Skip to main content
Log in

Dual Function Seal: Visualized Digital Signature for Electronic Medical Record Systems

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Digital signature is an important cryptography technology to be used to provide integrity and non-repudiation in electronic medical record systems (EMRS) and it is required by law. However, digital signatures normally appear in forms unrecognizable to medical staff, this may reduce the trust from medical staff that is used to the handwritten signatures or seals. Therefore, in this paper we propose a dual function seal to extend user trust from a traditional seal to a digital signature. The proposed dual function seal is a prototype that combines the traditional seal and digital seal. With this prototype, medical personnel are not just can put a seal on paper but also generate a visualized digital signature for electronic medical records. Medical Personnel can then look at the visualized digital signature and directly know which medical personnel generated it, just like with a traditional seal. Discrete wavelet transform (DWT) is used as an image processing method to generate a visualized digital signature, and the peak signal to noise ratio (PSNR) is calculated to verify that distortions of all converted images are beyond human recognition, and the results of our converted images are from 70 dB to 80 dB. The signature recoverability is also tested in this proposed paper to ensure that the visualized digital signature is verifiable. A simulated EMRS is implemented to show how the visualized digital signature can be integrity into EMRS.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Boyd, C., Modern data encryption. Electron. Comm. Eng. J. 5(5):271–278, 1993.

    Article  Google Scholar 

  2. Stallings, W., Cryptography and network security, principle and practice, 2nd edition. Prentice Hall, pp. 173–182, 1999

  3. Zhou, X. Q., and Huang, H. K., Authenticity and integrity of digital mammography image. IEEE Trans. Med. Imaging 20(8):784–791, 2001.

    Article  MathSciNet  Google Scholar 

  4. Lai, C. C., and Tsai, C. C., Digital image watermarking using discrete wavlet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11):3060–3063, 2010.

    Article  Google Scholar 

  5. Tagliasacchi, M., Valenzise, G., and Tubaro, S., Hash-based identification of sparse image tampering. IEEE Trans. Image Process. 18(11):2491–2504, 2009.

    Article  MathSciNet  Google Scholar 

  6. Wu, C. W., On the design of content-based multimedia authentication systems. IEEE Trans. Multimed. 4(3):385–393, 2002.

    Article  Google Scholar 

  7. Poulos, M., Bokos, G., and Vaioulis, F., Toward the semantic extraction of digital signatures for librarian image-identification purposes. J. Am. Soc. Inf. Sci. Technol. 59(5):708–718, 2008.

    Article  Google Scholar 

  8. Bausys, R., and Kriukovas, A., A new scheme for image authentication framework. Information Technology and Control 37(4):294–300, 2008.

    Google Scholar 

  9. German Digital Signature Act, http://www.iecl.ox.ac.uk/gla/statutes/SiG.htm.

  10. Malaysia Digital Signature Law, http://www.wipo.int/wipolex/en/details.jsp?id=8181.

  11. Italy Digital Signature Law, http://www.cnipa.gov.it/site/_files/Codice%20Amministrazione%20Digitale_02.pdf.

  12. Korea Digital Signature Law, http://unpan1.un.org/intradoc/groups/public/documents/UN-DPADM/UNPAN042823.pdf.

  13. Taiwan Digital Signature Law, http://law.moj.gov.tw/LawClass/LawContent.aspx?pcode=J0080037.

  14. Zhu, J., Image compressing using wavelets and JPEG2000: A tutorial. Electron. Comm. Eng. J. 14(3):112–121, 2002.

    Article  Google Scholar 

  15. Mallat, S., The theory for multiresolution signal decomposition: The wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 11(7):654–693, 1989.

    Article  Google Scholar 

  16. Huynh-Thu, Q., and Ghanbari, M., Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800–801, 2008.

    Article  Google Scholar 

  17. Elfadil, N., Visually & digitally signed Smart card. Georgian Electronic Scientific Journal 5(1):18–27, 2005.

    Google Scholar 

  18. Markovic, M.,Data protection techniques, cryptographic protocols and PKI systems in modern computer networks. Systems, Signals and Image Processing, 2007, 6th EURASIP Conference focused on Speech and Image Processing, pp. 13–24, Jun. 2007.

  19. Kurose, J. F., and Ross, K. W., Computer networking, 1st edition. Addison Wesley Longman, pp. 598–602

  20. Huynh-Thu, Q., and Ghanbari, M., Scope of validity of PSNR in image/video quality assessment. 44(13), 800–801, 2008.

  21. Ma, T. H., A study of lossless information hiding based on histogram modification and vector quantization. Thesis of the Master’s Degree, pp. 13–15, 2008.

Download references

Acknowledgment

We would like to thank Che-Wei Hu who helps to develop the simple medical record system. Mr. Hu is from the Dept. of Information Management, Tunghai University, Taiwan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yao-Chang Yu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yu, YC., Hou, TW. & Chiang, TC. Dual Function Seal: Visualized Digital Signature for Electronic Medical Record Systems. J Med Syst 36, 3115–3121 (2012). https://doi.org/10.1007/s10916-011-9795-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10916-011-9795-x

Keyword

Navigation