Authentication of Electronic Health Records Using Visual Cryptography Technique

  • Unique Paper ID: 175396
  • Volume: 11
  • Issue: 11
  • PageNo: 3295-3299
  • Abstract:
  • In the medical field, Secured transmission and storage of medical images remain a challenge, especially with the growing threat of insider attacks in e-Healthcare systems. These attacks can lead to incorrect health assessments, data misuse, financial losses, and legal or reputational damage for healthcare centers. The reliance on cloud services further increases the risk, making patient records vulnerable and potentially compromising care quality. This highlights the urgent need for effective detection methods. To address this, our study proposes a new framework using watermark extraction and logging detection to identify insider attacks in cloud-based healthcare systems. The approach accurately tracked user activities, distinguishing between legal and illegal access through an audit trail, and demonstrated high precision, recall, and accuracy based on evaluation results.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{175396,
        author = {JENIS CHRISTINA B and ABIN DEVASIA and JERRWIN JOSHUA M and MAHESWARI P and SASI PREETHA D},
        title = {Authentication of Electronic Health Records Using Visual Cryptography Technique},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {11},
        number = {11},
        pages = {3295-3299},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=175396},
        abstract = {In the medical field, Secured transmission and storage of medical images remain a challenge, especially with the growing threat of insider attacks in e-Healthcare systems. These attacks can lead to incorrect health assessments, data misuse, financial losses, and legal or reputational damage for healthcare centers. The reliance on cloud services further increases the risk, making patient records vulnerable and potentially compromising care quality. This highlights the urgent need for effective detection methods. To address this, our study proposes a new framework using watermark extraction and logging detection to identify insider attacks in cloud-based healthcare systems. The approach accurately tracked user activities, distinguishing between legal and illegal access through an audit trail, and demonstrated high precision, recall, and accuracy based on evaluation results.},
        keywords = {Electronic health record, Encryption, Decryption, Watermarking extraction, logging detection, JAVA, JavaScript, MY SQL.},
        month = {April},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 11
  • Issue: 11
  • PageNo: 3295-3299

Authentication of Electronic Health Records Using Visual Cryptography Technique

Related Articles