Secure medical image-sharing mechanism based on visual cryptography in EHR system

Securely sharing electronic health records (EHR) has attracted attention in medical environment. We discuss critical issues related to EHR-sharing and provide how to share a medical image of EHRs based on visual cryptography(VC) and secret sharing with password of practitioners for convenience in distributed system. Also, our proposal is applied to real system “openEMR” and evaluated in respect of performance and security.

[1]  K. Porkumaran,et al.  A new fast and efficient visual cryptography scheme for medical images with forgery detection , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[2]  Ling Liu,et al.  Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Colin Studholme,et al.  An overlap invariant entropy measure of 3D medical image alignment , 1999, Pattern Recognit..

[5]  Wei Pan,et al.  Privacy protection and security in eHealth cloud platform for medical image sharing , 2016, 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).

[6]  Kijoon Chae,et al.  Enhanced password processing scheme based on visual cryptography and OCR , 2017, 2017 International Conference on Information Networking (ICOIN).

[7]  Qian Liu,et al.  Securing Telehealth Applications in a Web-Based e-Health Portal , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[8]  Marco Eichelberg,et al.  A survey and analysis of Electronic Healthcare Record standards , 2005, CSUR.

[9]  Qingzhang Chen,et al.  Security Design for Electronic Medical Record Sharing System , 2010, 2010 International Conference on Biomedical Engineering and Computer Science.

[10]  Wei-Ho Chung,et al.  A Probabilistic Model of $(t,n)$ Visual Cryptography Scheme With Dynamic Group , 2012, IEEE Transactions on Information Forensics and Security.

[11]  P. Gauravaram,et al.  Security Analysis of salt||password Hashes , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).