Improved Security of E-Healthcare Images Using Hybridized Robust Zero-Watermarking and Hyper-Chaotic System along with RSA
Jaishree Jain,
Arpit Jain,
Saurabh Kumar Srivastava,
Chaman Verma,
Maria Simona Raboaca and
Zoltán Illés
Additional contact information
Jaishree Jain: College of Computing Sciences and IT, Teerthanker Mahaveer University, Moradabad 244001, India
Arpit Jain: College of Computing Sciences and IT, Teerthanker Mahaveer University, Moradabad 244001, India
Saurabh Kumar Srivastava: College of Computing Sciences and IT, Teerthanker Mahaveer University, Moradabad 244001, India
Chaman Verma: Department of Media and Educational Informatics, Faculty of Informatics, Eötvös Loránd University, 1053 Budapest, Hungary
Maria Simona Raboaca: National Research and Development Institute for Cryogenic and Isotopic Technologies—ICSI Rm, 240050 Ramnicu Valcea, Romania
Zoltán Illés: Department of Media and Educational Informatics, Faculty of Informatics, Eötvös Loránd University, 1053 Budapest, Hungary
Mathematics, 2022, vol. 10, issue 7, 1-16
Abstract:
With the rapid advancements of the internet of things (IoT), several applications have evolved with completely dissimilar structures and requirements. However, the fifth generation of mobile cellular networks (5G) is unable to successfully support the dissimilar structures and requirements. The sixth generation of mobile cellular networks (6G) is likely to enable new and unidentified applications with varying requirements. Therefore, 6G not only provides 10 to 100 times the speed of 5G, but 6G can also provide dynamic services for advanced IoT applications. However, providing security to 6G networks is still a significant problem. Therefore, in this paper, a hybrid image encryption technique is proposed to secure multimedia data communication over 6G networks. Initially, multimedia data are encrypted by using the proposed model. Thereafter, the encrypted data are then transferred over the 6G networks. Extensive experiments are conducted by using various attacks and security measures. A comparative analysis reveals that the proposed model achieves remarkably good performance as compared to the existing encryption techniques.
Keywords: internet of things; e-healthcare; hyper-chaotic map; 6G; 5G (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/10/7/1071/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/7/1071/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:7:p:1071-:d:780296
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().