Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
4 pages
1 file
Providing security for Medical data such as X-Ray, ECG, MRI, etc. has gained immense importance due to their sensitive nature. The penetration of Internet in all walks of life has made data sharing a necessity amongst hospital networks all over the globe which are in need of security system for their online data exchange. The usage of geometrical objects for encryption is a young area. The present research work explores one such option; the use of Pythagoras’s theorem for right- angled triangle to encrypt medical images. The work proposes a crypto-system with considerable security with one requirement– the use of a secure channel for key exchange.
Frontiers in Health Informatics, 2019
In this paper, an encryption algorithm for the security of medical images is presented, which has extraordinary security. Given that the confidentiality of patient data is one of the priorities of medical informatics, the algorithm can be used to store and send medical image.
Engineering Review, 2012
Modern day hospital management systems rely heavily on electronic data processing to maintain patient records. These electronic medical records (EMRs) must be maintained in an unaltered form by the creator. The need for a secure data handling method for the transmission and storage of text and digital media, comprising patient's diagnostic history, imaging, scans, etc., is indispensible. This paper presents a novel method of text encryption by means of symmetric key encryption technique, using variable length key derived from the encrypted text itself.
Journal of Open Innovation: Technology, Market, and Complexity, 2015
This research work discusses a file-type-independent cryptosystem using the conversion of Cartesian and Polar coordinate systems in three dimensions. This is an advancement to PythoCrypt (IJESM, Vol-3,Issue-2, 48-51,2013) where a new algorithm was discussed that can be effectively used to provide security to medical images (IEEE,
Journal of Information Security and Applications, 2019
With the rise in medical imaging tools and telemedicine technology, the distance barriers in providing health care have been reduced by communicating patients data over the internet. To provide patients with privacy, the data are encrypted while transmitting over the insecure network. The paper proposes an encryption scheme for multiple medical images using a new finding in elliptic curve analogue ElGamal cryptosystem and Mersenne Twister pseudo-random number generator. The new finding quickens the encryption time as well as solve the problem of data expansion associated with ElGamal cryptosystem. Results from simulation, security and statistical analyses show that the proposed encryption algorithm can be used for multiple medical images encryption.
Computers in Biology and Medicine, 2007
Recently a new system for the secure transmission and efficient storage of medical images interleaved with patient information has been proposed in 2003 by Rajendra Acharya et al. In this paper we analyse the security of this system, showing how to improve it to obtain a truly secure system.
2015
This work is interested in securing transmission of digital images on the Internet, in public or local networks such as medical images, military or biometrics (authentication retina or fingerprint). We will implement three famous algorithms which are the RSA, DES and AES. The first one uses an asymmetric method for generating the keys (public and private) hence the second and the third algorithms are symmetric cipher block and use only private key for ciphering and deciphering. The simulation results will be presented and discussed in function of two main security parameters which are the length of the information blocks and the key length. Finally, a comparative study between the three techniques is conducted in order to classify everyone by the best performances of robustness especially with the presence of different kinds of attacks.
Scientific Programming, 2022
With the advancements in e-healthcare services, it is possible to provide remote medical services to patients and swifter first aid. Medical images play an essential role in e-healthcare applications for providing quick and better remote diagnosis and treatment to patients. Medical images generally comprise secret details about the patients and are therefore prone to various security threats during their transmission over public networks. Thus, it is required to secure these images prior to their communication over public networks. But due to distinctive properties of medical images, like higher correlation and redundancy among the pixels, and larger size, it is required to design an efficient encryption model to resist against various security threats. In this paper, an efficient encryption model for medical images is proposed. To obtain the secret keys, six-dimensional hyperchaotic map (SDHM) is proposed. Firstly, plain medical image is divided into three channels such as red, gre...
IET Information Security, 2015
Booming telemedicine applications makes it deemed necessary to provide security services for such applications. The algorithms proposed in this field can be grouped into three classes: watermarking-based algorithms, crypto-based algorithms and hybrid algorithms. In this study, the authors propose two crypto-based algorithms capable of providing confidentiality, authenticity and integrity services to medical images exchanged in telemedicine applications. Strong cryptographic functions with internally generated symmetric keys and hash codes are used. The advanced encryption standard-Galois counter mode is used with the whirlpool hash function to provide confidentiality and authenticity, and the elliptic curve digital signature algorithm is used to provide authenticity and integrity. The proposed algorithms are based on the digital imaging and communication in medicine (DICOM) standard; however, unlike the standard, the algorithms provide confidentiality, authenticity and integrity for the header data, as well as for the pixel data of the DICOM images. Effectiveness of the proposed algorithms is evaluated and demonstrated through extensive experimentation using a benchmark set of DICOM images.
Journal of Sensor and Actuator Networks
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties. This right is typically protected by law through firm regulations set by healthcare authorities. However, sensitive-private data usually requires the application of further security and privacy mechanisms such as encipherment (encryption) techniques. ’Medical images’ is one such example of highly demanding security and privacy standards. This is due to the quality and nature of the information carried among these images, which are usually sensitive-private information with few features and tonal variety. Hence, several state-of-the-art encryption mechanisms for medical images have been proposed and developed; however, only a few were efficient and promising. This paper presents a hybrid crypto-algorithm, MID-Crypt, to secure the medical image communicated between medical laboratories and doctors’ accounts. MID-Crypt is...
Multimedia Tools and Applications
In recent years, there has been an enormous demand for the security of image multimedia in healthcare organizations. Many schemes have been developed for the security preservation of data in e-health systems however the schemes are not adaptive and cannot resist chosen and known-plaintext attacks. In this contribution, we present an adaptive framework aimed at preserving the security and confidentiality of images transmitted through an e-healthcare system. Our scheme utilizes the 3D-chaotic system to generate a keystream which is used to perform 8-bit and 2-bit permutations of the image. We perform pixel diffusion by a key-image generated using the Piecewise Linear Chaotic Map (PWLCM). We calculate an image parameter using the pixels of the image and perform criss-cross diffusion to enhance security. We evaluate the scheme's performance in terms of histogram analysis, information entropy analysis, statistical analysis, and differential analysis. Using the scheme, we obtain the average Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) values for an image of size 256 × 256 equal to 99.5996 and 33.499 respectively. Furthermore, the average entropy is 7.9971 and the average Peak Signal to Noise Ratio (PSNR) is 7.4756. We further test the scheme on 50 chest X-Ray images of patients having COVID-19 and viral pneumonia and found the average values of variance, PSNR, entropy, and Structural Similarity Index (SSIM) to be 257.6268, 7.7389, 7.9971, and 0.0089 respectively. Furthermore, the scheme generates completely uniform histograms for medical images which reveals that the scheme can resist statistical attacks and can be applied as a security framework in AI-based healthcare.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Computer Applications, 2014
International Journal of Image, Graphics and Signal Processing
2019 Amity International Conference on Artificial Intelligence (AICAI)
International Journal of Electrical and Computer Engineering (IJECE), 2023
Intelligent Automation & Soft Computing
Journal on Systemics, Cybernetics and Informatics, 2010
Systems Signals and …
International Journal of Computer Applications, 2014
Proceedings of International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, 2020
UHD Journal of Science and Technology