key: cord-0937892-d3nttl62 authors: Dey, Joydeep; Bhowmik, Anirban; Karforma, Sunil title: Neural perceptron & strict lossless secret sharing oriented cryptographic science: fostering patients’ security in the “new normal” COVID-19 E-Health date: 2022-03-07 journal: Multimed Tools Appl DOI: 10.1007/s11042-022-12440-y sha: 08728c01b3bfd7e547b2b762bf57de6bfb326965 doc_id: 937892 cord_uid: d3nttl62 Patients’ data security is an open challenge on any telemedicine system. The challenge has been extended enough in this unprecedented corona virus led pandemic. COVID-19 has brought abrupt adaptations in medical sciences. To reduce corona virus transmission, quarantine yourself and opting for online services is mostly apt even during “New Normal” second wave of COVID-19. The emergence of telemedicine is a significant contribution in the medical sciences. Relevant online security and challenges are the contemporary and relevant challenges in COVID-19 E-Health. The objective of this proposed technique is to reinforce the technical safeguards to the electronic health system against the tricksters. Perceptron based session key and modified logistic map based intermediate key were proposed. A strict lossless secret sharing has been proposed to protect patients’ clinical reports and data. Participation of all the recipients is bare essential in regenerating the original report. Simple mathematical operations were carried out to develop the secret shares. Electing the head of the recipients has also been included here. Different secret shares were encapsulated with the proposed frame structure. The chaotic sequences in the ranges of r = [0.41,0.53], r = [0.61, 0.66], and r = [0.91, 0.99] on the initial values x = 3.64, 3.81, and 3.88 respectively were noted under this technique test. An appropriate correlation between the proposed encryption and cryptographic time, and proposed decryption and cryptographic time were found. Such values were r(ec)= 0.989929 and r(dc)= 0.988828 respectively. Myriad mathematical tests likes of statistical randomization, brute force, graphical analysis, performance time, etc. were carried on the proposed technique. Their results have proved our efficacy in fostering the patients’ data transmission in “New Normal” COVID-19 E-Health. Medical care might be characterized as the demonstration of taking protection or important techniques to improve an individual's prosperity. This might be finished with a medical procedure, medication, or different adjustments in an individual's way of life. These administrations are ordinarily given by doctors through a medical care framework. At the point of COVID-19, when these are administered through Internet empowered hubs in the form of E-Health [1, 51] . Subsequently, patients experiencing non-obtrusive and non-emergency infections might be dealt with distantly. The requirements of social separation, lockdown limitations, night check-in-time, should be kept up by the mass individuals to endeavor against this destructive Corona virus disease. Co-morbid patients are at higher dangers of COVID-19 due to their severe degree of illness. However, through COVID-19 E-Health, such patients can be prudently treated from their protected far off areas at any ounces of time. Additionally, nascomial diseases can be made to invalid and void to such co-morbid remote patients [31, 43] . Because of this novel corona virus, hospitals have migrated towards a "New Normal" of life. Once again the second wave of COVID-19 is hitting different places of the world. In many countries, re-lockdown has been imposed to reduce its transmission effect. Clinics and hospitals have moved from actual meeting modes to virtual conference modes. Patients are urged more to practice the office of virtual counsels with their suitable doctors. Physicians, medical attendants, patients, medical care staffs, and so forth are then less presented to COVID-19 under the umbrella of E-Health. During this pandemic, the latest things in medical services industry are the digitization of medical services frameworks. Their work process has been relocated towards electronic patient records. An electronic record of a patient includes patient's clinical history like socio-economic health cards, patients' progress notes, issues and complications, digital prescriptions, past clinical and hospital history, vaccines (perhaps COVISHIELD, Covaxin [53] , and so on), research oriented information and radiology reports and so forth. The volume of such clinical information has increased in enormous rate regarding intricacy, variety and flow directions basically during this hyper computerized E-Health of corona virus. Henceforth, information security support is the greatest hindrance observed. A COVID-19 E-Health is treated as great as it protects the patients' medical information during the public transmission. This paper has proposed a cryptographic system to risen the degrees of information security through neural key generation and secret sharing idea. Amid COVID-19, E-Health has become a boon in the medical sciences. Apart from invasive and surgery, other formats of treatments are possible through such COVID-19 telemedicine [38, 48] . E-Health best serves the chronic disease management from quarantines likes of bronchial infection, diabetes, hypertension, arthritis, etc. Patients can be treated without getting further exposed to COVID-19. It can provide psychological boosts to the patients and their family in a safe manner without corona virus transmission. It releases the offline patients' pressure on the district hospitals to a large extent. Thus, larger percentage of patients are being locally treated without the chances of nascomial infections and save of time and costs. But the psychological impact of actual visiting the doctors is not possible through telemedicine. Corona virus infection control is highly achievable through telemedicine which is mandate now. However, data theft on digital transactions is an issue of critical challenge. In the context of global pandemic, psychological downfall is the common complication apart from the physiological complications. There had been huge economic loss incurred in almost everyone's life. Patients are more psychologically sick in such critical era. Even patients can boost other patients through the digital health system. The different types of E-Health systems were improved by using developed mobile computing and Internet of Things (IoT) [18, 28] . The key feature of such system is that the patients can get their treatment from the health care providers directly from their homes. Patients can communicate with each other that have the same symptoms. They also may form a group for exchanging their illness-related information, treatment experience, diets, medicines and specialist doctor recommendation. Besides, patients may communicate to encourage each other to overcome the disease, regardless of the patients' locations and conditions. Sometimes, self-confidence and friendly environment are more effective than drugs in patients' conditions. Such can boost the confidence levels of the patients. Internet of Things (IoT) can be defined as a set of networking technologies that consist of different appliances, devices and electronic gadgets to interact and communicate among themselves. At present different healthcare systems widely use the IoT devices for smooth functioning, monitoring and assessment of patient's conditions and records. PMD (Personal Medical Devices) are small electronic devices used for monitoring the medical condition of a patient. These Personal Medical Devices (PMDs) are of two types according to its location internal (i.e. inside the patient's body) or external (i.e. attached to the patients' body externally). PMDs use a wireless interface to perform communication with a base station that is further used to read status of the device, medical reports, and change parameters of the device, or update status on the device. Unfortunately, the most of these devices and applications are not secure for data or information communication. IoT may be prone to different types of unwanted attacks. The IoT devices are targeted by attackers and intruders. Different types of risks are incurred for such compromised patients. Every health care system should ensure the security of network in order to prevent the privacy of patient from unwanted malicious attacks. To strengthen the sensitive information and other types of security, a proactive, preventive approach and measures must be taken by every healthcare organization with attention to future security and privacy needs. Security is a most important issue in any healthcare system. The attackers aim is to steal the information, attack on devices to utilize patient's resources, or may shut down some applications that are monitoring the patient's condition. There are many types of attacks on medical devices that include eavesdropping and intruding, in which privacy of the patient is leaked and the integrity error in which the message is being altered. The IoT based health care system provides huge benefits in society but it is also prone to different types of unwanted attacks. These types of attacks mainly cause information leakage and loss of services in communication channel. The IoT consists of different types of devices and platforms with different credentials and each device and platforms need security according to their characteristics. In IoT platform, lot of personal medical information is shared among various types of devices so the privacy of user is a vital part in health care system. Hence a secure cryptosystem is needed for the data or information protection. The different types of IoT attacks are physical attack, network attack, software attack, and encryption attack. In our paper we have emphasized only on encryption attacks such as side channel attacks, cryptanalysis attacks, and man in the middle attacks. The different algorithms in our cryptosystem which are described above provide strong protection mechanism of different encryption attack [37] . The result section of our study proves the robustness of the proposed cryptosystem by using different data, graphs, comparisons etc. This proposed algorithm works on application model. Here, different types of complex and strong mathematical functions were used and as a result the algorithms when running provides minimum side channel information so that attacker cannot guess the session key. Our scheme also provides confidentiality and integrity by checking authentication at the patient and doctor end. Cryptographic science is a branch of science that deals with message protection, so that it becomes unreadable by the others, and can be shared in public communication. Different types of encryption and decryption algorithm are invented at regular basis with updated features. Here the plain text is converted into cipher text using an encryption algorithm so that intruders cannot read it, but authorized user i.e. correct recipient can only access it. The decryption algorithm works in the reverse order and converts the cipher text into plain text. Two broad categories of cryptography are: symmetric key cryptography and asymmetric key cryptography with respect to key [49] . To ensure data security any one of these two category algorithm will be used. This paper focuses on symmetric key cryptography. Some of existing symmetric key cryptography methods are IDEA, AES, DES, Triple DES, Blowfish, RC5, RC6, etc. [2, 50] . Symmetry key is the value that is used to combine with original data to generate cipher text. It is independent of the original data. Session key is a unique code that is used at the encryption and decryption process in a data communication session [36] . The compliance of such key usage is immense on any online cryptographic system. Once the data decoding are constrained by session key, then different cryptanalytic intruders' task becomes more complicated [24, 35] . Secure online transaction systems use One Time Password (OTP) based session key to foster their security features and services. Thus, such systems are better to resist against vulnerable data threats. In COVID-19 E-Health, the session key is very much needful to have online medical transaction by the patients and the doctors. Secret sharing is another type of cryptography. Here the entire message is dismantled into multiple pieces termed as shares. No share contains the complete information of the actual file. These shares would be transmitted to different number of receivers. In Shamir's Secret Sharing Scheme is based on (n, k) threshold. Here, n is the number of receivers and k is the number of threshold value [47] . In their scheme, a (k − 1) degree polynomial is needed. The polynomial of order (k − 1) is given in the following Eq. 1. Here, p 0 the secret message to be encrypted and Num is a prime number and all other coefficients were selected randomly from secret message. Chaotic methods have recently used more in the process of encryption. Chaos based frameworks [26, 39] are fundamentally nonlinear in nature and showing an obviously arbitrary conduct for specific scopes of estimations of system boundaries. There are certain numbers of proper reasons to deploy chaotic sequence in the cryptographic engineering. Such may be listed as: controlling parameter, initial condition sensitivity test, non-convergence property, etc. [16, 30, 55] . In any case, the arrangements or directions of the framework stay limited inside the stage space. This insecure state is unequivocally relying upon the estimations of the boundaries and in transit the framework starts. The logistic map guide [2] is a notable one dimensional chaotic map proposed by R.M. May, addressing a romanticized natural model for portraying yearly variety in the number of inhabitants in a creepy crawly species. The numerical recipe is characterized as given in the following Eq. 2. Here, ∝∈[0,4] is the control boundary and y_0∈[0,1] is the underlying condition [56] . The strategic guide shows acceptable conduct and is often utilized in numerous applications for its tumultuous nature in explicit reach. The hopf bifurcation graph shows the dynamical properties of the strategic guide. The strategic guide shows chaotic nature for ∝∈ [3.57, 4 .0] and slight varieties of the underlying worth produce significant contrasts in the created arbitrary qualities. This grouping of qualities is non-intermittent in nature. This logistic map is based on chaos theory. Any chaotic function provides random numbers in a specific range. This random numbers can be used in any purposes such as key generation, weight vector generation in ANN etc. In this article we have used this map in key generation process. Pell's equation is a Diophantine equation of the form a 2 − Kb 2 = ± 1, a,b ∈ Z, where K is a given natural non-square number [24] . It can be found in the following lemma number 1. Lemma Number 1: For every non-square positive integer K, there are infinite positive integers a and b: such that a− ffiffiffi ffi For every positive non-square integer K, the equation of the type a 2 − Kb 2 = 1 has a nontrivial solution. Here we have considered the integer solutions of Pell's equation. The two integers for a particular K provide a set of numbers for two or more number of K ' s, which is used for encryption generation in this proposed technique. A neural perceptron can be viewed as a combination of logical statements to generate an output. Generally, it contains input layer, hidden layer, and output layer. The aim of such neural network is to classify the features from the input signals [3, 15] . A simple perceptron has been shown in the following Fig. 1 . This segment reviews the prior works on COVID-19 E-Health on the field of cryptographic science. Keesara S. et al. [34] had proposed to bring telehealth revolution because of COVID-19 in consistence with the patients' law and security rules. Bindra V. et al. [9] had recommended that pregnant ladies and females can be treated distantly through the telemedicine in COVID- 19 [48] had recalled the significance of telemedicine in the corona virus pandemic by reducing the contact contaminations. They had highlighted the key features needed to make telemedicine into mainstreamed services. It includes strategies to handle acute emergency situations apart from daily services. Making it into proactive mode will generate higher profits to the hospitals in the longer run. Borchert A. et al. [14] had evaluated the risks involved in urology patient consultation. They had evaluated the benefit of triage based consultations to the urologists during a specific COVID-19 time. Christianson J. et al. [17] have studied different obile telemedicine applications and observed that it is safe, reliable, efficient and scalable mode of treating the patients distantly. Such systems help the doctors and patients to reduce the transmission of novel corona virus. Bokolo Anthony Jnr. [11] had provided guidance on the use of telemedicine in this corona virus pandemic. With the emergence of COVID-19, hospitals have shifted more towards telemedicine with low cost treatments. Doctors are finding it as a suitable way to treat the patients in a safer way without any physical contacts. Gillman-Wells et al. [27] had explained the relevance of telemedicine in the context of COVID-19. Doctors have realized the only option to see the patients is through virtual consultations. They had discussed the advantages and next routes to the executed for the greater interests of the patients. Reyad O. et al. [42] had proposed a secured technique of transmission of COVID-19 CT chest images of patients inside real world of transmission. Safe pseudo-random generation codes were used by them in this regard. Statistically they had proved their efficacy of the proposed technique. Boneh D. et al. [12] had provided a comprehensive study on security issues in IoT networks in their work. Various security requirements such as authentication, integrity, confidentiality were discussed in this paper. This paper provides a comparison among different types of attacks, their behavior, and their threat level. These attacks are categorized into four level which are low-level, medium-level, high-level, and extremely high-level attacks and also suggested possible solutions to encounter these attacks. Joshi C. et al. [32] had surveyed various types of healthcare applications based on wireless medical sensor network (WMSN). IoT environment is suitable to implement these applications. Also, the different types of hybrid security techniques were discussed for handling the security issues of healthcare systems. Yen J. C. et al. [56] had proposed an idea on encryption method called BRIE based on chaotic logistic map. The bit recirculation of pixels is the basic principle of BRIE. It is controlled by a chaotic pseudo random binary sequence. The secret key of BRIE consists of two integers and an initial condition of the logistic map. Further, Yen J. C. et al. [56] had proposed an encryption method called CKBA (Chaotic Key Based Algorithm) in which a binary sequence was generated using a chaotic system.]. Kinzel et al. [33] had proposed a protocol to exchange a cryptographic key between the sender and the receiver by learning rules, which was earlier proposed by Diffie and Hellman 1976. Each neural network was fed with same random vector, and they were trained to synchronize their weight vectors. Youssef Harmouch [29] proposed two chaotic pseudorandom number generators CPRNG for key stream. Two CPRNGs showed a good degree of randomization based on NIST statistical test suites, quasi-ideal entropy, good key stream distribution, and good sensitivity to initial conditions, indicating resistance to differential attacks. In this sub-section, we have presented the advantages and disadvantages of the existing techniques. This has been mentioned in the following Table 1 . Amid COVID-19, patients' credentials are at higher risks. Due to the high spread of the novel corona disease, patients are not allowed to visit the hospitals physically. With lockdown constraints in different cities, co-morbid patients are also treated distantly. The following points will highlight the critical issues observed during COVID-19 E-Health [1] . 1. COVID-19 E-Health is questionable whenever any data provided by the users is misinterpreted by the fraudsters [33] . 2. Maintaining the privacy of the patients in the E-Health is the key for global acceptance by the medical professionals and patients. Such confidentiality guidelines must be accommodated. In the next phase, we will incorporate a strong authentication protocol with this technique. 3. Training the technical support teams is another key aspect in fostering the COVID telemedicine. 4. For any successful COVID-19 E-Health, following parameters are bare essential. They are: Patients' security, Internet enabled machines, telemedicine Hub, software developments and maintenance [29] . 5. E-Health services need extra digital transmission cost for medical transactions [25] . Telemedicine is the emergent technique to covert traditional health is to online health care in this deadly OVID-19 phase. There are different types of more challenges that could exist in COVID-19 E-Health system. Different types of attacks or malicious activity may degrade activity of the medical devices and disrupt the communication system of telemedicine. There are two types of attacks namely Active Attack and Passive Attack. An active attack attempts to alter system resources or affect their operation. A passive attack does not affect system resources but attempts to theft vital information from the system. An attack can be occurred by an insider or from outside of the E-Health organization. Based on the target of the attack, there are mainly three types of attacks are noted in COVID-19 E-Health. a) Attacks against any medical devices related to COVID-19 samples, b) Attacks against the communication between devices and users of E-Health, and c) Attacks against all the users simultaneously. A common method of attack involves tampering or altering of the messages is the common method of attack. The medical data and information which are transmitted through online environment is very sensitive and vital for treatment. So any changes on these data or information causes risk for the patients. The main objective is to foster the patients' privacy especially during the corona virus pandemic. Such proposed E-Health system will avoiding unnecessary allied costs and time, and provide proper health support and facilities from isolated centers. From the above stated section of critical issues, it has been vividly significant that the security fostering to the COVID-19 E-Health system is an immediate mandate. The patients' confidential data are under threat of intruding in the overwhelmed online medical transactions. In this article a new cryptographic system has been proposed with the following things as novel contributions. Artificial neural network has been used to generate the session key. Based on modified logistic map, an intermediate key has been proposed. Our proposed modified logistic map can be found in the following Eq. 3. Here, R is the control parameter with R∈[0.01, 4.31] and x 0 is the initial condition with x 0 ∈ [0.01, 1.302]. Chaotic graphs has been discussed in the later section. Strict lossless secret sharing has been proposed on the patients' data. The property of no data loss satisfied the proposed secret sharing. Electing the head among the multiple receivers has been done here too. An encryption along with share encapsulation has been done on all the secret shares. The following Fig. 2 illustrates the flow of the proposed cryptographic technique in COVID-19 telemedicine. In brief, the above stated diagram may be discussed as follows. In the first step of neural perceptron, the key length will be inputted and corresponding session key will be formed. Next step is the intermediate key generation. Here, a random number will act as input, and an intermediate key will be generated through modified logistic map. In the next phase of lossless secret sharing, the number of recipients will be taken as input field, and corresponding equivalent number of secret shares will be created through our proposed technique. The election of the polling head module will elect a recipient as head. Here, the arrival times of each recipient will be considered as its input. The next step is the encryption and decryption. Here, the session key, intermediate key, and the plain message are considered as inputs. The output is the cipher text of the plain text. The final step of the proposed model is the share encapsulation. The inputs are session key, intermediate key, and plain text for this phase and the output are structured encapsulated shares through our technique. To cope up the security issues on the contemporary COVID-19, cryptographic science is the best plan to have more reliable data security in the light of patients' private medical data. In this article, a scientific cryptographic approach has been proposed by a hybrid combination of neural networks and secret sharing. It may work against myriad security codes during "New This protocol is described below by a compact algorithm with modular effects in the following algorithm 1. Two proposed set of keys were generated named as session key and intermediate key. First key has been derived by the neural perceptron and the later has been developed by modifying the chaotic map [4] . An impact of secret sharing has been proposed on the patients' data and that too having much less time complexity with respect to classical secret sharing schemes. Electing the head of the recipients has also been proposed here. Encapsulations of secret shares have been proposed on K number of recipients. Here weight vectors (Weight Next ) are required session key which is used in encryption decryption process. The above algorithm provides the values for intermediate key generation. The logistic map is based on chaos theory. So using logistic map we have generated random numbers key formation. In above Step2 x n + 1 provides the required intermediate key. The above algorithms were implemented in latest version of Python in a PC of Intel Core i9 (tenth generation) processor, operating system of Microsoft Windows 10 × 64, 16GB RAM and 2 TB internal secondary storage. In the following sections, simulated results of the proposed cryptographic technique have been illustrated. In the proposed cryptographic technique, we have successfully modified the logistic map to generate the intermediate key. Three chaotic observations were noted in the three set of data set. Firstly, 0.41 ≤ x ≤ 0.53 with constant r = 3.64. Secondly, 0.61 ≤ x ≤ 0.66 with constant r = 3.81. Thirdly, 0.91 ≤ x ≤ 0.99 with constant r = 3.88. The following Fig. 3 indicates the efficacy of the proposed scheme by comparing between the logistic map and modified logistic map. For a given initial condition, the future state can be predicted from a deterministic finite system. While in chaotic system, long term prediction of nature of trajectories cannot be judged with accuracy. For specific values of parameters, two trajectories, which are initially very close, diverge exponentially in a short time. Here initial information about the system is completely lost. Our proposed modified logistic map to generate the intermediate key can be seen in the above stated Eq. 3. From the above Fig. 3 it is seen that our modified logistic map shows better chaotic nature than standard logistic map within the range. A small change in initial condition with fixed control parameter shows major difference in results as well as graphs. The following Table 2 contains the sample set of intermediate keys (in hexadecimal) obtained through modified logistic map. In this paper, we have simulated neural perceptron to generate the session key. Different architectural perceptron were designed for obtaining different session keys for multiple COVID-19 E-Health transactions [13] . It is also stated that the architecture of the perceptron is made open to the public. The working principle of the perceptron can be found in the following Eq. 4. If hl ≤0:5 ð Þthen Since the input vectors are kept secret, so the exact pattern of the session key may not be decoded by the tricksters while using super computers. Different data set obtained can be found in the following Table 3 (in hexadecimal). Tables 2 and 3 were tested under NIST suite. The p values observed were categorically noted in the following tables. Only first ten tests noted in the Table 4 were considered under proposed technique. In the following Table 5 , the robustness of the intermediates keys were noted. All such keys as mentioned in the Table 2 have been fed into NIST suite. The noted p values and the output will be shown in the following Table 5 . The session keys that have been generated through the neural perceptron have been put into the statistical NIST package. The efficacy of those keys in the light of robustness can be summarized in the following Table 6 . The average p-values of the proposed intermediate keys, and three set of session key were plotted in the following Fig. 4 . The Tables 4 and 5 contain the p values. Average was made and then plotted to have the desired efficacy of the proposed COVID-19 E-Health. In this sub section, histogram analysis has been carried out on the proposed COVID-19 cryptographic technique. Histogram indicates the frequency of different of characters present in the plain text. There has been a comparative graph between the pre-encryption and postencryption of the plain text using our proposed technique. Furthermore, it was done on individual shares generated by the proposed technique. The post-encryption graphs resulted from individual shares were more variant than pre-encryption shares. Those could be found in the following Table 7 . Tricksters will not be able to trace any linkage from the encrypted secret shares when compromised in the middle [22, 44] . In fact, the chances of malicious attacks on the patients' data are higher. In the following Table 7 , histogram comparison has been made. The histograms were generated on the pre-encryption and post-encryption on the same shares. From the above histograms, there could be significant changes on the shares during the oreencryption and post-encryption phase. It strongly boosts the proposed methodology. Floating frequency means the counting of similar types of characters available in the plain text. The proposed technique has been tested through the floating frequency analysis. In the following Table 8 , comparison graphs have been plotted. The graphs obtained during postencryption on the partial shares have better performance than the pre-encryption graphs. From the above floating frequencies, there could be huge changes on the offers during the pre-encryption and post-encryption stage. It emphatically supports the proposed philosophy of COVID-19 telemedicine. Entropy is the act of randomness nature that is used for information hiding from the outsiders and intruders. Since a message can contain any character between 0 and 255. So the highest entropy is 8. Low entropy denotes lower security to the encryption system. In the following Table 9 , entropy values were noted on different secret shares of the plain text. Let there will be n! Possible permutation types according to embedding dimension n. The relative frequency p (π i ) is determined for each π i , for 1≤ ≤ !, according to the following equation: The permutation H(n) is then calculated as follows: H n ð Þ ¼ − ∑ n! i p π i ð Þlog p (π i ). Where 0≤H(n) ≤ log(n!). Here 0 indicates a series that is monotonically increasing or decreasing and log n! Indicates a completely random series. When experiment occur, H(n) is rescaled by dividing by log n!, thus normalizing H(n) to return values between 0 and 1 with 0 indicating highly regular data and 1 indicating maximal entropy. The efficacy of the proposed COVID-19 E-Health can be found in the following Table 9 in this regard. The above stated Table 8 contains the Partial Share ID, Entropy pre-encryption, and Entropy post -encryption by our technique. This analysis shows the efficiency of our scheme in e-health sector. The proposed technique deals with a novel secret sharing method. In the group sharing of m number of users, any t number of recipients can be taken for secret sharing. Obviously, the value of t should be always less or equals to m. A snapshot which contains a set of ten recipients and only five recipients have been selected as recipients [7] . Thus, the threshold value is five. As per our proposed scheme of mask generation, a unit matrix of the order 5x5 was selected and shuffled at threshold iterations, which can be found in the following Fig. 5 . From the above Fig. 5 , considering each column at a time, the proposed shares can be derived. This is listed in the following Table 10 . We have assumed a plain text of arbitrary length as MSG = "A7BC1DE3FH2G", session key, SK = "BC4GE8RD", and intermediate key, IK= "BF67$gAeS". Then, after doing bitwise XOR operation between the message, MSG and the session key, SK, the following cipher text has been found. Cipher text, CT = "dF239R1CS5qb" Using the proposed scheme of share generation, the following shares were derived which can be found in the following Fig. 6 . This proves as the novelty of the proposed cryptographic scheme for COVID-19. The novelty of the proposed cryptographic technique is that it ensures strict lossless mask generation. During the global unprecedented COVID-19 uncertainty era, E-Health plays an inevitable role in treating the patients. When a patient's data is broken into t number of secret shares then t numbers of threshold shares are mandatory to reform the patient's data. In addition there could be more users who are not being appointed as recipients to act in the group sharing. In our proposed sharing technique, no data loss has been observed during medical transactions [21] . Strict lossless may be found in the following eqs. 5 and 6 respectively. Strict Lossless Sharing: it is the condition of strict lossless. Lossy Sharing: On varying the number of recipients in the COVID-19 E-Health, the following Table 11 will depict the possible combinations of shares and strict lossless combination value to regenerate the patient's private reports. From the above Fig. 4 , it is quite true that all partial shares will be mandatory in the process of regeneration of data. Since all the shares are necessary to regenerate the text and whole the unit matrix takes part in share generation so from the eq. 5, it is clear that at the time decryption no information will loss that is lossless combination. The brute force attack can be handled efficiently by tricking the proposed key space. The tricksters will perform operation to decode session key on the cipher text by using latest super computers. Cryptographic algorithms are made available to the public. In this technique too, the codes are open to all. The latest super computer is Japan's Fugaku with performance speed of 415.53 petaflops i. e. 415.53x10 15 floating point operations. Each trial requires one thousand floating operations to complete a single round. The number of trials thus can be completed is: 415.53x10 12 per second. The amount of available seconds in a year is 31,53,600 sec. In the following Table 12 , different session key lengths were consider under the proposed technique, and their corresponding time needed has been calculated under Brute-Force attack using the following eq. 7. Here, T (L, K) is the time needed in Brute-Force, L and K represent the length of the session key and intermediate Key respectively. Upon various lengths of the proposed key, the following Table 12 will show the time needed to decipher the original patients' data. Cryptographic algorithms are public and the secret key is hidden, this key is used for encryption. Intruders present silently on the network, will test several set of keys to decrypt the cipher text. In the TMCS, attackers try to decrypt the ECG signal components based on some heuristic keys. Length of the key size is proportionate to the complexity to resist against the chosen plain signal attacks. It is a tool to break image encryption under chaotic sequence [6] . The proposed bio-key and harmony search based encryption algorithm is robust to such chosen plain signal attack. It proves the resistant by the proposed technique against the chosen plain signal attack in the Telecare Medical Communication System. Clinical transmission of the signals is obvious to compromise with certain percent of bits. The tolerance level of clinical signal has been estimated here against the occlusion attack [40] . Bits lost with greater than 5% is not suited in this context. Randomly, 210, 360, and 490 elements were selected. The Mean Squared Error (MSE) of recovered signal elements is mentioned in the following Table 13 . With the proposed cryptographic scheme on COVID-19 E-Health, the transmission of patients' related clinical reports, documents and prescriptions can be made online to the respective physicians in quick time. The cryptographic duration is a measuring index towards the efficiency of the proposed scheme. Time needed to encrypt the data at the patients' terminal and time required to decrypt by the doctors are both to be summed to get the cryptographic time [46] . The following Table 14 displays the average cryptographic duration on the proposed set of session keys. The above cited Table 14 will have the following table headers Lower range time complexity is always desirable in any E-Health system. Amid corona virus, excessive digitization of medical records have been adopted by all the hospitals. Such E-Health system will acquire lower time complexity in its internal architecture to have its global acceptance. In the following Table 15 , the internal modules' complexity has been stated. This section deals with the comparison statements over existing techniques. It has been mentioned in the following three sub-sections. In this present section, comparative statement was made to prove our efficacy. The proposed cryptographic method has been compared with existing techniques [8, 45] based different types of attributes. The following Table 16 will show the comparisons with respect to different testing parameters. From the above presented Table 16 , the performance of the proposed technique can be accepted when compared against the classical techniques. This proves our efficacy. Here we have discussed about the measurement of our proposed secret sharing technique with respect to other existing techniques [6, 40] . We have compared with respect to different attributes in the following Table 17 . Future Scope of work. By avoiding suspicious web-sites, files, and documents [26] . May be achieved. Using the preventive precautions [12] . May be achieved. Guided Attacks on Medical data Routing attack is possible here [39] . May resist routing attack. Malicious Codes attack may happen here. May resist against the malicious codes. Side Channel Information attack is feasible here [49] . May resist different side-channel attacks. In this sub-section, we have made a comparative table based on the application model. The following Table 18 shows the comparative analyses related to data attacks to the system. It also proves the efficiency of our proposed scheme with respect to different layers of application model. We had compared three types of attacks with the parameters such as damage level on patients' medical data, existing proposal and detection schemes, and their corresponding vulnerability in E-Health. Any type of vulnerable attack may can reverse the patients' data, drop the medical transaction packets, and decode the clinical reports and retrieval of the session key. The following Table 18 will display the efficacy of our proposed system with respect to different types of attacks. There are various sorts of difficulties in medical services framework at present time. Hospitals have shown adaptabilities to upgrade and improve medical care capacities through digitization in this pandemic. It can help preventive consideration and encourage collective medical services to serve the patients from distant locations. It is a "New Normal" way to treat the non-invasive patients in larger perspectives, when second wave of corona virus is affecting us a lot. An essential methodology is the patients' data security and confidentiality through online transmission [6, 20, 23, 40] . In this paper, a cryptographic system was proposed to foster the essential patients' security where an encryption procedure is on the neural session key. Neural perceptron has been used to generate such session keys. Distinctive test results and its analysis, comparative studies demonstrate the efficacy and effectiveness of the proposed technique. Thus our proposed scheme is valid for secure telecommunication of COVID-19 E-Health. Strict lossless secret sharing of data has been incorporated here intelligently. Relative investigations among proposed secret shares and standard procedures, comprehensive key robustness, graphical charts show the agreeableness of our proposed method. On comparing at the application model, this proposed technique addresses the vital issues on the security frisks. To the most amazing aspect our insight our proposed strategy is the least complex one having insignificant computational overhead during encryption and decryption phase. It has been observed an appropriate correlation between the proposed encryption and cryptographic time, and proposed decryption and cryptographic time. These two evaluated values were r ec = 0.989929 and r dc = 0.988828 respectively. Moreover, the internal modules' time complexity has been measured and found to be significantly lower. Telemedicine in India: a tool for transforming health care in the era of COVID-19 pandemic Functional encryption: new perspectives and lower bounds Statistical modelling of artificial neural networks using the multi-layer perceptron Telemedicine technology: a review of services, equipment, and other aspects Linear feedback shift register and integer theory: a state-of-art approach in security issues over e-commerce Computational intelligence based lossless regeneration (CILR) of blocked gingivitis intraoral image transportation A Way of Safeguard using Concept of Recurrence Relation and Fuzzy logic against Security Breach in Wireless Communication Recurrence relation and DNA sequence: A state-of-art technique for secret sharing Telemedicine for Women's health during COVID-19 pandemic in India: a short commentary and important practice points for obstetricians and Gynaecologists Graph decompositions and secret sharing schemes Use of telemedicine and virtual care for remote treatment in response to COVID-19 pandemic Identity-based encryption from the Weil pairing Primary care telehealth practice Managing urology consultations during COVID-19 pandemic: application of a structured care pathway Application of a Perceptron Artificial Neural Network for Building the Stability of a Mining Process An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism White paper: using telehealth in the emergency department to minimize risk to health care providers and conserve resources during the COVID-19 response Telemedicine and COVID-19: 6 tips to ace your first visit Public-key cryptography: theory and practice Telecardiological COVID-19 (2nd) Wave: Metaheuristic-Key Guides Protected Encryption of Heterogeneous Cardiac Reports Metaheuristic guided secured transmission of Eprescription of dental disease Newer post-COVID perspective: Teledental encryption by demultiplexed perceptrons Secured Telepsychiatry for Geriatric Patients (TGP) in the Face of COVID-19 II nd Wave A fingerprint based crypto-biometric system for secure communication Interactive telemedicine: effects on professional practice and health care outcomes Network Security: Attacks, Tools and Techniques COVID-19 reducing the risks: telemedicine is the new norm for surgical consultations and communications Telemedicine in a post-COVID world: how eConsults can be used to augment an allergy practice Harmouch Y A chaotic key stream generation for stream cipher An efficient self-adaptive model for chaotic image encryption algorithm Covid-19: risk factors for severe disease and death A review on taxonomies of attacks and vulnerability in computer and network system Secure exchange of information by synchronization of neural networks Covid-19 and health care's digital revolution Robust symmetric cryptography using plaintext variant session key An ultra robust session key based image cryptography Ontology based public healthcare system in internet of things (IoT) Telemedicine in the COVID-19 era: the new normal New security architecture for IoT network Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files On the security of the threshold scheme based on the Chinese remainder theorem Secure CT-image encryption for COVID-19 infections using HBBS-based multiple key-streams Transmission of 2019-nCoV infection from an asymptomatic contact in Germany A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST special publication Secured Session Key-Based E-Health: Biometric Blended with Salp Swarm Protocol in Telecare Portals Musically modified substitution-box for clinical signals ciphering in wireless telecare medical communicating systems How to share a secret? Telehealth for global emergencies: implications for coronavirus disease 2019 (COVID-19) Cryptography and network security: principles and practice Telemedicine in the era of COVID-19: the virtual Orthopaedic examination Telemedicine in the era of COVID-19: the virtual orthopaedic examination Covid-19: India is at Centre of global vaccine manufacturing, but opacity threatens public trust Telemental health in the context of a pandemic: the COVID-19 experience A self-cited pixel summation based image encryption algorithm A new chaotic key based design for image encryption and decryption The role of telehealth in reducing the mental health burden from COVID-19 Publisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations He is working as State Aided College Teacher & Head in Department of Computer Science at M.U.C. Women's College, Burdwan since 2011. He has published 05 SCI indexed Springer journal paper, 10 SCOPUS Indexed journals, 04 Edited Book Chapters, 04 Book-Chapters (SPRINGER; SCOPUS INDEXED),03 International Conferences journals (UGC journals), and 45 others publications (International/ National/State/Regional Level). His main research interest includes Cryptography and Computational Intelligence in Telehealth He has published 01 SSCI journal, 02 Edited Book Chapters, 05 conference papers, 28 journal papers at reputed international journals, which are available online He received his Ph Acknowledgements Authors do acknowledge the moral and congenial atmosphere support provided by Maharajadhiraj Uday Chand Women's College, Uttar Fatak, Burdwan, West Bengal, India. Ethics approval This article does not contain any studies with human participants or animals performed by any of the authors. There is no conflict of interest.