also provide dynamic services for advanced IoT applications. However, providing security to 6G networks is still a significant problem. Therefore, in this paper, a hybrid image encryption technique is proposed to secure multimedia data communication over 6G networks. Initially, multimedia data are encrypted by using the proposed model. Thereafter, the encrypted data are then transferred over the 6G networks. Extensive experiments are conducted by using various attacks and security measures. A comparative analysis reveals that the proposed model achieves remarkably good performance as compared to the existing encryption techniques.

Keywords: internet of things; e-healthcare; hyper-chaotic map; 6G; 5G (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/10/7/1071/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/7/1071/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:7:p:1071-:d:780296

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:10:y:2022:i:7:p:1071-:d:780296