International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 1 | Views: 167 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project | Information Technology | India | Volume 11 Issue 10, October 2022 | Rating: 5 / 10


Medical Data Security using RSA and Visual Cryptography

Bency Wilson | Jesline Abraham


Abstract: Security is the most critical issue amid the transmission of medical images because it contains sensitive information about patients. Medical data security is an essential method for securing sensitive data when computerized images and their relevant patient data are transmitted across public networks. It is vital to frame an actual model to assure the safety and trustworthiness of the patients? symptomatic data that were transmitted and received. There are many ways to carry out his. Internet of Things (IoT) is predicted to change the health care industry and could lead to the rise of the Internet of Medical Things. The proposed method provides cryptographic data security for patients? data stored in hospitals using the RSA algorithm and Visual Cryptography. RSA contains both private and public keys that are randomly generated. The private key is used for the encryption of medical data whereas the public key is used during the decryption process. This public key, which was randomly generated, is converted into an image or a text file using Visual Cryptography, that is, it is hidden. The key that is used to encrypt the RSA public key using VC is sent to the patient?s mail with which the public key is extracted and the medical data restored. Using a combination of the RSA algorithm and Visual Cryptography we can provide dual data security for patients? data. This method can also be applied when the patient switches hospitals. Also, transmission security is of utmost importance than storage security since many infrastructures rely on secure transmission protocols to prevent a catastrophic breach of security and to prevent attacks such as ARP spoofing and general data loss.


Keywords: Security, RSA, Visual cryptography, IoT, Encryption, Decryption


Edition: Volume 11 Issue 10, October 2022,


Pages: 959 - 963



How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top