Protection of records and data authentication based on secret shares and watermarking

Zulfiqar Ali, Muhammad Imran*, Sally McClean, Naveed Khan, Muhammad Shoaib

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)


The rapid growth in communication technology facilitates the health industry in many aspects from transmission of sensor's data to real-time diagnosis using cloud-based frameworks. However, the secure transmission of data and its authenticity become a challenging task, especially, for health-related applications. The medical information must be accessible to only the relevant healthcare staff to avoid any unfortunate circumstances for the patient as well as for the healthcare providers. Therefore, a method to protect the identity of a patient and authentication of transmitted data is proposed in this study. The proposed method provides dual protection. First, it encrypts the identity using Shamir's secret sharing scheme without the increase in dimension of the original identity. Second, the identity is watermarked using zero-watermarking to avoid any distortion into the host signal. The experimental results show that the proposed method encrypts, embeds and extracts identities reliably. Moreover, in case of malicious attack, the method distorts the embedded identity which provides a clear indication of fabrication. An automatic disorder detection system using Mel-frequency cepstral coefficients and Gaussian mixture model is also implemented which concludes that malicious attacks greatly impact on the accurate diagnosis of disorders.

Original languageEnglish
Pages (from-to)331-341
Number of pages11
JournalFuture Generation Computer Systems
Early online date29 Mar 2019
Publication statusPublished - 01 Sep 2019
Externally publishedYes

Bibliographical note

Funding Information:
This work was supported by the Deanship of Scientific Research, King Saud University, Riyadh, Saudi Arabia , for funding through the Research Group under Project RG-1439-036 and BTIIC (BT Ireland Innovation Centre), funded by BT and Invest Northern Ireland, UK .

Funding Information:
Zulfiqar Ali has recently joined Ulster University as a Research Fellow under the funded project of British Telecommunications Ireland Innovation Centre (BTIIC). He received his Ph.D. degree in 2017 from Universiti Teknologi Petronas, Malaysia, master’s degree in computational mathematics from the University of the Punjab, Lahore, and another Master’s degree in computer science from the University of Engineering and Technology, Lahore, with the specialization in system engineering. He was a full-time Researcher from 2010 to 2018 with the Digital Speech Processing Group, College of Computer and Information Sciences, King Saud University, Saudi Arabia. He is also a member of the Centre for Intelligent Signal and Imaging Research, Universiti Teknologi Petronas, Malaysia. His current research interests include intelligent systems, IoT frameworks, digital speech processing, medical signal processing, privacy and security in healthcare, and multimedia forensics.

Funding Information:
Muhammad Imran , is working as Associate Professor in the College of Computer and Information Sciences, King Saud University (KSU) since 2011. He worked as a Postdoctoral Associate on joint research projects between KSU and University of Sydney, Australia. He is a Visiting Scientist with Iowa State University, USA His research interest includes mobile ad hoc and sensor networks, WBANs, M2M, IoT, SDN, fault tolerant computing and Security and privacy. He has published number of high quality research papers in refereed international conferences and journals. His research is financially supported by several grants. Recently, European Alliance for Innovation (EAI) has appointed him as a Co-Editor in Chief for EAI Transactions on Pervasive Health and Technology. He also serves as an associate editor for IEEE Access, IEEE Communications Magazine, Wireless Communication and Mobile Computing Journal (SCIE, Wiley), Ad Hoc & Sensor Wireless Networks Journal (SCIE), IET Wireless Sensor Systems, International Journal of Autonomous and Adaptive Communication Systems (Inderscience) and International Journal of Information Technology and Electrical Engineering. He served/serving as a guest editor for IEEE Communications Magazine (SCIE), Computer Networks (SCIE, Elsevier), MDPI Sensors (SCIE), International Journal of Distributed Sensor Networks (SCIE, Hindawi), Journal of Internet Technology (SCIE), and International Journal of Autonomous and Adaptive Communications Systems. He has been involved in more than fifty conferences and workshops in various capacities such as a chair, co-chair and technical program committee member. These include IEEE ICC, Globecom, AINA, LCN, IWCMC, IFIP WWIC and BWCCA. He has received number of awards such as Asia Pacific Advanced Network fellowship.

Publisher Copyright:
© 2019 Elsevier B.V.

Copyright 2019 Elsevier B.V., All rights reserved.

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Protection of records and data authentication based on secret shares and watermarking'. Together they form a unique fingerprint.

Cite this