Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015, IET Information Security
Booming telemedicine applications makes it deemed necessary to provide security services for such applications. The algorithms proposed in this field can be grouped into three classes: watermarking-based algorithms, crypto-based algorithms and hybrid algorithms. In this study, the authors propose two crypto-based algorithms capable of providing confidentiality, authenticity and integrity services to medical images exchanged in telemedicine applications. Strong cryptographic functions with internally generated symmetric keys and hash codes are used. The advanced encryption standard-Galois counter mode is used with the whirlpool hash function to provide confidentiality and authenticity, and the elliptic curve digital signature algorithm is used to provide authenticity and integrity. The proposed algorithms are based on the digital imaging and communication in medicine (DICOM) standard; however, unlike the standard, the algorithms provide confidentiality, authenticity and integrity for the header data, as well as for the pixel data of the DICOM images. Effectiveness of the proposed algorithms is evaluated and demonstrated through extensive experimentation using a benchmark set of DICOM images.
International Journal of Computer Applications, 2014
Medical image security can be enhanced using the reversible watermarking technique, it allows us to embed the relevant information with the image, which provides confidentiality, integrity and authentication by embedding RSA encrypted digital signature with the image. Protection of Medical Image content is very much important for tele-diagnosis and telesurgery. Our work proposes a novel algorithms AHF (Additive Hash Function) and RSA for the production of DS (Digital Signature) to achieve high confidentiality and Authentication. An image is compressed using JPEG2000 (DWT) algorithm and EPR (Electronic Patient Record) is embedded in RONI (Region of Non Interest) of compressed image using Lossless Watermarking Technique then shared through the open network. The PSNR (peak Signal to Noise ratio) value is up to 72dBs for 512×512 US(Ultrasonic) images. Increase in Authentication can be achieved when medical expert's access secured medical images from the web servers using Kerberos technique.
Telemedicine has increased the number of ways in which healthcare can be delivered across places and countries instead of requiring the provider and the recipient to be present in the same place. One application of telemedicine is the exchange of medical images between remotely located healthcare entities. However, a maj or obstacle telemedicine faces is providing confidentiality, integrity, and authenticity to transmitted medical images. In this paper, we propose a hybrid algorithm which combines encryption and digital watermarking techniques in order to provide the required authenticity and integrity services. A cryptographic watermark and the patient's data are hidden in the cover image before being transmitted over vulnerable public networks. On the receiver's side, the watermarked image is handled by the extraction procedure in order to extract the cryptographic watermarks and the embedded medical data. The proposed algorithm was tested and evaluated using medical images of two different modalities. The experimental results demonstrate the effectiveness of the proposed algorithm.
Proc. of the 12th European Signal Processing …
The amount of digital medical images has increased rapidly in the Internet. The necessity of fast and secure diagnosis is vital in the medical world. Nowadays, the transmission of images became a daily routine and it is necessary to find an efficient form to transmit them over the net. In ...
Cloud Computing Systems and Applications in Healthcare
Health care institution demands exchange of medical images of number of patients to sought opinions from different experts. In order to reduce storage and for secure transmission of the medical images, Crypto-Watermarking techniques are adopted. The system is considered to be combinations of encryption technique with watermarking or steganography means adopted for safe transfer of medical images along with embedding of optional medical information. The Digital Watermarking is the process of embedding data to multimedia content. This can be done in spatial as well as frequency domain of the cover image to be transmitted. The robustness against attacks is ensured while embedding the encrypted data into transform domain, the encrypted data can be any secret key for the content recovery or patient record or the image itself. This chapter presents basic aspects of crypto-watermarking technique, as an application. It gives a detailed assessment on different approaches of crypto-watermarki...
Journal of Digital Imaging, 2016
Telemedicine is a booming healthcare practice that has facilitated the exchange of medical data and expertise between healthcare entities. However, the widespread use of telemedicine applications requires a secured scheme to guarantee confidentiality and verify authenticity and integrity of exchanged medical data. In this paper, we describe a regionbased, crypto-watermarking algorithm capable of providing confidentiality, authenticity, and integrity for medical images of different modalities. The proposed algorithm provides authenticity by embedding robust watermarks in images' region of non-interest using SVD in the DWT domain. Integrity is provided in two levels: strict integrity implemented by a cryptographic hash watermark, and content-based integrity implemented by a symmetric encryption-based tamper localization scheme. Confidentiality is achieved as a byproduct of hiding patient's data in the image. Performance of the algorithm was evaluated with respect to imperceptibility, robustness, capacity, and tamper localization, using different medical images. The results showed the effectiveness of the algorithm in providing security for telemedicine applications.
Protection of medical image content is more significant in telemedicine. Digital lossless watermarking becomes the auspicious technique to secure the medical content in medical images. To enhance the security, this paper suggests secure hash algorithm , rivest- shamir- adlemen algorithm, novel algorithms additive hash function and advanced classical cipher for replacing the existing algorithm and the production of digital signature to achieve high confidentiality and authentication. An image is compressed using joint photographic experts group JPEG 2000 discrete wavelet transforms for region of interest and joint photographic experts group JPEG for region of non interest. The medical image content electronics patient record and digital signature is embedded in region of non interest of compressed image, using lossless watermarking technique. Watermarking technique increases the integrity and authenticity, when medical images are shared through open network. The peak signal to noise ratio value is up to 72dBs for all types of digital imaging and communications in medicine images. Increase in authentication can be achieved when the medical expert access secured medical images from the web servers using Kerberos technique. Keywords: Authentication and confidentiality; JPEG 2000 compression; Kerberos; lossless watermarking; medical image security.
Engineering and Scientific International Journal, 2019
Medical Imaging has remoulded the Healthcare system. It has become a vital tool for rapid diagnosis with visualisation of the interior of the body. Telemedicine is that the remote delivery of healthcare services over the telecommunication infrastructure. This paper aims at providing security to the medical images transmitted over public networks. It addresses the following traits of Medical Image Security namely: Confidentiality, Patient's control, Data Integrity and Consent Exception .The objective of the paper roots on providing theoretical ideas by combining Watermarking schemes with Cryptography techniques for developing enhanced security algorithms for transaction of medical images. The various parameters used for the measurement of the performance and effectiveness of the proposed algorithms such as Entropy, Number of Pixel Change Rate, Unified Average Change in Intensity, Correlation Coefficient, Mean Squared Error and Peak Signal to Noise Ratio are discussed. This paper provides a road map in constructing new algorithm by combining cryptography and watermarking technique for secure transaction of medical.
Intelligent Automation & Soft Computing
The transmission of medical records over indiscrete and open networks has caused an increase in fraud involving stealing patients' information, owing to a lack of security over these links. An individual's medical documents represent confidential information that demands strict protocols and security, chiefly to protect the individual's identity. Medical image protection is a technology intended to transmit digital data and medical images securely over public networks. This paper presents some background on the different methods used to provide authentication and protection in medical information security. This work develops a secure cryptography-based medical image reclamation algorithm based on a combination of techniques: discrete cosine transform, steganography, and watermarking. The novel algorithm takes patients' information in the form of images and uses a discrete cosine transform method with artificial intelligence and watermarking to calculate peak signal-to-noise ratio values for the images. The proposed framework uses the underlying algorithms to perform encryption and decryption of images while retaining a high peak signal-to-noise ratio value. This value is hidden using a scrambling algorithm; therefore, a unique patient password is required to access the real image. The proposed technique is demonstrated to be robust and thus able to prevent stealing of data. The results of simulation experiments are presented, and the accuracy of the new method is demonstrated by comparisons with various previously validated algorithms.
2017 40th International Conference on Telecommunications and Signal Processing (TSP)
This paper presents a highly secured new image watermarking scheme using two secret keys to prevent unauthorized access of information stored in cloud environment. The proposed scheme is applied for secure medical information transmission or its cloud storage. The scheme is implemented in two steps. In first step, randomization of patient information is done based on a password secret key before embedding it into the cover medical image. Second step is to hide the watermarked image into a secret key image before cloud storage so that even if the stored image is hacked or leaked, the cover medical image along with embedded patient information cannot be retrieved by the hacker. In this paper we have proposed a novel watermarking algorithm for medical images by randomizing the information according to the secret password key and then embedding it into the cover medical image followed by embedding of cover image into another secret key image. The proposed scheme aims to protect sensitive information transfer and cloud storage from unauthorized access. Extraction of the embedded information at the receiver end is done in two steps. Firstly, non-blind detection is carried out in which cover medical image is extracted with help of secret key image. In the second step, binary image watermark is extracted by analyzing the DCT (Discrete Cosine Transform) coefficient values. Performance of the proposed algorithm is analyzed by varying the quality factor of JPEG compression and sub-band decomposition levels.
International Journal of Computer Applications, 2014
Security is the fundamental requirement for an information society in the distributed network environment. A watermark is a secret message that is embedded into a cover message. Digital watermarks are used to verify the authenticity of the carrier signal for the identity of the owners. In order to provide data integrity, confidentiality and authentication various techniques are available like cryptography, steganography and watermarking. To protect the patient information in telemedicine, watermarking is mainly used. Patient information is embedded within the cover medical image. Digital Imaging & Communications in Medicine is an universal standard of communication for secured medical images. In the proposed technique, to provide authentication the hash value will be generated using SHA and the Huffman compression algorithm(R-S vector) will be used to shrink the size of an image. With the patient information the medical image is protected through Public key cryptography in a secure manner. Compared to the previous system, the proposed technique is more efficient. The original image is completely restored without any loss at the receiver side. The patient information is hidden (protected) from the hackers during transmission.
TELKOMNIKA Indonesian Journal of Electrical Engineering
Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content authentication, it allows to embed relevant information with the image, which provides confidentiality, integrity and authentication by embedding Digital Signature (DS) with the Medical image. In this paper we focus on need for reversible watermarking, Medical Image Compression and security related problems in medical images, it comparing the performances of various lossless watermarking techniques for various medical image modalities like MRI (Magnetic Resonance Imaging), US (Ultrasonic), CT (Computed Tomography), Endoscopic and Angiographic images. Region of Interest (ROI) supporting lossless watermarking systems only considered for discussions. Performance of all lossless watermarking with Digital Signature is analyzed by means of four parameters Capacity Rate, PSNR (Peak Signal to Noise ratio), NPCR (Number of P...
Proceedings of International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, 2020
The development in the field of networking technologies and telecommunications has increased the popularity of telemedicine usage. In medical diagnosis, many processes have been proposed by researchers for securing patients' records and medical images that are sent from one location to another. This paper represents a technical survey on various cryptographic and watermarking processes that are applied on different medical images for secure transmission. Deterioration in the quality of the medical data or images at the time of transmission may endanger the treatment of patients, therefore, lossless and reversible methods need to be emphasized. In this study, we have analyzed some of the most relevant existing works in this area. On the basis of this analysis, we have tried to identify the open issues in the field of secure medical image transmission in order to provide secure transmission and ensure enhanced quality of treatment of the patients.
International Journal of Electrical and Computer Engineering (IJECE), 2023
Among the most sensitive and important data in telemedicine systems are medical images. It is necessary to use a robust encryption method that is resistant to cryptographic assaults while transferring medical images over the internet. Confidentiality is the most crucial of the three security goals for protecting information systems, along with availability, integrity, and compliance. Encryption and watermarking of medical images address problems with confidentiality and integrity in telemedicine applications. The need to prioritize security issues in telemedicine applications makes the choice of a trustworthy and efficient strategy or framework all the more crucial. The paper examines various security issues and cutting-edge methods to secure medical images for use with telemedicine systems.
EURASIP Journal on Image and Video Processing
Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content authentication, it allows to embed relevant information with the image, which provides confidentiality, integrity and authentication by embedding Digital Signature (DS) with the Medical image. In this paper we focus on need for reversible watermarking, Medical Image Compression and security related problems in medical images, it comparing the performances of various lossless watermarking techniques for various medical image modalities like MRI (Magnetic Resonance Imaging), US (Ultrasonic), CT (Computed Tomography), Endoscopic and Angiographic images. Region of Interest (ROI) supporting lossless watermarking systems only considered for discussions. Performance of all lossless watermarking with Digital Signature is analyzed by means of four parameters Capacity Rate, PSNR (Peak Signal to Noise ratio), NPCR (Number of P...
2019
The rapid rise in the exchange of the medical information for remote/continuous diagnosis via internet using different software’s and digital gadgets has ensured better health monitoring. This exchange, however, has given rise to many security issues which may occur due to noise in communication channels, mishandling of devices or unauthorized tempering. Thus, there is need of ensuring privacy, data integrity and copyright protection in order to provide better technological efficiency. For securing medical content digital watermarking techniques have proved to provide better solutions. In this chapter an efficient watermarking technique is proposed for exchanging patient information in an e-healthcare system. A robust watermarking technique using Singular Value Decomposition (SVD) for embedding the secret logo in the transform domain coefficients is presented. The hybrid combination of Discrete Cosine Transform (DCT) and SVD ensures very high robustness of the watermark and hence is...
Journal of Information Security and Applications, 2019
With the rise in medical imaging tools and telemedicine technology, the distance barriers in providing health care have been reduced by communicating patients data over the internet. To provide patients with privacy, the data are encrypted while transmitting over the insecure network. The paper proposes an encryption scheme for multiple medical images using a new finding in elliptic curve analogue ElGamal cryptosystem and Mersenne Twister pseudo-random number generator. The new finding quickens the encryption time as well as solve the problem of data expansion associated with ElGamal cryptosystem. Results from simulation, security and statistical analyses show that the proposed encryption algorithm can be used for multiple medical images encryption.
Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, 2019
Medical images of patients are often exchanged among specialist physicians, radiologists, hospital authorities and patients for remote monitoring and assessment as part of telemedicine. With the revolutions in the technology, the threat models and attackers are evolving on a daily basis and hence there is a constant need for the development of novel schemes that can protect personal information. In this paper, a non-blind fragile watermarking is developed to invisibly hide and integrate patient's unique information such as biometrics in their radiological images for secure authentication, integrity verification and tamper detection purposes. The concept of compressive sensing theory is employed with discrete cosine transform to improve confidentiality. The performance of the proposed scheme is tested and evaluated on three types of medical images: X-ray, computed tomography and magnetic resonance imaging. The proposed scheme presents a means of verifying data integrity when medical images are subjected to attacks. The experimental results showed that the scheme invisibly hides high payloads of patient's unique identities, apart from providing better tamper detection. The simulation results show that the proposed scheme provides high imperceptibility up to 92 dB and high payload capacity of up to 1 bpp.
The advanced healthcare system needs to share electronic patient record (EPR) among different hospitals and specialists for better and easy treatment of patient. However, the protection of the EPR from unauthorized access and malicious attacks is primary concern to preserve the privacy and proper diagnosis. Medical image watermarking in E-health care system is a suitable technique for safety and confidentiality of EPR. In this paper the medical image is separated into region of interest (ROI) and region of non interest (RONI) part, subsequently additive encryption technique is applied to embed patient record into ROI part of cover media. Backup of original information is embedded into RONI part for tamper detection. Thereafter visible hospital logo is embedded into watermarked medical image for identification purpose. Result of this algorithm tested over few medical images and that produces effectiveness of data payload and integrity.
Journal of Sensor and Actuator Networks
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties. This right is typically protected by law through firm regulations set by healthcare authorities. However, sensitive-private data usually requires the application of further security and privacy mechanisms such as encipherment (encryption) techniques. ’Medical images’ is one such example of highly demanding security and privacy standards. This is due to the quality and nature of the information carried among these images, which are usually sensitive-private information with few features and tonal variety. Hence, several state-of-the-art encryption mechanisms for medical images have been proposed and developed; however, only a few were efficient and promising. This paper presents a hybrid crypto-algorithm, MID-Crypt, to secure the medical image communicated between medical laboratories and doctors’ accounts. MID-Crypt is...
International Journal of Electrical and Computer Engineering (IJECE), 2017
In this paper, we present a new method for medical images security dedicated to m-Health based on a combination between a novel semi reversible watermarking approach robust to JPEG compression, a new proposed fragile watermarking and a new proposed encryption algorithm. The purpose of the combination of these three proposed algorithms (encryption, robust and fragile watermarking) is to ensure the full protection of medical image, its information and its report in terms of confidentiality and reliability (authentication and integrity). A hardware implementation to evaluate our system is done using the Texas instrument C6416 DSK card by converting m-files to C/C++ using MATLAB coder. Our m-health security system is then run on the android platform. Experimental results show that the proposed algorithm can achieve high security with good performance.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.