OBJECTIVE
To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images.
DESIGN
The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images.
MEASUREMENTS
The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode.
RESULTS
The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures.
CONCLUSION
Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment.
[1]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.
[2]
Stephen T. C. Wong,et al.
Multimodal image fusion for noninvasive epilepsy surgery planning
,
1996,
IEEE Computer Graphics and Applications.
[3]
Whitfield Diffie,et al.
New Directions in Cryptography
,
1976,
IEEE Trans. Inf. Theory.
[4]
Stephen T. C. Wong,et al.
A hospital integrated framework for multimodality image base management
,
1996,
IEEE Trans. Syst. Man Cybern. Part A.
[5]
Vijay Varadharajan,et al.
An Access Control Model and Its Use in Representing Mental Health Application Access Policy
,
1996,
IEEE Trans. Knowl. Data Eng..
[6]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.
[7]
Xuejia Lai,et al.
On the design and security of block ciphers
,
1992
.
[8]
Albert Reinder Bakker,et al.
A Second Generation PACS Concept
,
1992,
Springer Berlin Heidelberg.
[9]
Matthew J. Weiner,et al.
Efficient DES Key Search
,
1994
.
[10]
J P Smith.
Authentication of digital medical images with digital signature technology.
,
1995,
Radiology.
[11]
Bernard P. Zajac.
Applied cryptography: Protocols, algorithms, and source code in C
,
1994
.
[12]
Jason Gait,et al.
Report of the Workshop on Cryptography in Support of Computer Security
,
1977
.
[13]
B Cipra,et al.
Electronic time-stamping: the notary public goes digital.
,
1993,
Science.