Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Image Transmission Framework for Health Care Services

K Suganya, G Malathi

Abstract


Medical image transmission is very important task in the telemedicine and remote health services. Authentication, confidentiality and integrity are the key issues for the secure data transmission process. The data source verification is carried out under the authentication process. Data encryption and decryption operations are carried out under the confidentiality tasks. The data integrity verification is performed to check the original data with received data values. The watermark technique integrates all the data security operations. Watermark-based data authentication and integrity verification is supported to secure the medical image transmission process.
The data confidentiality is ensued with the Cryptography techniques. Data encryption and decryption operations are carried out to secure the patient details. The hybrid algorithm (HA) integrates the watermark and cryptography techniques. The medical image transmission is protected with the HA. The patient health records (PHR) are maintained in the secret text files. The secret text file provides the details about the patient and the medical image information. The data hiding methods are applied to hide the secret text into the cover image values.
The secure medical image transmission system is constructed with the data hide and cryptography techniques. The enhanced hybrid algorithm (EHA) is composed with the integration of the data hide, watermark and cryptography techniques. The secret text is encrypted with the RSA algorithm. The encrypted secret text is hided into the medical image. The least significant bit (LSB) encoding scheme is used to handle data hide/unhide operations. The watermark is used to carry the authentication and data integrity verification operations. The system is developed using Java front end and Oracle relational database environment.

Full Text:

PDF

References


J. Katz, Y. Lindell. Introduction to Modern Cryptography. CR C Press; ISBN 1-58488-551-3,2007.

O. Pianykh, Digital imaging and Communications in Medicine (DICOM). 243 DOL IO.1007/978-3-642-I0850-I_ll, © SpringerVerlag Berlin Heidelberg, 2012.

L. Kobayashi, S. Furuie, P. Barreto. Providing integrity and authenticity in Dl COM images: a novel approach, IEEE Trans Jormation Technol Biomed. 2009; 13(4): 582–9p.

G. Alvarez, S. Li, L. Hemandez. Analysis of security problems in a medical image encryption system, Comput Biol Med. 2007; 37(3): 424–7p.

T. Laskar, K. Hemachandran. Digital image watermarking techniques and its application, Int J Eng. 2013; 2(3).

M. Mitrea, F. Preteux, M. Petrescu, A. Vlad. The StirMark watermarking attack in the DWT domain, In: Froc. oj the 12th International Workshop on Systems, Signals and Image Processing. Chalkida, Greece, Vol. 2, 2005, 2–5p.

C. Cruz, R. Reyes, J. Mendoza, M. Nakano, H. Perez, A novel verification scheme for watermarking based image content authentication systems, Telecommun Radio Eng. 2008; 67(19): 1777–90p.

A. Giakoumaki, S. Pavlopoulos, D. Koutsouris. Multiple image watermarking applied to health information management, IEEE Trans Inl Technol Biomed. 2006; 10(4): 722–32p.

M. Soliman, A. Hassanien, N. Ghali, H. Onsi. An adaptive watermarking approach for medical imaging using swarm intelligent, Int J Smart Home. 2012; 6(I).

D. Nilanjan, P. Moumita, D. Achintya, A session based blind watermarking technique within the NROI of retinal fundus images for authentication using DWT, spread spectrum and harris corner detection, Int J Modern Eng Res. 2010; 2(3): 749–57p.


Refbacks

  • There are currently no refbacks.