Securing DNA Profiles Using AES Cryptography: New Approach to Encrypted Biometric Authentication in EHR Systems
DOI:
https://doi.org/10.25195/ijci.v51i2.598Keywords:
AES-256 Encryption; EHR X-ray Embedding; LSB SteganographyForensic DNAAbstract
Electronic Health Records EHRs have revolutionized healthcare by storing patient data in a digital format, increasing accessibility and efficiency. However, the flaws of traditional authentication methods necessitate the development of advanced security solutions. This study presents a novel methodology integrating AES-256 encryption with DNA-based steganography to enhance biometric verification in Electronic Health Records EHRs. The approach involves extracting Short Tandem Repeats STRs and Single Nucleotide Polymorphisms SNPs from DNA profiles, encoding the genetic data into binary format, and securing it with AES-256 encryption to ensure high confidentiality. Encrypted DNA profiles are embedded in MRI images by using the Discrete Cosine Transform DCT, which ensures the concealed data remains both imperceptible and secure against unauthorized alterations, and during the authentication phase, and the encrypted genetic information is extracted, decrypted, and matched with reference samples for verification, the experimental results indicate that the system significantly improves both biometric security and medical data protection, with average processing time of approximately 320 milliseconds, and as it exhibits strong resistance to tampering, achieving has a 99.8% success rate in preventing unauthorized modifications. The embedding method maintains a high level of image quality, reflected by a Peak Signal-to-Noise Ratio PSNR of around 47 dB, confirming that the diagnostic utility of MRI images remains unaffected. This approach effectively combines biometric security with medical data safeguarding, providing a dependable and scalable solution for patient authentication in electronic health record EHR systems.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Iraqi Journal for Computers and Informatics

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
IJCI applies the Creative Commons Attribution (CC BY) license to articles. The author of the submitted paper for publication by IJCI has the CC BY license. Under this Open Access license, the author gives an agreement to any author to reuse the article in whole or part for any purpose, even for commercial purposes. Anyone may copy, distribute, or reuse the content as long as the author and source are properly cited. This facility helps in re-use and ensures that journal content is available for the needs of research.
If the manuscript contains photos, images, figures, tables, audio files, videos, etc., that the author or the co-authors do not own, IJCI will require the author to provide the journal with proof that the owner of that content has given the author written permission to use it, and the owner has approved that the CC BY license being applied to content. IJCI provides a form that the author can use to ask for permission from the owner. If the author does not have owner permission, IJCI will ask the author to remove that content and/or replace it with other content that the author owns or has such permission to use.
Many authors assume that if they previously published a paper through another publisher, they have the right to reuse that content in their PLOS paper, but that is not necessarily the case – it depends on the license that covers the other paper. The author must ascertain the rights he/she has of a specific license (a license that enables the author to use the content). The author must obtain written permission from the publisher to use the content in the IJCI paper. The author should not include any content in her/his IJCI paper without having the right to use it, and always give proper attribution.
The accompanying submitted data should be stated with licensing policies, the policies should not be more restrictive than CC BY.
IJCI has the right to remove photos, captures, images, figures, tables, illustrations, audio, and video files, from a paper before or after publication, if these contents were included in the author's paper without permission from the owner of the content.







