False Image Injection Prevention Using iChain

The advances in information and communication technology are consistently beneficial for the healthcare sector. A trend in the healthcare sector is the progressive shift in how data are acquired and the storage of such data in different facilities, such as in the cloud, due to the efficiency and effectiveness offered. Digital images related to healthcare are sensitive in nature and require maximum security and privacy. A malicious entity can tamper with such stored digital images to mislead healthcare personnel and the consequences of wrong diagnosis are harmful for both parties. A new type of cyber attack, a false image injection attack (FIIA) is introduced in this paper. Existing image tampering detection measures are unable to guarantee tamper-proof medical data in real time. Inspired by the effectiveness of emerging blockchain technology, a security framework, image chain (iChain) is proposed in this paper to ensure the security and privacy of the sensitive healthcare images. The practical challenges associated with the proposed framework and further research that is required are also highlighted.

[1]  Michael J. Maher,et al.  An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems , 2015, EAI Endorsed Trans. Ind. Networks Intell. Syst..

[2]  Kim-Kwang Raymond Choo,et al.  A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.

[3]  Mei-Ling Shyu,et al.  A Survey on Deep Learning , 2018, ACM Comput. Surv..

[4]  Ying Zhang,et al.  A survey on image tampering and its detection in real-world photos , 2019, J. Vis. Commun. Image Represent..

[5]  Hongming Cai,et al.  Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting , 2018, 2018 5th International Conference on Dependable Systems and Their Applications (DSA).

[6]  Pouyan Esmaeilzadeh,et al.  The Potential of Blockchain Technology for Health Information Exchange: Experimental Study From Patients’ Perspectives , 2019, Journal of medical Internet research.

[7]  Davide Cozzolino,et al.  Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[8]  Mohiuddin Ahmed,et al.  Blockchain in the Era of Industry 4.0 , 2018, Data Analytics.

[9]  Kai Fan,et al.  MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain , 2018, Journal of Medical Systems.

[10]  Mohiuddin Ahmed,et al.  A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..

[11]  M. Aiello,et al.  The Challenges of Diagnostic Imaging in the Era of Big Data , 2019, Journal of clinical medicine.

[12]  Mohiuddin Ahmed,et al.  Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering , 2017, Computer.

[13]  Chang-Tien Lu,et al.  Outlier Detection , 2008, Encyclopedia of GIS.

[14]  Aisha Zahid Junejo,et al.  Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives , 2019, Cryptogr..

[15]  David C Klonoff,et al.  Cybersecurity for Connected Diabetes Devices , 2015, Journal of diabetes science and technology.

[16]  Tiago M. Fernández-Caramés,et al.  A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.

[17]  T. Aziz,et al.  Security of implantable medical devices with wireless connections: The dangers of cyber-attacks , 2018, Expert review of medical devices.

[18]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[19]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[20]  Mohiuddin Ahmed,et al.  False Data Injection Attacks in Healthcare , 2017, AusDM.

[21]  Chul-Soo Kim,et al.  Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making , 2019, Applied Sciences.

[22]  Jen-Hung Tseng,et al.  Governance on the Drug Supply Chain via Gcoin Blockchain , 2018, International journal of environmental research and public health.

[23]  Douglas C. Schmidt,et al.  FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data , 2018, Computational and structural biotechnology journal.

[24]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[25]  Fusheng Wang,et al.  Secure and Trustable Electronic Medical Records Sharing using Blockchain , 2017, AMIA.

[26]  Md. Rafiqul Islam,et al.  A survey of anomaly detection techniques in financial domain , 2016, Future Gener. Comput. Syst..

[27]  Mubashir Husain Rehmani,et al.  Applications of Blockchains in the Internet of Things: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[28]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[29]  Osamah M. Al-Qershi,et al.  Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.

[30]  Al-Sakib Khan Pathan,et al.  Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study , 2018, SSCC.

[31]  Kim-Kwang Raymond Choo,et al.  Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.

[32]  Albert Y. Zomaya,et al.  Blockchain for smart communities: Applications, challenges and opportunities , 2019, J. Netw. Comput. Appl..