59 Hits in 7.6 sec

Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability

Chun Kiat Tan, Jason Changwei Ng, Xiaotian Xu, Chueh Loo Poh, Yong Liang Guan, Kenneth Sheah
2010 Journal of digital imaging  
The scheme utilizes concepts of public-key cryptography and reversible data-hiding technique. The scheme was tested using medical images in DICOM format.  ...  The results show that the scheme is able to ensure image authenticity and integrity, and to locate tampered regions in the images.  ...  Using non-reversible watermarking and public-key cryptography scheme, Zhou et al. has demonstrated that authenticity and integrity can be verified for digital mammography images. 9 However, because the  ... 
doi:10.1007/s10278-010-9295-4 pmid:20414697 pmcid:PMC3092037 fatcat:cyq7z5l5czdazi5u5sn6mg7ati

Medical image security in a HIPAA mandated PACS environment

F Cao, H.K Huang, X.Q Zhou
2003 Computerized Medical Imaging and Graphics  
DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. q and communication system security; Image integrity; Digital imaging and communication in medicine  ...  We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure  ...  R01-LM06270 and the US Army Medical Research and Materiel Command Contract No. DAMD17-99-P-3732.  ... 
doi:10.1016/s0895-6111(02)00073-3 pmid:12620309 fatcat:m6ixlfe4s5cgfmb24upzbng4f4

Authenticity and integrity of digital mammography images

X.Q. Zhou, H.K. Huang, S.L. Lou
2001 IEEE Transactions on Medical Imaging  
Index Terms-Data embedding and cryptography, digital mammography, image authenticity and integrity, telemammography. NOMENCLATURE AIDM Authenticity and integrity for mammography image.  ...  image. 3) No visual quality degradation is detected in the embedded image compared with the original.  ...  We can check the image authenticity and integrity by verifying the DS in the envelope using a series of reverse procedures.  ... 
doi:10.1109/42.938246 pmid:11513029 fatcat:77p35oauz5hnrh2yfnvqyp5tqm

A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges

Bushra Abdullah Shtayt, Nur Haryani Zakaria, Nor Hazlyna Harun
2021 Baghdad Science Journal  
used to store and transmit medical images.  ...  Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly  ...  The proposed scheme based on fuzzy logic (FL-LSB) was used to select the non-sequential LSB of the cover image pixels, while the SM-LSB algorithm was utilized to select LSB pixels for embedding the secret  ... 
doi:10.21123/bsj.2021.18.2(suppl.).0957 fatcat:6gdmyna25vd2tjbvttjkrhhxf4

Crypto-Watermarking of Transmitted Medical Images

Ali Al-Haj, Ahmad Mohammad, Alaa' Amer
2016 Journal of digital imaging  
However, the widespread use of telemedicine applications requires a secured scheme to guarantee confidentiality and verify authenticity and integrity of exchanged medical data.  ...  The proposed algorithm provides authenticity by embedding robust watermarks in images' region of non-interest using SVD in the DWT domain.  ...  Cryptography is the approach adopted in the digital imaging and communications in medicine (DICOM) standard which uses symmetric encryption, hashing functions, and digital signatures to provide integrity  ... 
doi:10.1007/s10278-016-9901-1 pmid:27561753 pmcid:PMC5267595 fatcat:zr7na6ojl5c6vbaasfhulrsi2i

A Survey on Patients Privacy Protection with Stganography and Visual Encryption [article]

Hussein K. Alzubaidy, Dhiah Al-Shammary, Mohammed Hamzah Abed
2022 arXiv   pre-print
In this survey, thirty models for steganography and visual encryption methods have been discussed to provide patients privacy protection.  ...  Borraa et al [ 17] has discussed the provision of security and integrity for color radiological images during transmission.  ...  These aims investigate more integrity and security of ensuring hiding capacity for confidential patient information into image.  ... 
arXiv:2201.09388v1 fatcat:uxkkl4pgrnewnkdpf5yj5ohqcu

Data Hiding in 3D-Medical Image

Balsam Abdulkadhim Hameedi, Muna Majeed Laftah, Anwar Abbas Hattab
2022 International Journal of Online and Biomedical Engineering (iJOE)  
In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT).  ...  band used for embedding after adding the generated number, fourthly, used the Hessenberg transform on the blocks that portioned the band (low-high) in a specific size.  ...  Introduction Cryptography and data hiding ensure that the data is being sent securely.  ... 
doi:10.3991/ijoe.v18i03.28007 fatcat:r7oemopuubazhnljjswu6cfi2q

Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images

Ali Al-Haj
2014 Journal of digital imaging  
This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images.  ...  The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality  ...  Irreversible and reversible watermarking techniques have been used for embedding the different watermarks in the spatial domain and frequency domains.  ... 
doi:10.1007/s10278-014-9734-8 pmid:25266442 pmcid:PMC4359199 fatcat:xsel6mag5vcjxighyvh5luuoja

Image Water-Marking/De-Watermarking using Spatial Domain Technique

2019 International Journal of Engineering and Advanced Technology  
There are various existing techniques for cryptography and watermarking. The multimedia data security can be achieved by means of encryption and decryption i.e. cryptography.  ...  The cover image is then used as the media for hiding encrypted data. The encrypted data combined with cover image is treated as embedded image.  ...  For security of data a new scheme is proposed i.e. separable reversible data hiding in encrypted image in which encryption of image,embedding of data and dataextraction/image recovery is proposed.  ... 
doi:10.35940/ijeat.b3568.129219 fatcat:ic3vx7ugxrecrjjouaf6obpbti

Reversible Region of Non-Interest (RONI) Watermarking for Authentication of DICOM Images [article]

Jasni Mohamad Zain, Malcolm Clarke
2011 arXiv   pre-print
The purpose is to verify the integrity and authenticity of DICOM images. We used ultrasound (US) images in our experiment.  ...  SHA-256 of the whole image is embedded in the least significant bits of the RONI (Region of Non-Interest).  ...  We proposed a lossless watermarking scheme being capable of verifying authenticity and integrity of DICOM images.  ... 
arXiv:1101.1603v1 fatcat:srdtc577v5aivh62ewxp436rx4

Using Quaternion Fourier Transform in Steganography Systems

Magdy Ibrahim ElSharkawy
2018 International Journal of Communication Networks and Information Security  
The method is assessed using the known performance metrics and the obtained results show that it is robust and more secure against steganalysis attacks without affecting the consumed bandwidth of the communication  ...  The current contribution introduces a new a steganography technique for hiding a textual message within a cover image.  ...  They suggested a few for future research like integrity and data capacity of cover image. Some steganographic methods need to improve security by using cryptography against attacks [10] .  ... 
dblp:journals/ijcnis/ElSharkawy18a fatcat:rdiuv4jd2jf3zhih3ejo4i2eae

A Hybrid Cryptosystem and Watermarking for Secure Medical Image Transmission

Oladotun O. Okediran
2020 Asian Journal of Research in Computer Science  
For the five sample medical images used to test the scheme, the BER value is zero while the PNSR and SNR are consistent and they returned desirable high values.  ...  Many security schemes that were based on cryptography, watermarking and steganography have been proposed and implemented to secure medical data.  ...  Cryptography is also used to provide solutions for other information security problems [31] : i.  ... 
doi:10.9734/ajrcos/2020/v5i130124 fatcat:zrmxrzrjvzdrpbwfyen77x3s7y

Preserving Data Integrity of Encoded Medical Images: The LAR Compression Framework [chapter]

Marie Babel, François Pasteau, Clément Strauss, Maxime Pelcat, Laurent Bédat, Médéric Blestel, Olivier Déforges
2012 Intelligent Systems Reference Library  
Moreover, these sensitive data require confidentiality and privacy for both archiving and transmission purposes, leading to use cryptography and data embedding solutions.  ...  This chapter introduces data integrity protection and developed dedicated tools of content protection and secure bitstream transmission for medical encoded image purposes.  ...  Typically, for privacy and authentication purposes, the traditional security solutions integrated in the DICOM standard cover encryption processes and digital signatures [53] .  ... 
doi:10.1007/978-3-642-24693-7_4 fatcat:gef7wjgbzrbanembsqnhdhdgju

Integration of Biometrics and Steganography: A Comprehensive Review

Ian McAteer, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang, Craig Valli
2019 Technologies  
In light of this review of both academic and industry literature, we suggest that future research should focus on identifying an acceptable level steganographic embedding for biometric applications, securing  ...  The use of an individual's biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some  ...  • Requires considerable auxiliary data to be reversible. Object-Oriented Embedding (OOE) • Enhanced security. • Robust against cropping and compression.  ... 
doi:10.3390/technologies7020034 fatcat:hrxyfxacsvdvbapwcccd3hydsy

Secure Authentication, Privacy and Integrity in Telemedicine using Visual Cryptography

Arvind Bakshi, Anoop Kumar Patel
2018 International Journal of Advanced Science and Technology  
One of the solutions for securing this data is visual cryptography (VC) approach that creates some set of shares for an image. These shares are transmitted over the network.  ...  In this article, we have proposed an algorithm that is 2 out of 2 visual cryptography scheme for a grayscale image. It shows the shares of the original image that have no visual information.  ...  There are some other challenges in telemedicine security solution using VC such as randomness, accountability and physical security.  ... 
doi:10.14257/ijast.2018.117.02 fatcat:sfar2pi6lrcwhe2cwlvcevjyri
« Previous Showing results 1 — 15 out of 59 results