Skip to main content
Top

2018 | OriginalPaper | Chapter

Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing has provided tremendous opportunities for a lot of organizations in cutting operating cost, making data available to distributed units, provision of easy interoperability etc. Health information systems forms a critical parts of one’s countries information technology infrastructure due to the sensitivity and nature of data processed over time with regards treatment history, medical records etc. And medical images form dominant part of the sensitive patient data. Hence privacy and security needs to be guaranteed for such images stored in the cloud. Most of the access security and encryption approaches are left for the cloud owners to manage and these poses a lot of insecurity if the system is compromised. In our wok, we proposed a hybrid spatial cryptographic and watermarking technique for authentication and security of medical images before storage in the cloud. Due to the sensitive nature of medical images, we were able to achieve full recoverability of the plain image after decryption and dewatermarking without pixel loss. Our results showed to be very effective and reliable for fully recoverable images.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Abdelhak, M., Grostick, S., Hanken, M.A.: Health Information: Management of A Strategic Resource. Elsevier Health Sciences (2015) Abdelhak, M., Grostick, S., Hanken, M.A.: Health Information: Management of A Strategic Resource. Elsevier Health Sciences (2015)
2.
go back to reference Leventhal, J.C., Cummins, J.A., Schwartz, P.H., Martin, D.K., Tierney, W.M.: Designing a system for patients controlling providers’ access to their electronic health records: organizational and technical challenges. J. Gen. Intern. Med. 30(1), 17–24 (2015)CrossRef Leventhal, J.C., Cummins, J.A., Schwartz, P.H., Martin, D.K., Tierney, W.M.: Designing a system for patients controlling providers’ access to their electronic health records: organizational and technical challenges. J. Gen. Intern. Med. 30(1), 17–24 (2015)CrossRef
3.
go back to reference Witting, K.: Health information exchange: Integrating the Healthcare Enterprise (IHE). In: Hannah, K.J., Hussey, P., Kennedy, M.A., Ball, M.J. (eds.) Introduction to Nursing Informatics. HI, pp. 79–96. Springer, London (2015). doi:10.1007/978-1-4471-2999-8_6 Witting, K.: Health information exchange: Integrating the Healthcare Enterprise (IHE). In: Hannah, K.J., Hussey, P., Kennedy, M.A., Ball, M.J. (eds.) Introduction to Nursing Informatics. HI, pp. 79–96. Springer, London (2015). doi:10.​1007/​978-1-4471-2999-8_​6
4.
go back to reference Stuss, D.T., Amiri, S., Rossor, M., Johnson, R., Khachaturian, Z.: How we can work together on research and health big data: strategies to ensure value and success. In: Dementia Research and Care Can Big Data Help?: Can Big Data Help?, p. 61 (2015) Stuss, D.T., Amiri, S., Rossor, M., Johnson, R., Khachaturian, Z.: How we can work together on research and health big data: strategies to ensure value and success. In: Dementia Research and Care Can Big Data Help?: Can Big Data Help?, p. 61 (2015)
5.
go back to reference Ludwick, D.A., Doucette, J.: Adopting electronic medical records in primary care: lessons learned from health information systems implementation experience in seven countries. Int. J. Med. Inform. 78(1), 22–31 (2009)CrossRef Ludwick, D.A., Doucette, J.: Adopting electronic medical records in primary care: lessons learned from health information systems implementation experience in seven countries. Int. J. Med. Inform. 78(1), 22–31 (2009)CrossRef
6.
go back to reference Eysenbach, G.: Recent advances: consumer health informatics. BMJ. Br. Med. J. 320(7251), 1713 (2000)CrossRef Eysenbach, G.: Recent advances: consumer health informatics. BMJ. Br. Med. J. 320(7251), 1713 (2000)CrossRef
7.
go back to reference Anderson, R.J.: Security in clinical information systems. Br. Med. Assoc., London (1996) Anderson, R.J.: Security in clinical information systems. Br. Med. Assoc., London (1996)
8.
go back to reference Mouratidis, H., Giorgini, P., Manson, G.: Integrating security and systems engineering: towards the modelling of secure information systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, pp. 63–78. Springer, Heidelberg (2003). doi:10.1007/3-540-45017-3_7 CrossRef Mouratidis, H., Giorgini, P., Manson, G.: Integrating security and systems engineering: towards the modelling of secure information systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, pp. 63–78. Springer, Heidelberg (2003). doi:10.​1007/​3-540-45017-3_​7 CrossRef
9.
go back to reference Gritzalis, D., Lambrinoudakis, C.: A security architecture for interconnecting health information systems. Int. J. Med. Inform. 73(3), 305–309 (2004)CrossRef Gritzalis, D., Lambrinoudakis, C.: A security architecture for interconnecting health information systems. Int. J. Med. Inform. 73(3), 305–309 (2004)CrossRef
10.
go back to reference Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
11.
go back to reference Liu, H.: Big data drives Cloud adoption in enterprise. IEEE Internet Comput. 17(4), 68–71 (2013)CrossRef Liu, H.: Big data drives Cloud adoption in enterprise. IEEE Internet Comput. 17(4), 68–71 (2013)CrossRef
12.
go back to reference Tari, Z.: Security and privacy in Cloud computing. IEEE Cloud Comput. 1(1), 54–57 (2014)CrossRef Tari, Z.: Security and privacy in Cloud computing. IEEE Cloud Comput. 1(1), 54–57 (2014)CrossRef
13.
go back to reference Abokhdair, N.O., Manaf, A.B.A., Zamani, M.: Integration of chaotic map and confusion technique for color medical image encryption. In: 2010 6th International Conference on Digital Content, Multimedia Technology and its Applications (IDC), pp. 20–23, 16–18 August 2010 Abokhdair, N.O., Manaf, A.B.A., Zamani, M.: Integration of chaotic map and confusion technique for color medical image encryption. In: 2010 6th International Conference on Digital Content, Multimedia Technology and its Applications (IDC), pp. 20–23, 16–18 August 2010
14.
go back to reference Zhou, Y., Panetta, K., Agaian, S.: A lossless encryption method for medical images using edge maps. In: Engineering in Medicine and Biology Society, 2009, EMBC 2009, Annual International Conference of the IEEE, pp. 3707–3710, 3–6 September 2009 Zhou, Y., Panetta, K., Agaian, S.: A lossless encryption method for medical images using edge maps. In: Engineering in Medicine and Biology Society, 2009, EMBC 2009, Annual International Conference of the IEEE, pp. 3707–3710, 3–6 September 2009
15.
go back to reference Acharya, U.R., Bhat, P.S., Kumar, S., Min, L.C.: Transmission and storage of medical images with patient information. Comput. Biol. Med. 33(4), 303–310 (2003)CrossRef Acharya, U.R., Bhat, P.S., Kumar, S., Min, L.C.: Transmission and storage of medical images with patient information. Comput. Biol. Med. 33(4), 303–310 (2003)CrossRef
16.
go back to reference Ashtiyani, M., Birgani, P.M., Hosseini, H.M.: Chaos-based medical image encryption using symmetric cryptography. In: 3rd International Conference on Information and Communication Technologies: From Theory to Applications 2008, ICTTA 2008, pp. 1–5 (2008) Ashtiyani, M., Birgani, P.M., Hosseini, H.M.: Chaos-based medical image encryption using symmetric cryptography. In: 3rd International Conference on Information and Communication Technologies: From Theory to Applications 2008, ICTTA 2008, pp. 1–5 (2008)
Metadata
Title
Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems
Author
Quist-Aphetsi Kester
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-66742-3_27

Premium Partner