Abstract
With the development of big data, cloud computing and artificial intelligence, smart healthcare based on Internet plus has become a highly attractive application area. Medical image storage and analysis are progressively becoming cloud-based, providing the preconditions for the efficient cooperation of remote diagnostics and the full sharing of research resources. However, the frequent medical data breach events have greatly infringed on the privacy of users and brought about huge social losses. Therefore, how to strengthen medical images security and privacy protection during transmission, storage and use is very urgent. In this paper, the security requirements of medical images in cloud computing are analyzed. And a survey is introduced focusing on the development status of medical images security techniques in recent 5 years. The open issues of medical image security are also analyzed in this paper, which point out the possible directions for future research.
Supported by the National Natural Science Foundation of China (Grant No.61772561) and the Key Research & Development Plan of Hunan Province (Grant No.2018NK2012).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
United States Department of Health and Human Services. HIPPA: medical privacy national standards to protect the privacy of personal health information. http://www.hhs.gov/ocr/privacy/
Kromtech Security Discovers Health Data Breach of 150K Patients. http://healthitsecurity.com/news/kromtech-security-discovers-health-data-breach-of-150k-patients/
Hacker Might Have Stolen the Healthcare Data for Half of Norway’s Population. http://www.bleepingcomputer.com/news/security/hacker-might-have-stolen-the-healthcare-data-for-half-of-norways-population/
Kavitha, P.K., Saraswathi, P.V.: A survey on medical image encryption. In: 1st International Conference on Applied Soft Computing Techniques, International Journal of Scientific Research in Science and Technology, vol. 3, pp. 1–8. India (2017)
Umamageswari, A., Ferni Ukrit, M., Suresh, G.R.: A survey on security in medical image communication. Int. J. Comput. Appl. 30(3), 41–45 (2011)
Mousavi, S.M., Naghsh, A., Abu-Bakar, S.A.: Watermarking techniques used in medical images: a survey. J. Digit. Imaging 27(6), 714–729 (2014)
Nazeer, M., Kim, D.G., Nargis, B., Malik, Y.M.: A Fresnelet-based encryption of medical images using Arnold transform. Int. J. Adv. Comput. Sci. Appl. 4(3), 131–140 (2013)
Xing, Y.L., Han, B.R., Shi, F.U.: A medical image scrambling method based on Arnold and Knights tour algorithm. J. Suzhou Vocat. Univ. 4(3), 20–25 (2015)
Wahballa, O., Wahaballa, A., Li, F., Idris, I.I., Xu, C.: Medical image encryption scheme based on Arnold transformation and ID-AK protocol. Int. J. Netw. Secur. 19(5), 76–78 (2017)
Sui, M., Li, J., Dong, C., Bai, Y.: The encrypted watermarking for medical image based on Arnold scrambling and DWT. J. Converg. Inf. Technol. 8(5), 893–902 (2013)
Venkateswarlu, L., Reddy, B.E., Rao, N.V.: Arnold-wavelet based robust watermarking technique for medical images. In: International Conference on ICT in Business Industry & Government, pp. 1–5. IEEE, Indore (2016). https://doi.org/10.1109/ICTBIG.2016.7892689
Liu, Y., Li, J.: The medical image watermarking algorithm using DWT-DCT and logistic. In: International Conference on Computing & Convergence Technology, vol. 3(2), pp. 599–603. IEEE, Seoul (2012)
Lu, J., Wang, M., Dai, J., Huang, Q., Li, L., Chang: C.-C.: Multiple watermark scheme based on DWT-DCT quantization for medical images. J. Inf. Hiding Multimed. Signal Process. 6(3), 458–472 (2015)
Singh, A.K.: Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed. Tools Appl. 76(6), 1–18 (2017)
Fu, C., Meng, W.H., Zhan, Y.F., Zhu, Z.L., Lau, F.C.: An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med. 43(8), 1000–1010 (2013)
Zhang, S., Gao, T., Gao, L.: A novel encryption frame for medical image with watermark based on hyperchaotic system. Math. Probl. Eng. 1(8), 1–11 (2014)
Chai, X., Cheng, Y.: A novel medical image encryption algorithm based on four-dimensional memristive hyper-chaotic system. Comput. Era 5(1), 53–58 (2016)
Kanso, A., Ghebleh, M.: An efficient and robust image encryption scheme for medical applications. Commun. Nonlinear Sci. Numer. Simul. 24(3), 98–116 (2015)
Chen, X., Hu, C.J.: Medical image encryption based on multiple chaotic mapping and wavelet transform. Biomed. Res. 28(20), 9001–9008 (2017)
Dai, Y., Wang, H., Wang, Y.: Chaotic medical image encryption algorithm based on bit-plane decomposition. Int. J. Pattern Recognit. Artif. Intell. 30(4), 643–660 (2016)
Xiao, C., Hu, C.J.: Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J. Biol. Sci. 24(8), 62–70 (2017)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Sangeetha, M., Arumugam, C., Senthilkumar, K.M.: Encryption for sharing of secret medical images. Res. J. Biotechnol. 10(2), 19–21 (2015)
Ahmad, T., Studiawan, H., Ahmad, H.S., Ijtihadie, R.M., Wibisono, W.: Shared secret-based steganography for protecting medical data. In: International Conference on Computer, pp. 1–5. IEEE, Bandung (2014). https://doi.org/10.1109/IC3INA.2014.7042606
Marwan, M., Kartit, A., Ouahmane, H.: Secure cloud-based medical image storage using secret share scheme. In: International Conference on Multimedia Computing & Systems, pp. 1–5. IEEE, Marrakech (2016). https://doi.org/10.1109/ICMCS.2016.7905649
Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science 266(11), 1021–1024 (1994)
Cui, G., Qin, L., Wang, Y., Zhang, X.: Information security technology based on DNA computing. In: IEEE International Workshop on Anti-counterfeiting, pp. 1–3. IEEE, Xiamen (2007). https://doi.org/10.1109/IWASID.2007.373746
Kumar, C.V., Natarajan, V., Poonguzhali, P.: Secured patient information transmission using reversible watermarking and DNA encryp-tion for medical images. Appl. Math. Sci. 9(48), 2381–2391 (2015)
Ravichandran, D., Praveenkumar, P., Rayappan, J., Amirtharajan, R.: DNA Chaos blend to secure medical privacy. IEEE Trans. Nanobiosci. 16(8), 850–858 (2017)
Akkasaligar, P.T., Biradar, S.: Secure medical image encryption based on intensity level using Chaos theory and DNA cryptography. In: IEEE International Conference on Computational Intelligence & Computing Research, pp. 1–10. IEEE, Chennai (2016). https://doi.org/10.1109/ICCIC.2016.7919681
Anusudha, K., Venkateswaran, N., Valarmathi, J.: Secured medical image watermarking with DNA codec. Multimed. Tools Appl. 2(8), 1–22 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Tan, Y., Qin, J., Tan, L., Tang, H., Xiang, X. (2018). A Survey on the New Development of Medical Image Security Algorithms. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_42
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)