ROI Based Double Encryption Approachfor Secure Transaction of Medical Images

The main focus is on enabling, supporting process in the health care industry for implementing a secure, robust and privacy complaint system for the safe distribution and use of medical image. In this paper, a new method that combines image encryption and watermarking technique for safe transaction of medical image is proposed. This method is based on selecting the ROI in the image as the watermark. This portion is encrypted by linear feedback shift register based stream ciphering which is again encrypted by the key generated by Diffie Hellman Algorithm. The encrypted ROI is embedded into the medical image by Spread spectrum technique. The proposed approach proves to be highly secure as two keys are used for encryption and the secret message is spreaded throughout the Medical image.

[1]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[2]  Ling-di Ping,et al.  A New Steganography Algorithm Based on Spatial Domain , 2009, 2009 Second International Symposium on Information Science and Engineering.

[3]  Chin-Ming Hsu,et al.  A data-hiding technique with authentication, integration, and confidentiality for electronic patient records , 2002, IEEE Transactions on Information Technology in Biomedicine.

[4]  Andreas Uhl,et al.  Confidential storage and transmission of medical image data , 2003, Comput. Biol. Medicine.

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Frank Y. Shih,et al.  Combinational image watermarking in the spatial and frequency domains , 2003, Pattern Recognit..

[7]  Aloka Sinha,et al.  A technique for image encryption using digital signature , 2003 .

[8]  Andreas Thiel,et al.  A JAVA-based DICOM server with integration of clinical findings and DICOM-conform data encryption , 2001, Int. J. Medical Informatics.

[9]  Chaw-Seng Woo,et al.  Digital image watermarking methods for copyright protection and authentication , 2007 .

[10]  Ilse Blignault,et al.  A national survey of telehealth activity in Australian hospitals , 2003, Journal of telemedicine and telecare.

[11]  Anton Stiglic,et al.  Security Issues in the Diffie-Hellman Key Agreement Protocol , 2001 .

[12]  H K Huang,et al.  Medical image security in a HIPAA mandated PACS environment. , 2003, Computerized medical imaging and graphics : the official journal of the Computerized Medical Imaging Society.

[13]  Kuo-Liang Chung,et al.  Large encrypting binary images with higher security , 1998, Pattern Recognit. Lett..

[14]  Karen Youngberry Telemedicine research and MEDLINE , 2004, Journal of telemedicine and telecare.

[15]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..