Skip to main content

A Survey on the New Development of Medical Image Security Algorithms

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2018)

Abstract

With the development of big data, cloud computing and artificial intelligence, smart healthcare based on Internet plus has become a highly attractive application area. Medical image storage and analysis are progressively becoming cloud-based, providing the preconditions for the efficient cooperation of remote diagnostics and the full sharing of research resources. However, the frequent medical data breach events have greatly infringed on the privacy of users and brought about huge social losses. Therefore, how to strengthen medical images security and privacy protection during transmission, storage and use is very urgent. In this paper, the security requirements of medical images in cloud computing are analyzed. And a survey is introduced focusing on the development status of medical images security techniques in recent 5 years. The open issues of medical image security are also analyzed in this paper, which point out the possible directions for future research.

Supported by the National Natural Science Foundation of China (Grant No.61772561) and the Key Research & Development Plan of Hunan Province (Grant No.2018NK2012).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. United States Department of Health and Human Services. HIPPA: medical privacy national standards to protect the privacy of personal health information. http://www.hhs.gov/ocr/privacy/

  2. Kromtech Security Discovers Health Data Breach of 150K Patients. http://healthitsecurity.com/news/kromtech-security-discovers-health-data-breach-of-150k-patients/

  3. Hacker Might Have Stolen the Healthcare Data for Half of Norway’s Population. http://www.bleepingcomputer.com/news/security/hacker-might-have-stolen-the-healthcare-data-for-half-of-norways-population/

  4. Kavitha, P.K., Saraswathi, P.V.: A survey on medical image encryption. In: 1st International Conference on Applied Soft Computing Techniques, International Journal of Scientific Research in Science and Technology, vol. 3, pp. 1–8. India (2017)

    Google Scholar 

  5. Umamageswari, A., Ferni Ukrit, M., Suresh, G.R.: A survey on security in medical image communication. Int. J. Comput. Appl. 30(3), 41–45 (2011)

    Google Scholar 

  6. Mousavi, S.M., Naghsh, A., Abu-Bakar, S.A.: Watermarking techniques used in medical images: a survey. J. Digit. Imaging 27(6), 714–729 (2014)

    Article  Google Scholar 

  7. Nazeer, M., Kim, D.G., Nargis, B., Malik, Y.M.: A Fresnelet-based encryption of medical images using Arnold transform. Int. J. Adv. Comput. Sci. Appl. 4(3), 131–140 (2013)

    Google Scholar 

  8. Xing, Y.L., Han, B.R., Shi, F.U.: A medical image scrambling method based on Arnold and Knights tour algorithm. J. Suzhou Vocat. Univ. 4(3), 20–25 (2015)

    Google Scholar 

  9. Wahballa, O., Wahaballa, A., Li, F., Idris, I.I., Xu, C.: Medical image encryption scheme based on Arnold transformation and ID-AK protocol. Int. J. Netw. Secur. 19(5), 76–78 (2017)

    Google Scholar 

  10. Sui, M., Li, J., Dong, C., Bai, Y.: The encrypted watermarking for medical image based on Arnold scrambling and DWT. J. Converg. Inf. Technol. 8(5), 893–902 (2013)

    Google Scholar 

  11. Venkateswarlu, L., Reddy, B.E., Rao, N.V.: Arnold-wavelet based robust watermarking technique for medical images. In: International Conference on ICT in Business Industry & Government, pp. 1–5. IEEE, Indore (2016). https://doi.org/10.1109/ICTBIG.2016.7892689

  12. Liu, Y., Li, J.: The medical image watermarking algorithm using DWT-DCT and logistic. In: International Conference on Computing & Convergence Technology, vol. 3(2), pp. 599–603. IEEE, Seoul (2012)

    Google Scholar 

  13. Lu, J., Wang, M., Dai, J., Huang, Q., Li, L., Chang: C.-C.: Multiple watermark scheme based on DWT-DCT quantization for medical images. J. Inf. Hiding Multimed. Signal Process. 6(3), 458–472 (2015)

    Google Scholar 

  14. Singh, A.K.: Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed. Tools Appl. 76(6), 1–18 (2017)

    Article  Google Scholar 

  15. Fu, C., Meng, W.H., Zhan, Y.F., Zhu, Z.L., Lau, F.C.: An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med. 43(8), 1000–1010 (2013)

    Article  Google Scholar 

  16. Zhang, S., Gao, T., Gao, L.: A novel encryption frame for medical image with watermark based on hyperchaotic system. Math. Probl. Eng. 1(8), 1–11 (2014)

    Google Scholar 

  17. Chai, X., Cheng, Y.: A novel medical image encryption algorithm based on four-dimensional memristive hyper-chaotic system. Comput. Era 5(1), 53–58 (2016)

    Google Scholar 

  18. Kanso, A., Ghebleh, M.: An efficient and robust image encryption scheme for medical applications. Commun. Nonlinear Sci. Numer. Simul. 24(3), 98–116 (2015)

    Article  MathSciNet  Google Scholar 

  19. Chen, X., Hu, C.J.: Medical image encryption based on multiple chaotic mapping and wavelet transform. Biomed. Res. 28(20), 9001–9008 (2017)

    Google Scholar 

  20. Dai, Y., Wang, H., Wang, Y.: Chaotic medical image encryption algorithm based on bit-plane decomposition. Int. J. Pattern Recognit. Artif. Intell. 30(4), 643–660 (2016)

    Article  Google Scholar 

  21. Xiao, C., Hu, C.J.: Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J. Biol. Sci. 24(8), 62–70 (2017)

    Google Scholar 

  22. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  23. Sangeetha, M., Arumugam, C., Senthilkumar, K.M.: Encryption for sharing of secret medical images. Res. J. Biotechnol. 10(2), 19–21 (2015)

    Google Scholar 

  24. Ahmad, T., Studiawan, H., Ahmad, H.S., Ijtihadie, R.M., Wibisono, W.: Shared secret-based steganography for protecting medical data. In: International Conference on Computer, pp. 1–5. IEEE, Bandung (2014). https://doi.org/10.1109/IC3INA.2014.7042606

  25. Marwan, M., Kartit, A., Ouahmane, H.: Secure cloud-based medical image storage using secret share scheme. In: International Conference on Multimedia Computing & Systems, pp. 1–5. IEEE, Marrakech (2016). https://doi.org/10.1109/ICMCS.2016.7905649

  26. Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science 266(11), 1021–1024 (1994)

    Article  Google Scholar 

  27. Cui, G., Qin, L., Wang, Y., Zhang, X.: Information security technology based on DNA computing. In: IEEE International Workshop on Anti-counterfeiting, pp. 1–3. IEEE, Xiamen (2007). https://doi.org/10.1109/IWASID.2007.373746

  28. Kumar, C.V., Natarajan, V., Poonguzhali, P.: Secured patient information transmission using reversible watermarking and DNA encryp-tion for medical images. Appl. Math. Sci. 9(48), 2381–2391 (2015)

    Google Scholar 

  29. Ravichandran, D., Praveenkumar, P., Rayappan, J., Amirtharajan, R.: DNA Chaos blend to secure medical privacy. IEEE Trans. Nanobiosci. 16(8), 850–858 (2017)

    Article  Google Scholar 

  30. Akkasaligar, P.T., Biradar, S.: Secure medical image encryption based on intensity level using Chaos theory and DNA cryptography. In: IEEE International Conference on Computational Intelligence & Computing Research, pp. 1–10. IEEE, Chennai (2016). https://doi.org/10.1109/ICCIC.2016.7919681

  31. Anusudha, K., Venkateswaran, N., Valarmathi, J.: Secured medical image watermarking with DNA codec. Multimed. Tools Appl. 2(8), 1–22 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yun Tan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tan, Y., Qin, J., Tan, L., Tang, H., Xiang, X. (2018). A Survey on the New Development of Medical Image Security Algorithms. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics