IEEE Consumer Electronics Magazine - September 2018 - 33

3 bits of target data are hidden within each sample of audio,
indicating that the average embedding capacity of the pro-
posed technique is 3 bpp. Approximately 14.29% of extra
capacity is added by considering 6 bits instead of seven for
representing a character.

STEGANOGRAPHIC STRENGTH
OF THE PROPOSED TECHNIQUE
High robustness is the strength of this proposed technique. Gen-
erally, most state-of-the-art works always use the same layer for
embedding target data repeatedly, which helps an attacker to
extract data just by knowing the fixed LSB positions, resulting
in the loss of both security and robustness.
The proposed audio steganography technique increases the
robustness and strength of security by considering randomly
chosen multiple LSB layers for embedding 3 bits of encrypted
target data. This makes a fool of the intruders and their efforts
to get steal the target data simply by knowing of its existence.
The intruders would need to know the concept of permutation,
the rule for choosing arrangements, the ASCII feature
(described in this article) for representing characters, and the
reversible nature of 2's complement arithmetic to get the actu-
al target data from the stego audio file.

STRENGTH OF DIGITAL SIGNATURES
Digital signature techniques ensure the authentication of the
medical center and, at the same time, confidentiality and
nonrepudiation as well as the integrity of stego audio for the
correct extraction of the target data. The encryption done at
the medical center by the center's private key (which is
known only by the medical center itself) ensures authentic-
ity as well as nonrepudiation. During transit, if any unwant-
ed recipient is able to decrypt the message by using the
center's public key (which is known by all), this may com-
promise the confidentiality and cause modifications as well
as damage the integrity; however, the tampered message
will not be sent because it has not been encrypted with the
medical center's actual private key. So when the embassy
receives this tampered message, it will be unable to decrypt
it with the corresponding public key of the medical center;
therefore, the embassy will discard the message due to the
false authentication.

CONCLUSION
The proposed system of secured medical-report transmis-
sion not only reduces the spread of communicable diseases
but also makes visa processing faster as well as more trans-
parent, which indirectly helps legitimate visa applicants.
The system is already proven as secure, in addition to being
robust. It provides multiple layers of security through prop-
er authentication, encryption, and steganography. But it is
not the aim of this method to limit the movement of travel-
ers; rather, its goal is to prevent the spread of communicable
diseases, thereby protecting a country's overall health, which,
when attacked by such grave diseases, gives rise to eco-
nomic crises.

ABOUT THE AUTHORS
Biswajita Datta (biswa.jita@gmail.com) is an assistant pro-
fessor of computer science and engineering at St. Thomas's
College of Engineering and Technology, Kolkata, India.
Prithwish Kumar Pal (palprithwish9@gmail.com) is a
security analyst working with ITC Infotech Ltd., Bengaluru,
India, as a security tester.
Samir Kumar Bandyopadhyay (1954samir@gmail.com)
is a professor in the Department of Computer Science and
Engineering at the University of Calcutta, India.

REFERENCES
[1] X. Shu, J. Zhang, D. D. Yao, and W. C. Feng, "Fast detection of trans-
formed data leaks," IEEE Trans. Inf. Forensics Security, vol. 11, no. 3,
pp. 528-542, 2016.
[2] S. P. Mohanty, E. Kougianos, and P. Guturu, "SBPG: Secure better
portable graphics for trustworthy media communications in the IoT
(invited paper)," IEEE Access, vol. 6, pp. 5939-5953, Jan. 2018.
[3] IBM Security. (2018, Apr. 16). Cost of data breach study. IBM.
[Online]. Available: http://www-03.ibm.com/security/data-breach
[4] Information Security Forum. (2018, Apr. 13). Threat horizon 2017:
Dangers accelerate. [Online]. Available: https://www.securityforum.org/
research/threat-horizon-2017-dangers-accelerate
[5] M. Bergman, "It's hard to get good (security) help these days," IEEE
Consum. Electron. Mag., vol. 5, no. 3, pp. 132-133, 2016.
[6] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information
hiding-A survey," Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.
[7] D. Solove, "HIPAA turns 10. Analyzing the past, present and future
impact," J. Amer. Health Inform. Manage. Assoc. (AHIMA), vol. 84, no.
4, pp. 22-28, 2013.
[8] A. Ibaida and I. Khalil, "Wavelet based ECG steganography for pro-
tecting patient confidential information in point-of-care systems," IEEE
Trans. Biomed. Eng., vol. 60, no. 12, pp. 3322-3330, 2013.
[9] S. E. Jero, P. Ramu, and R. Swaminathan, "Imperceptibility robust-
ness tradeoff studies for ECG steganography using continuous ant colony
optimization," Expert Syst. Appl., vol. 49, no. C, pp. 123-135, 2016.
[10] R. Ch, "Privacy preservation of ROI of medical image using squint
pixel and PLSB hiding technique," in Proc. 22nd Int. Conf. Virtual Systems & Multimedia (VSMM), 2016, pp. 1-5.
[11] B. Datta, P. Pal, and S. K. Bandyopadhyay "Robust multi-layer
audio steganography," in Proc. 12th IEEE India Conf. (INDICON), 2015,
pp. 1-6.
[12] E. D. Carter. (2016). When outbreaks go global: Migration and
public health in a time of Zika. Migration Policy Institute. [Online].
Available: http://www.migrationpolicy.org/article/when-outbreaks-go-
global-migration-and-public-health-time-zika
[13] J. S. Darr and D. B. Conn, "Importation and transmission of parasit-
ic and other infectious diseases associated with international adoptees
and refugees immigrating into the United States of America," BioMed.
Res. Int., vol. 2015, p. 7, Aug. 2015.
[14] M. Doucleff. (2018, Apr. 20). How dangerous really is Zika for
babies? NPR. [Online]. Available: http://www.scpr.org/news/2016/
12/28/67604/how-dangerous-really-is-zika-for-babies/
[15] Indiamart. (2018, Apr. 19). Indiamart. [Online]. Available: https://
dir.indiamart.com/amritsar/international-visa-service.html
[16] M. M. Mano, "Binary Systems," in Digital Logic and Computer Design, 2nd ed. Englewood Cliffs, NJ: Prentice Hall, 2003, pp.
10-11.
[17] B. Datta, P. Pal, and S. K. Bandyopadhyay, "Multi-bit data hiding in
randomly chosen LSB layers of an audio," in Proc. 15th Int. Conf. Information Technology, 2016, pp. 283-287.
[18] B. A. Forouzan and D. Mukhopadhyay, "Digital Signature," in
Cryptography & Network Security, 2nd ed. New York: McGraw-Hill,
2010, pp. 357-363.

september 2018

^

IEEE Consumer Electronics Magazine

33


http://www-03.ibm.com/security/data-breach https://www.securityforum.org/research/threat-horizon-2017-dangers-accelerate https://www.securityforum.org/research/threat-horizon-2017-dangers-accelerate http://www.migrationpolicy.org/article/when-outbreaks-go-global-migration-and-public-health-time-zika http://www.migrationpolicy.org/article/when-outbreaks-go-global-migration-and-public-health-time-zika http://www.scpr.org/news/2016/12/28/67604/how-dangerous-really-is-zika-for-babies/ http://www.scpr.org/news/2016/12/28/67604/how-dangerous-really-is-zika-for-babies/ https://dir.indiamart.com/amritsar/international-visa-service.html https://dir.indiamart.com/amritsar/international-visa-service.html

Table of Contents for the Digital Edition of IEEE Consumer Electronics Magazine - September 2018

Contents
IEEE Consumer Electronics Magazine - September 2018 - Cover1
IEEE Consumer Electronics Magazine - September 2018 - Cover2
IEEE Consumer Electronics Magazine - September 2018 - Contents
IEEE Consumer Electronics Magazine - September 2018 - 2
IEEE Consumer Electronics Magazine - September 2018 - 3
IEEE Consumer Electronics Magazine - September 2018 - 4
IEEE Consumer Electronics Magazine - September 2018 - 5
IEEE Consumer Electronics Magazine - September 2018 - 6
IEEE Consumer Electronics Magazine - September 2018 - 7
IEEE Consumer Electronics Magazine - September 2018 - 8
IEEE Consumer Electronics Magazine - September 2018 - 9
IEEE Consumer Electronics Magazine - September 2018 - 10
IEEE Consumer Electronics Magazine - September 2018 - 11
IEEE Consumer Electronics Magazine - September 2018 - 12
IEEE Consumer Electronics Magazine - September 2018 - 13
IEEE Consumer Electronics Magazine - September 2018 - 14
IEEE Consumer Electronics Magazine - September 2018 - 15
IEEE Consumer Electronics Magazine - September 2018 - 16
IEEE Consumer Electronics Magazine - September 2018 - 17
IEEE Consumer Electronics Magazine - September 2018 - 18
IEEE Consumer Electronics Magazine - September 2018 - 19
IEEE Consumer Electronics Magazine - September 2018 - 20
IEEE Consumer Electronics Magazine - September 2018 - 21
IEEE Consumer Electronics Magazine - September 2018 - 22
IEEE Consumer Electronics Magazine - September 2018 - 23
IEEE Consumer Electronics Magazine - September 2018 - 24
IEEE Consumer Electronics Magazine - September 2018 - 25
IEEE Consumer Electronics Magazine - September 2018 - 26
IEEE Consumer Electronics Magazine - September 2018 - 27
IEEE Consumer Electronics Magazine - September 2018 - 28
IEEE Consumer Electronics Magazine - September 2018 - 29
IEEE Consumer Electronics Magazine - September 2018 - 30
IEEE Consumer Electronics Magazine - September 2018 - 31
IEEE Consumer Electronics Magazine - September 2018 - 32
IEEE Consumer Electronics Magazine - September 2018 - 33
IEEE Consumer Electronics Magazine - September 2018 - 34
IEEE Consumer Electronics Magazine - September 2018 - 35
IEEE Consumer Electronics Magazine - September 2018 - 36
IEEE Consumer Electronics Magazine - September 2018 - 37
IEEE Consumer Electronics Magazine - September 2018 - 38
IEEE Consumer Electronics Magazine - September 2018 - 39
IEEE Consumer Electronics Magazine - September 2018 - 40
IEEE Consumer Electronics Magazine - September 2018 - 41
IEEE Consumer Electronics Magazine - September 2018 - 42
IEEE Consumer Electronics Magazine - September 2018 - 43
IEEE Consumer Electronics Magazine - September 2018 - 44
IEEE Consumer Electronics Magazine - September 2018 - 45
IEEE Consumer Electronics Magazine - September 2018 - 46
IEEE Consumer Electronics Magazine - September 2018 - 47
IEEE Consumer Electronics Magazine - September 2018 - 48
IEEE Consumer Electronics Magazine - September 2018 - 49
IEEE Consumer Electronics Magazine - September 2018 - 50
IEEE Consumer Electronics Magazine - September 2018 - 51
IEEE Consumer Electronics Magazine - September 2018 - 52
IEEE Consumer Electronics Magazine - September 2018 - 53
IEEE Consumer Electronics Magazine - September 2018 - 54
IEEE Consumer Electronics Magazine - September 2018 - 55
IEEE Consumer Electronics Magazine - September 2018 - 56
IEEE Consumer Electronics Magazine - September 2018 - Cover3
IEEE Consumer Electronics Magazine - September 2018 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20240102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20231112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20221112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20211112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202010
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202009
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202007
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202004
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202003
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202001
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201909
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201907
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201905
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201903
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201901
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201811
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201809
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201807
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201805
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201803
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2015
https://www.nxtbookmedia.com