Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

KWARA STATE POLYTECHNIC, ILORIN.

IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF HIGHER NATIONAL DIPLOMA (HND) IN COMPUTER SCIENCE

DESIGN AND IMPLEMENTATION OF CRIME DOCUMENTATION USING BIOMETRIC APPROACH

BY
NAME
HND/19/COM/FT/
INTRODUCTION
The protection of patient privacy and the security of patients’
medical records require a solid security infrastructure as well as a
proven security policy. Tan specifies, “A security policy should
clearly define the guidelines for creating, accessing, and
maintaining the integrity of patient e-health data and the scope of
accountability for each responsible party. A security infrastructure
covers the issues of login authentication, cryptography, access
control, antivirus precautions, risk assessment, auditing, alert for
medication errors, and disaster recovery.” Access control is a
fundamental security problem in shared computing environments
where medical records residing in databases are exchanged through
heterogeneous file systems in networked environments, where roles
and privileges vary depending on the nature of the system and the
organization it belongs. This requires controlling users’ right to use
certain resources by granting or preventing users’ access to
resources as needed. There are three types of 2 access control:
administration, technical (logical), and physical.
Statements of the Problem

It is discovered in the previous manual


usage for keeping patient detail in health
organization, patient information has been
expose to the wrong hand and loses of
data, to eradicate the lapses of the
existing system. Health insurance data
policy system using encryption standard
(DES) cryptography techniques is introduce
to keep “confidentiality”, “integrity”,
“availability” and “medical identity theft”.
3
AIM AND OBJECTIVES
The aim of this project is to create an application that
cater for health insurance data policy system using data
encryption standard.
 The objectives are:
 To create a system that serve as security for patient
record
 To implement the security using cryptography
algorithm approach
 To adapt the algorithm using C# programming
language
 Evaluate the performance of system
4
LITERATURE REVIEW
S/ AUT YEA TITTLE AIM METHODOLOGY LIMITATION
N HOR R

1 Rasha 2021 Cryptography The aim of this paper is to the eHealth systems are widely the parameters and metrics that are used to
9 applications in investigate different used and many prestigious medical evaluate the implemented cryptography
Ehealth security aspects of fraud centers depend on them in techniques have been reviewed. Thereafter, a
systems prevention and detection transmitting and receiving the summary of the limitations and the recent
in telecommunication. medical information through trends of cryptography applications in
internet and local networks. Over eHealth systems is presented. Finally, the
the years, several security systems conclusions of this review article with some
have been presented to protect the suggestions for future researches in this field
privacy of the patients and to are offered.
ensure the safety of the exchanged
medical data.

2 Leona 2016 Secure and privacy The increasing the use of mobile devices Many mHealth initiatives, however, fail to
rdo aware data digitalization of people’s (e.g.,mobilephones, sensors,PDAs) address security and privacy issues. This,
collection and health information raises, to support medical and public coupledwith the lack of specific legislation
processing in however, new threats health. Such systems, have been for privacy and data protection in these
mobile health regarding information particularly successful in countries, increases the risk of harm to
systems security and privacy. developing countries, taking individuals.
Accidental or deliberate advantage of their flourishing
data breaches of health mobile market and the irneed to
data may lead to societal expand the coverage of primary
pressures, embarrassment health care programs.
and discrimination.

3 Hayat 2018 healthcare data: Big healthcare data has We proposed an Object-Oriented it is essential to identify the limita‑ tions of
et al preserving security considerable potential to Methodology and developed an existing solutions and envision directions for
and privacy improve patient outcomes, improved software tool based future research. In this paper, we have
predict outbreaks of model thatallows identifying surveyed the state‑of‑the‑art security and
epidemics, gain valuable potential fraudulent customers at privacy challenges in big data as applied to
insights, avoid the time of subscription, which in healthcare industry, assessed how security
preventable diseases, turn prevents fraud inherent in and privacy issues occur in case of big
reduce the cost of GSM communications. A database healthcare data and discussed ways in which
healthcare delivery and with SQL using MySQL IDE, and they may be addressed.
improve the quality of life MySQL command line was
in general. developed.
RESEARCH METHODOLOGY
 The method used in this research is the combination of cryptography and
steganography. That is, DES algorithm for encryption and LSB for steganography. The
methodology employed entails two main steps to secure medical data in text format
which stated as follows.
 The first step will accept patient data in plain text format as input and encrypt the
plain text using DES to generate cipher text as output. This step requires a key called
secret key
 The second step will accept the output of the first step as input and embed it in a
cover image using LSB to generate an output in image form called stego image.
 In order to retrieve data for the stego image, the steps involve are mainly two.
 (a) The first step in retrieving the secured data is to extract the cipher text form the
stego image. (b) The second step to finally retrieve the secure data is to decrypt the
cipher text using DES algorithm. This step requires a secret key which correspond to
the key used during encryption.

6
RESULT AND DISCUSSION

Complete selection
7
RESULT AND DISCUSSION CON’T

shows the complete selection of required input to retrieve the patient


medical data.
8
RESULT AND DISCUSSION CON’T

The Secure interface


9
RESULT AND DISCUSSION CON’T

The medical data selection process for retrieving operation

10
CONCLUSION AND RECOMMENDATIONS
 CONCLUSION
Among other sectors such as academic, banking and finance, medical sector is
not an exception in experiencing cyber-attack as patient health data are also
stored and shared electronically through the internet. The intrusion and
stealing of patient data automatically affects the service offered at the health
care centres and thus, poses threat to life of the patient. This study employs
both cryptography and steganography technique to improve the security of
medical data. Encryption and data hiding are the two main steps involved in
the method use in this study to secure medical data while the reverse is use in
opposite direction to retrieve the medical data.
RECOMMENDATION
This study demonstrates a double layer security, that is, the combination of
cryptography (3DES encryption algorithm) and steganography (LSB image
encoding technique) to improve data security in medical or health care
organization. The havoc caused by cyber-attack on data relating to health
issues motivates this study to demonstrate a double layer security system. The
result in this study shows a double layered security system offer more security
strength and make successful cyber-attack to be more difficult.

11
REFERENCES
 Adams RI (2016) Information Communication Technology and Nigerian Banking
Industry
 Aditya et al (2013) securing files using aes algorithm. ) International Journal of
Computer Science and Information Technologies, Vol. 4 (3)
 Aganga, FA (2017). Movement of Computer System in broader perspective, 2nd
edition ps
 Anshu & Ashish (2013) security by rijndael algorithm using combination of other
new generation security algorithms. International Journal of Computer Trends
and Technology (IJCTT) – volume 5
 Awaju (2013) Importance of computerize monitoring system in Nigeria. Journal
vo 3.
 Bill D (2001) Impact of Computerize Monitoring information System on
performance of banking industry Journal vol 7 pg 66. World press limited
Biometrics. pp 309-3152006)
 Bioinformat 8 474 (2007)and matching technique for fingerprint recognition IEEE
 Ezeofor (2014) reviewed analysis of network data encryption & decryption
techniques in communication systems. International Journal12of Innovative
Research in Science, Engineering and Technology.

You might also like