Crypto-based algorithms for secured medical image transmission

Booming telemedicine applications makes it deemed necessary to provide security services for such applications. The algorithms proposed in this field can be grouped into three classes: watermarking-based algorithms, crypto-based algorithms and hybrid algorithms. In this study, the authors propose two crypto-based algorithms capable of providing confidentiality, authenticity and integrity services to medical images exchanged in telemedicine applications. Strong cryptographic functions with internally generated symmetric keys and hash codes are used. The advanced encryption standard-Galois counter mode is used with the whirlpool hash function to provide confidentiality and authenticity, and the elliptic curve digital signature algorithm is used to provide authenticity and integrity. The proposed algorithms are based on the digital imaging and communication in medicine (DICOM) standard; however, unlike the standard, the algorithms provide confidentiality, authenticity and integrity for the header data, as well as for the pixel data of the DICOM images. Effectiveness of the proposed algorithms is evaluated and demonstrated through extensive experimentation using a benchmark set of DICOM images.

[1]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[2]  C.-C. Jay Kuo,et al.  Digital Image Watermarking in Regions of Interest , 1999, PICS.

[3]  Ed Dawson,et al.  PKI, elliptic curve cryptography, and digital signatures , 1999, Comput. Secur..

[4]  R. Collorec,et al.  Relevance of watermarking in medical imaging , 2000, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS International Conference on Information Technol.

[5]  Bülent Sankur,et al.  Strict integrity control of biomedical images , 2001, IS&T/SPIE Electronic Imaging.

[6]  Andreas Thiel,et al.  A JAVA-based DICOM server with integration of clinical findings and DICOM-conform data encryption , 2001, Int. J. Medical Informatics.

[7]  H. K. Huang,et al.  Authenticity and integrity of digital mammography images , 2001, IEEE Transactions on Medical Imaging.

[8]  Johannes A. Buchmann,et al.  Introduction to Cryptography , 2001 .

[9]  Chin-Ming Hsu,et al.  A data-hiding technique with authentication, integration, and confidentiality for electronic patient records , 2002, IEEE Transactions on Information Technology in Biomedicine.

[10]  Wullianallur Raghupathi,et al.  Strategic IT applications in health care , 2002, CACM.

[11]  Ruthe C Ashley,et al.  Telemedicine: legal, ethical, and liability considerations. , 2002, Journal of the American Dietetic Association.

[12]  U. Rajendra Acharya,et al.  Reliable and robust transmission and storage of medical images with patient information , 2004, 2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04..

[13]  Vincent Rijmen,et al.  The WHIRLPOOL Hashing Function , 2003 .

[14]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[15]  William Puech,et al.  A new crypto-watermarking method for medical images safe transfer , 2004, 2004 12th European Signal Processing Conference.

[16]  J. Craig,et al.  Introduction to the Practice of Telemedicine , 2005, Journal of telemedicine and telecare.

[17]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[18]  Sotiris Pavlopoulos,et al.  Secure and efficient health data management through multiple watermarking on medical images , 2006, Medical and Biological Engineering and Computing.

[19]  G. Coatrieux,et al.  A Review of Image Watermarking Applications in Healthcare , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[20]  Sotiris Pavlopoulos,et al.  Multiple Image Watermarking Applied to Health Information Management , 2006, IEEE Transactions on Information Technology in Biomedicine.

[21]  A. Murat Tekalp,et al.  Lossless watermarking for image authentication: a new framework and an implementation , 2006, IEEE Transactions on Image Processing.

[22]  Morris J. Dworkin,et al.  SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC , 2007 .

[23]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[24]  Tian-ge Zhuang,et al.  A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data , 2009, Journal of Digital Imaging.

[25]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[26]  Fintan J. McEvoy,et al.  Security of Patient and Study Data Associated with DICOM Images when Transferred Using Compact Disc Media , 2009, Journal of Digital Imaging.

[27]  Sérgio Shiguemi Furuie,et al.  Proposal for DICOM Multiframe Medical Image Integrity and Authenticity , 2008, Journal of Digital Imaging.

[28]  Tian-ge Zhuang,et al.  Lossless Watermarking for Verifying the Integrity of Medical Images with Tamper Localization , 2009, Journal of Digital Imaging.

[29]  Osamah M. Al-Qershi,et al.  Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images , 2011, Journal of Digital Imaging.

[30]  Paulo S. L. M. Barreto,et al.  Providing Integrity and Authenticity in DICOM Images: A Novel Approach , 2009, IEEE Transactions on Information Technology in Biomedicine.

[31]  Jasni Mohamad Zain,et al.  Tamper Localization and Lossless Recovery Watermarking Scheme , 2011, ICSECS.

[32]  Oleg S. Pianykh,et al.  Digital Imaging and Communications in Medicine (DICOM) , 2017, Radiopaedia.org.

[33]  A. M. Natarajan,et al.  A Comparative Study on Digital Signatures Based on Elliptic Curves in High Speed Ad Hoc Networks , 2014 .

[34]  Ali Al-Haj,et al.  Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images , 2015, Journal of Digital Imaging.