Skip to main content

Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems

  • Conference paper
  • First Online:
e-Infrastructure and e-Services for Developing Countries (AFRICOMM 2016)

Abstract

Cloud computing has provided tremendous opportunities for a lot of organizations in cutting operating cost, making data available to distributed units, provision of easy interoperability etc. Health information systems forms a critical parts of one’s countries information technology infrastructure due to the sensitivity and nature of data processed over time with regards treatment history, medical records etc. And medical images form dominant part of the sensitive patient data. Hence privacy and security needs to be guaranteed for such images stored in the cloud. Most of the access security and encryption approaches are left for the cloud owners to manage and these poses a lot of insecurity if the system is compromised. In our wok, we proposed a hybrid spatial cryptographic and watermarking technique for authentication and security of medical images before storage in the cloud. Due to the sensitive nature of medical images, we were able to achieve full recoverability of the plain image after decryption and dewatermarking without pixel loss. Our results showed to be very effective and reliable for fully recoverable images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdelhak, M., Grostick, S., Hanken, M.A.: Health Information: Management of A Strategic Resource. Elsevier Health Sciences (2015)

    Google Scholar 

  2. Leventhal, J.C., Cummins, J.A., Schwartz, P.H., Martin, D.K., Tierney, W.M.: Designing a system for patients controlling providers’ access to their electronic health records: organizational and technical challenges. J. Gen. Intern. Med. 30(1), 17–24 (2015)

    Article  Google Scholar 

  3. Witting, K.: Health information exchange: Integrating the Healthcare Enterprise (IHE). In: Hannah, K.J., Hussey, P., Kennedy, M.A., Ball, M.J. (eds.) Introduction to Nursing Informatics. HI, pp. 79–96. Springer, London (2015). doi:10.1007/978-1-4471-2999-8_6

    Google Scholar 

  4. Stuss, D.T., Amiri, S., Rossor, M., Johnson, R., Khachaturian, Z.: How we can work together on research and health big data: strategies to ensure value and success. In: Dementia Research and Care Can Big Data Help?: Can Big Data Help?, p. 61 (2015)

    Google Scholar 

  5. Ludwick, D.A., Doucette, J.: Adopting electronic medical records in primary care: lessons learned from health information systems implementation experience in seven countries. Int. J. Med. Inform. 78(1), 22–31 (2009)

    Article  Google Scholar 

  6. Eysenbach, G.: Recent advances: consumer health informatics. BMJ. Br. Med. J. 320(7251), 1713 (2000)

    Article  Google Scholar 

  7. Anderson, R.J.: Security in clinical information systems. Br. Med. Assoc., London (1996)

    Google Scholar 

  8. Mouratidis, H., Giorgini, P., Manson, G.: Integrating security and systems engineering: towards the modelling of secure information systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, pp. 63–78. Springer, Heidelberg (2003). doi:10.1007/3-540-45017-3_7

    Chapter  Google Scholar 

  9. Gritzalis, D., Lambrinoudakis, C.: A security architecture for interconnecting health information systems. Int. J. Med. Inform. 73(3), 305–309 (2004)

    Article  Google Scholar 

  10. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)

    Article  Google Scholar 

  11. Liu, H.: Big data drives Cloud adoption in enterprise. IEEE Internet Comput. 17(4), 68–71 (2013)

    Article  Google Scholar 

  12. Tari, Z.: Security and privacy in Cloud computing. IEEE Cloud Comput. 1(1), 54–57 (2014)

    Article  Google Scholar 

  13. Abokhdair, N.O., Manaf, A.B.A., Zamani, M.: Integration of chaotic map and confusion technique for color medical image encryption. In: 2010 6th International Conference on Digital Content, Multimedia Technology and its Applications (IDC), pp. 20–23, 16–18 August 2010

    Google Scholar 

  14. Zhou, Y., Panetta, K., Agaian, S.: A lossless encryption method for medical images using edge maps. In: Engineering in Medicine and Biology Society, 2009, EMBC 2009, Annual International Conference of the IEEE, pp. 3707–3710, 3–6 September 2009

    Google Scholar 

  15. Acharya, U.R., Bhat, P.S., Kumar, S., Min, L.C.: Transmission and storage of medical images with patient information. Comput. Biol. Med. 33(4), 303–310 (2003)

    Article  Google Scholar 

  16. Ashtiyani, M., Birgani, P.M., Hosseini, H.M.: Chaos-based medical image encryption using symmetric cryptography. In: 3rd International Conference on Information and Communication Technologies: From Theory to Applications 2008, ICTTA 2008, pp. 1–5 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quist-Aphetsi Kester .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Kester, QA. (2018). Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems. In: Bissyande, T., Sie, O. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 208. Springer, Cham. https://doi.org/10.1007/978-3-319-66742-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66742-3_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66741-6

  • Online ISBN: 978-3-319-66742-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics