International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 5 Issue 6, June 2016


SVD Based Authentication in Remote Health Monitoring System

Haritha M. | Bijin Bodheswaran [2]


Abstract: Remote health monitoring system is a technology to enable monitoring of patients outside the hospitals (e. g. in the home), which may help to increase access to care and reduce the cost of healthcare. Patient's authentication is a necessary security requirement in remote health monitoring system in order to verify whether the sensors are monitoring the right person or not. In this paper, we present a SVD based authentication in remote health monitoring system in order to determine the claimed identity is true or false. The proposed method employs a cascade of two transforms, the 4 level-discrete wavelet transform and the singular value decomposition (SVD). The major steps includes, the watermark embedding procedure, watermark extraction procedure and the verification procedure. The data to be authenticated is encrypted using SHA-1 algorithm used as the watermark bits which is embedding on the singular values of the DWT sub-bands of the sensor data. The claimed patient is verified by comparing the extracted watermark bits with the hash database at the authentication server.


Keywords: Authentication, Watermarking, Hash, Singular value decomposition, 4-level discrete wavelets transform


Edition: Volume 5 Issue 6, June 2016,


Pages: 1476 - 1479


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Haritha M., Bijin Bodheswaran, "SVD Based Authentication in Remote Health Monitoring System", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 1476-1479, https://www.ijsr.net/get_abstract.php?paper_id=NOV164459

Similar Articles with Keyword 'Authentication'

Downloads: 88

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1471 - 1476

HMAC Based Secure Authentication of VANETs

Swagat. S. Gudagudi | Dr. Veena Desai

Share this Article

Downloads: 101

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade | Dimple Chaudhari [2]

Share this Article
Top