Abstract
Cloud computing has provided tremendous opportunities for a lot of organizations in cutting operating cost, making data available to distributed units, provision of easy interoperability etc. Health information systems forms a critical parts of one’s countries information technology infrastructure due to the sensitivity and nature of data processed over time with regards treatment history, medical records etc. And medical images form dominant part of the sensitive patient data. Hence privacy and security needs to be guaranteed for such images stored in the cloud. Most of the access security and encryption approaches are left for the cloud owners to manage and these poses a lot of insecurity if the system is compromised. In our wok, we proposed a hybrid spatial cryptographic and watermarking technique for authentication and security of medical images before storage in the cloud. Due to the sensitive nature of medical images, we were able to achieve full recoverability of the plain image after decryption and dewatermarking without pixel loss. Our results showed to be very effective and reliable for fully recoverable images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdelhak, M., Grostick, S., Hanken, M.A.: Health Information: Management of A Strategic Resource. Elsevier Health Sciences (2015)
Leventhal, J.C., Cummins, J.A., Schwartz, P.H., Martin, D.K., Tierney, W.M.: Designing a system for patients controlling providers’ access to their electronic health records: organizational and technical challenges. J. Gen. Intern. Med. 30(1), 17–24 (2015)
Witting, K.: Health information exchange: Integrating the Healthcare Enterprise (IHE). In: Hannah, K.J., Hussey, P., Kennedy, M.A., Ball, M.J. (eds.) Introduction to Nursing Informatics. HI, pp. 79–96. Springer, London (2015). doi:10.1007/978-1-4471-2999-8_6
Stuss, D.T., Amiri, S., Rossor, M., Johnson, R., Khachaturian, Z.: How we can work together on research and health big data: strategies to ensure value and success. In: Dementia Research and Care Can Big Data Help?: Can Big Data Help?, p. 61 (2015)
Ludwick, D.A., Doucette, J.: Adopting electronic medical records in primary care: lessons learned from health information systems implementation experience in seven countries. Int. J. Med. Inform. 78(1), 22–31 (2009)
Eysenbach, G.: Recent advances: consumer health informatics. BMJ. Br. Med. J. 320(7251), 1713 (2000)
Anderson, R.J.: Security in clinical information systems. Br. Med. Assoc., London (1996)
Mouratidis, H., Giorgini, P., Manson, G.: Integrating security and systems engineering: towards the modelling of secure information systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, pp. 63–78. Springer, Heidelberg (2003). doi:10.1007/3-540-45017-3_7
Gritzalis, D., Lambrinoudakis, C.: A security architecture for interconnecting health information systems. Int. J. Med. Inform. 73(3), 305–309 (2004)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)
Liu, H.: Big data drives Cloud adoption in enterprise. IEEE Internet Comput. 17(4), 68–71 (2013)
Tari, Z.: Security and privacy in Cloud computing. IEEE Cloud Comput. 1(1), 54–57 (2014)
Abokhdair, N.O., Manaf, A.B.A., Zamani, M.: Integration of chaotic map and confusion technique for color medical image encryption. In: 2010 6th International Conference on Digital Content, Multimedia Technology and its Applications (IDC), pp. 20–23, 16–18 August 2010
Zhou, Y., Panetta, K., Agaian, S.: A lossless encryption method for medical images using edge maps. In: Engineering in Medicine and Biology Society, 2009, EMBC 2009, Annual International Conference of the IEEE, pp. 3707–3710, 3–6 September 2009
Acharya, U.R., Bhat, P.S., Kumar, S., Min, L.C.: Transmission and storage of medical images with patient information. Comput. Biol. Med. 33(4), 303–310 (2003)
Ashtiyani, M., Birgani, P.M., Hosseini, H.M.: Chaos-based medical image encryption using symmetric cryptography. In: 3rd International Conference on Information and Communication Technologies: From Theory to Applications 2008, ICTTA 2008, pp. 1–5 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Kester, QA. (2018). Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems. In: Bissyande, T., Sie, O. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 208. Springer, Cham. https://doi.org/10.1007/978-3-319-66742-3_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-66742-3_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-66741-6
Online ISBN: 978-3-319-66742-3
eBook Packages: Computer ScienceComputer Science (R0)