Secure Image Transmission Framework for Health Care Services
Abstract
The data confidentiality is ensued with the Cryptography techniques. Data encryption and decryption operations are carried out to secure the patient details. The hybrid algorithm (HA) integrates the watermark and cryptography techniques. The medical image transmission is protected with the HA. The patient health records (PHR) are maintained in the secret text files. The secret text file provides the details about the patient and the medical image information. The data hiding methods are applied to hide the secret text into the cover image values.
The secure medical image transmission system is constructed with the data hide and cryptography techniques. The enhanced hybrid algorithm (EHA) is composed with the integration of the data hide, watermark and cryptography techniques. The secret text is encrypted with the RSA algorithm. The encrypted secret text is hided into the medical image. The least significant bit (LSB) encoding scheme is used to handle data hide/unhide operations. The watermark is used to carry the authentication and data integrity verification operations. The system is developed using Java front end and Oracle relational database environment.
Full Text:
PDFReferences
J. Katz, Y. Lindell. Introduction to Modern Cryptography. CR C Press; ISBN 1-58488-551-3,2007.
O. Pianykh, Digital imaging and Communications in Medicine (DICOM). 243 DOL IO.1007/978-3-642-I0850-I_ll, © SpringerVerlag Berlin Heidelberg, 2012.
L. Kobayashi, S. Furuie, P. Barreto. Providing integrity and authenticity in Dl COM images: a novel approach, IEEE Trans Jormation Technol Biomed. 2009; 13(4): 582–9p.
G. Alvarez, S. Li, L. Hemandez. Analysis of security problems in a medical image encryption system, Comput Biol Med. 2007; 37(3): 424–7p.
T. Laskar, K. Hemachandran. Digital image watermarking techniques and its application, Int J Eng. 2013; 2(3).
M. Mitrea, F. Preteux, M. Petrescu, A. Vlad. The StirMark watermarking attack in the DWT domain, In: Froc. oj the 12th International Workshop on Systems, Signals and Image Processing. Chalkida, Greece, Vol. 2, 2005, 2–5p.
C. Cruz, R. Reyes, J. Mendoza, M. Nakano, H. Perez, A novel verification scheme for watermarking based image content authentication systems, Telecommun Radio Eng. 2008; 67(19): 1777–90p.
A. Giakoumaki, S. Pavlopoulos, D. Koutsouris. Multiple image watermarking applied to health information management, IEEE Trans Inl Technol Biomed. 2006; 10(4): 722–32p.
M. Soliman, A. Hassanien, N. Ghali, H. Onsi. An adaptive watermarking approach for medical imaging using swarm intelligent, Int J Smart Home. 2012; 6(I).
D. Nilanjan, P. Moumita, D. Achintya, A session based blind watermarking technique within the NROI of retinal fundus images for authentication using DWT, spread spectrum and harris corner detection, Int J Modern Eng Res. 2010; 2(3): 749–57p.
Refbacks
- There are currently no refbacks.