SVD Based Authentication in Remote Health Monitoring System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 5 Issue 6, June 2016

SVD Based Authentication in Remote Health Monitoring System

Haritha M., Bijin Bodheswaran

Remote health monitoring system is a technology to enable monitoring of patients outside the hospitals (e.g. in the home), which may help to increase access to care and reduce the cost of healthcare. Patient's authentication is a necessary security requirement in remote health monitoring system in order to verify whether the sensors are monitoring the right person or not. In this paper, we present a SVD based authentication in remote health monitoring system in order to determine the claimed identity is true or false. The proposed method employs a cascade of two transforms, the 4 level-discrete wavelet transform and the singular value decomposition (SVD). The major steps includes, the watermark embedding procedure, watermark extraction procedure and the verification procedure. The data to be authenticated is encrypted using SHA-1 algorithm used as the watermark bits which is embedding on the singular values of the DWT sub-bands of the sensor data. The claimed patient is verified by comparing the extracted watermark bits with the hash database at the authentication server.

Keywords: Authentication, Watermarking, Hash, Singular value decomposition, 4-level discrete wavelets transform

Edition: Volume 5 Issue 6, June 2016

Pages: 1476 - 1479

Share this Article

How to Cite this Article?

Haritha M., Bijin Bodheswaran, "SVD Based Authentication in Remote Health Monitoring System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164459, Volume 5 Issue 6, June 2016, 1476 - 1479

101 PDF Views | 86 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1471 - 1476

HMAC Based Secure Authentication of VANETs

Swagat. S. Gudagudi, Dr. Veena Desai

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2018 - 2021

Design and Implementation of Ballot Malfunctioning System Avoidance Security Optimization

A. Lalitha, N. Muthu Sankar

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 638 - 641

Multimodal Biometric Security System with Stegnographic Technique

Prerana Kamble, Sangita Nikumbh

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2744 - 2748

Hand Geometry as a Biometric for Human Identification

Rahul C. Bakshe, Dr. A. M. Patil

Share this Article

Similar Articles with Keyword 'Watermarking'

Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1067 - 1069

A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking

Jagtap. D. V, M. D. Patil

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1419 - 1421

Enhancing the Protection of Digital Images against Tampering Using Joint Source Channel Coding

Sreeja M.S., Ann Nita Netto

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1188 - 1192

Face Obfuscation Based Reversible Watermarking For Lossless Image Compression

Vivek Jaladi, Suhasini Andurey

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1583 - 1586

A Review on Bidimensional Empirical Mode Decomposition

Sinsha P. P., Ranjith Ram A.

Share this Article

Similar Articles with Keyword 'Hash'

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1471 - 1476

HMAC Based Secure Authentication of VANETs

Swagat. S. Gudagudi, Dr. Veena Desai

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1419 - 1421

Enhancing the Protection of Digital Images against Tampering Using Joint Source Channel Coding

Sreeja M.S., Ann Nita Netto

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1493 - 1496

Skein and Threefish Implementation on FPGA

Litty.P.Oommen, Anas A S

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

Case Studies, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1104 - 1106

A Novel Approach for Image Authentication by Robust Hashing Using Zernike Moments and Local Features

Arunkumar Geddalamari, D Basavalingappa

Share this Article

Similar Articles with Keyword 'Singular value decomposition'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1476 - 1479

SVD Based Authentication in Remote Health Monitoring System

Haritha M., Bijin Bodheswaran

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2556 - 2562

Robust and Imperceptible Image Watermarking Using Redundant Discrete Wavelet Transform and Singular Value Decomposition

Neha Sharma, Rasmi Ranjan Samantray

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 4, April 2016

Pages: 884 - 887

Fingerprint Compression using Singular Value Decomposition

Kiran B. Khedkar, Prof. A. S. Deshpande

Share this Article

Research Paper, Electronics & Communication Engineering, China, Volume 5 Issue 9, September 2016

Pages: 1196 - 1200

Medical Image Compression by Using Discrete Haar Wavelet Transform

Abasi Julius

Share this Article

Survey Paper, Electronics & Communication Engineering, India, Volume 6 Issue 3, March 2017

Pages: 765 - 769

A Survey of Substantial Digital Image Watermarking Techniques

Neha Sharma, Rasmiranjan Samantray

Share this Article
Top