Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems

Cloud computing has provided tremendous opportunities for a lot of organizations in cutting operating cost, making data available to distributed units, provision of easy interoperability etc. Health information systems forms a critical parts of one’s countries information technology infrastructure due to the sensitivity and nature of data processed over time with regards treatment history, medical records etc. And medical images form dominant part of the sensitive patient data. Hence privacy and security needs to be guaranteed for such images stored in the cloud. Most of the access security and encryption approaches are left for the cloud owners to manage and these poses a lot of insecurity if the system is compromised. In our wok, we proposed a hybrid spatial cryptographic and watermarking technique for authentication and security of medical images before storage in the cloud. Due to the sensitive nature of medical images, we were able to achieve full recoverability of the plain image after decryption and dewatermarking without pixel loss. Our results showed to be very effective and reliable for fully recoverable images.

[1]  Mazdak Zamani,et al.  Integration of chaotic map and confusion technique for color medical image encryption , 2010, 6th International Conference on Digital Content, Multimedia Technology and its Applications.

[2]  Costas Lambrinoudakis,et al.  A security architecture for interconnecting health information systems , 2004, Int. J. Medical Informatics.

[3]  Zahir Tari,et al.  Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.

[4]  U. Rajendra Acharya,et al.  Reliable and robust transmission and storage of medical images with patient information , 2004, 2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04..

[5]  Gunther Eysenbach,et al.  Consumer health informatics , 2000, BMJ : British Medical Journal.

[6]  William M. Tierney,et al.  Designing a System for Patients Controlling Providers’ Access to their Electronic Health Records: Organizational and Technical Challenges , 2014, Journal of General Internal Medicine.

[7]  M. Mrinalni Vaknishadh,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .

[8]  Mary Alice Hanken PhD Chps Rhia,et al.  Health Information: Management of a Strategic Resource , 2007 .

[9]  Huan Liu,et al.  Big Data Drives Cloud Adoption in Enterprise , 2013, IEEE Internet Computing.

[10]  Yicong Zhou,et al.  A lossless encryption method for medical images using edge maps , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[11]  John Doucette,et al.  Adopting electronic medical records in primary care: Lessons learned from health information systems implementation experience in seven countries , 2009, Int. J. Medical Informatics.

[12]  Ross Anderson,et al.  Security in Clinical Information Systems , 1996 .

[13]  Parmida Moradi Birgani,et al.  Chaos-Based Medical Image Encryption Using Symmetric Cryptography , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.

[14]  Haralambos Mouratidis,et al.  Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems , 2003, CAiSE.

[15]  Karen Witting Health Information Exchange: Integrating the Healthcare Enterprise (IHE) , 2015 .