Skip to main content

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 87))

Abstract

In this paper we present a securing patient medical images and authentication system to increase the security, confidentiality and integrity of medical images transmitted through the Internet. A public key encryption technique was used to encrypt the patient capturing fingerprint and then embed it into the patient medical image. The fingerprint has been encrypted using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then, by embedding the encrypted patient’s fingerprint using a technique for digital watermarking in the Discrete Cosine Transform (DCT) domain makes the medical image be robust to several common attacks. The experimental results on different medical imaging modalities demonstrate the efficiency and transparency of the watermarking system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mohanty, S.P., Kankanhalli, M.S., Ramakrishnan, R.: A DCT domain visible watermarking technique for image. In: Proc. IEEE Int. Conf. Multimedia Expo., vol. 20, pp. 1029–1032 (2000)

    Google Scholar 

  2. Aslantas, V., Saban, O., Serkan, O.: Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Optics Communications 282(14), 2806–2817 (2009)

    Article  Google Scholar 

  3. Jagdish Patra, C., Jiliang, E.P., Cedric, B.: A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Processing 20(6), 1597–1611 (2010)

    Article  Google Scholar 

  4. Anastasios, T., Nikos, N., Ioannis, P.: Watermarking techniques for image authentication and copyright protection, 2nd edn. Handbook of Image and Video Processing (2005)

    Google Scholar 

  5. Eugene Lim, Y.S.: Data security and protection for medical images. Biomedical Information Technology, 249–257 (2008)

    Google Scholar 

  6. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. ACM Commun. 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  7. Telemedicine and telecommunications: option for the new century. HPCC Program Review and Summary. Program Book. National Library of Medicine, NIH, Bethesda Md, March 13-14 (2001)

    Google Scholar 

  8. Dwyer, S.J.: Requirements for security in medical data. In: Reiner, B., Siegel, E.L., Dwyer, S.J. (eds.) Security issues in the digital medical enterprise, SCAR, ch. 2, pp. 9–14 (2000)

    Google Scholar 

  9. Emilio, C., Álvaro, H.: Neural visualization of network traffic data for intrusion detection. Applied Soft Computing (2010), doi:10.1016/j.asoc.2010.07.002

    Google Scholar 

  10. Banerjee, T.P., Das, S., Roychoudhury, J., Abraham, A.: Implementation of a new hybrid methodology for fault signal classification using short -time fourier transform and support vector machines. In: Corchado, E., Novais, P., Analide, C., Sedano, J. (eds.) SOCO 2010. AISC, vol. 73, pp. 219–225. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Darwish, A., Hassanien, A.E., Tan, Q., Pal, N.R. (2011). Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure. In: Corchado, E., Snášel, V., Sedano, J., Hassanien, A.E., Calvo, J.L., Ślȩzak, D. (eds) Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011. Advances in Intelligent and Soft Computing, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19644-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19644-7_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19643-0

  • Online ISBN: 978-3-642-19644-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics