Abstract
In this paper we present a securing patient medical images and authentication system to increase the security, confidentiality and integrity of medical images transmitted through the Internet. A public key encryption technique was used to encrypt the patient capturing fingerprint and then embed it into the patient medical image. The fingerprint has been encrypted using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then, by embedding the encrypted patient’s fingerprint using a technique for digital watermarking in the Discrete Cosine Transform (DCT) domain makes the medical image be robust to several common attacks. The experimental results on different medical imaging modalities demonstrate the efficiency and transparency of the watermarking system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mohanty, S.P., Kankanhalli, M.S., Ramakrishnan, R.: A DCT domain visible watermarking technique for image. In: Proc. IEEE Int. Conf. Multimedia Expo., vol. 20, pp. 1029–1032 (2000)
Aslantas, V., Saban, O., Serkan, O.: Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Optics Communications 282(14), 2806–2817 (2009)
Jagdish Patra, C., Jiliang, E.P., Cedric, B.: A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Processing 20(6), 1597–1611 (2010)
Anastasios, T., Nikos, N., Ioannis, P.: Watermarking techniques for image authentication and copyright protection, 2nd edn. Handbook of Image and Video Processing (2005)
Eugene Lim, Y.S.: Data security and protection for medical images. Biomedical Information Technology, 249–257 (2008)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. ACM Commun. 21(2), 120–126 (1978)
Telemedicine and telecommunications: option for the new century. HPCC Program Review and Summary. Program Book. National Library of Medicine, NIH, Bethesda Md, March 13-14 (2001)
Dwyer, S.J.: Requirements for security in medical data. In: Reiner, B., Siegel, E.L., Dwyer, S.J. (eds.) Security issues in the digital medical enterprise, SCAR, ch. 2, pp. 9–14 (2000)
Emilio, C., Álvaro, H.: Neural visualization of network traffic data for intrusion detection. Applied Soft Computing (2010), doi:10.1016/j.asoc.2010.07.002
Banerjee, T.P., Das, S., Roychoudhury, J., Abraham, A.: Implementation of a new hybrid methodology for fault signal classification using short -time fourier transform and support vector machines. In: Corchado, E., Novais, P., Analide, C., Sedano, J. (eds.) SOCO 2010. AISC, vol. 73, pp. 219–225. Springer, Heidelberg (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Darwish, A., Hassanien, A.E., Tan, Q., Pal, N.R. (2011). Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure. In: Corchado, E., Snášel, V., Sedano, J., Hassanien, A.E., Calvo, J.L., Ślȩzak, D. (eds) Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011. Advances in Intelligent and Soft Computing, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19644-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-19644-7_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19643-0
Online ISBN: 978-3-642-19644-7
eBook Packages: EngineeringEngineering (R0)