Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

16.08.2017

Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network

verfasst von: Padmapriya Praveenkumar, P. Catherine Priya, J. Avila, K. Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Digital transferring of medical images in a fraction of second has become inevitable in this internet era. Hence, it is very much essential and need of the time to protect any personal information with utmost secrecy against unauthorized viewers by victimization cryptography. To facilitate the process of getting secure communication, the recent advances in wireless technology have reached its peak and paved way to use the licensed frequency bands suited for Cognitive Radio (CR). In this paper, initially sensing the frequency bands that are not in demand will be initially identified by the CR users, and then the essential encrypted biomedical information will be exchanged between data management systems in hospitals, doctors and patients in rural areas using the identified free spectrum holes. The sensitivity of the encryption algorithm was tested by passing the encrypted medical information over wireless channels like Additive White Gaussian Noise, Rayleigh and Rican channels. Bit error rate, number of pixel changing rate and unified average changing intensity, entropy, correlation values and Chi square tests were estimated to ascertain the reliability and effectiveness of the proposed scheme offering good resistance to known plain text, color noise and chosen cipher text attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Qian, Z., & Zhang, X. (2016). Reversible data hiding in encrypted images with distributed source encoding, reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology, 26, 636–646. https://doi.org/10.1109/TCSVT.2015.2418611. Qian, Z., & Zhang, X. (2016). Reversible data hiding in encrypted images with distributed source encoding, reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology, 26, 636–646. https://​doi.​org/​10.​1109/​TCSVT.​2015.​2418611.
2.
Zurück zum Zitat Ravichandran, D., Padmapriya, P., Rayappan, J. B. B., & Amirtharajan, R. (2016). Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine, 72, 170–184.CrossRef Ravichandran, D., Padmapriya, P., Rayappan, J. B. B., & Amirtharajan, R. (2016). Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine, 72, 170–184.CrossRef
3.
Zurück zum Zitat Padmapriya, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Medical data sheet in safe havens—A tri-layer cryptic solution. Computers in biology and medicine, 62, 264–276.CrossRef Padmapriya, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Medical data sheet in safe havens—A tri-layer cryptic solution. Computers in biology and medicine, 62, 264–276.CrossRef
4.
Zurück zum Zitat Chen, J., Zhu, Z., Fu, C., Zhang, L., & Zhang, Y. (2015). An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Communications in Nonlinear Science and Numerical Simulation, 23, 294–310.MathSciNetCrossRefMATH Chen, J., Zhu, Z., Fu, C., Zhang, L., & Zhang, Y. (2015). An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Communications in Nonlinear Science and Numerical Simulation, 23, 294–310.MathSciNetCrossRefMATH
6.
Zurück zum Zitat Mohandass, S., & Umamaheswari, G. (2014). Biomedical signal transmission using OFDM-based cognitive radio for wireless healthcare applications. Smart Computing Review, 4, 147.CrossRef Mohandass, S., & Umamaheswari, G. (2014). Biomedical signal transmission using OFDM-based cognitive radio for wireless healthcare applications. Smart Computing Review, 4, 147.CrossRef
7.
Zurück zum Zitat Goel, D., Krishna, V. S., & Bhatnagar, M. (2016). Selection relaying in decode-and-forward multi-hop cognitive radio systems using energy detection. IET Communications, 10, 753–760.CrossRef Goel, D., Krishna, V. S., & Bhatnagar, M. (2016). Selection relaying in decode-and-forward multi-hop cognitive radio systems using energy detection. IET Communications, 10, 753–760.CrossRef
8.
Zurück zum Zitat Axell, E., Leus, G., Larsson, E. G., & Poor, H. V. (2012). Spectrum sensing for cognitive radio: State-of-the-art and recent advances. IEEE Signal Processing Magazine, 29, 101.CrossRef Axell, E., Leus, G., Larsson, E. G., & Poor, H. V. (2012). Spectrum sensing for cognitive radio: State-of-the-art and recent advances. IEEE Signal Processing Magazine, 29, 101.CrossRef
10.
Zurück zum Zitat Li, G., Kadir, A., & Liu, H. (2015). Color pathological image encryption scheme with S-boxes generated by complex chaotic system and environmental noise. Neural Computer and Application, 27, 687.CrossRef Li, G., Kadir, A., & Liu, H. (2015). Color pathological image encryption scheme with S-boxes generated by complex chaotic system and environmental noise. Neural Computer and Application, 27, 687.CrossRef
11.
Zurück zum Zitat Kanso, A., & Ghebleh, M. (2015). An efficient and robust image encryption scheme for medical applications. Communications in Nonlinear Science and Numerical Simulation, 24, 98–116.MathSciNetCrossRef Kanso, A., & Ghebleh, M. (2015). An efficient and robust image encryption scheme for medical applications. Communications in Nonlinear Science and Numerical Simulation, 24, 98–116.MathSciNetCrossRef
13.
Zurück zum Zitat Tong, X.-J., Wang, Z., Liu, Y., Zhang, M., & Xu, L. (2015). A novel compound chaotic block cipher for wireless sensor networks. Communications in Nonlinear Science and Numerical Simulation, 22, 120–133.CrossRef Tong, X.-J., Wang, Z., Liu, Y., Zhang, M., & Xu, L. (2015). A novel compound chaotic block cipher for wireless sensor networks. Communications in Nonlinear Science and Numerical Simulation, 22, 120–133.CrossRef
14.
Zurück zum Zitat Chen, J.-X., Zhu, Z.-L., Fu, C., Yu, H., & Zhang, L.-B. (2015). An efficient image encryption scheme using gray code based permutation approach. Optics and Lasers in Engineering, 67, 191–204.CrossRef Chen, J.-X., Zhu, Z.-L., Fu, C., Yu, H., & Zhang, L.-B. (2015). An efficient image encryption scheme using gray code based permutation approach. Optics and Lasers in Engineering, 67, 191–204.CrossRef
18.
Zurück zum Zitat Hu, W.-C. A., Chen, W.-H. A., Huang, D.-Y. B., & Yang, C.-Y. A. (2016). Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes. Multimedia Tools and Applications, 75, 3495–3516.CrossRef Hu, W.-C. A., Chen, W.-H. A., Huang, D.-Y. B., & Yang, C.-Y. A. (2016). Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes. Multimedia Tools and Applications, 75, 3495–3516.CrossRef
19.
Zurück zum Zitat Qureshi, F. H., Sheikh, S. A., Khan, Q. U., & Malik, F. M. (2016). SEP performance of triangular QAM with MRC spatial diversity over fading channels. EURASIP Journal on Wireless Communications and Networking, 2016, 1–16.CrossRef Qureshi, F. H., Sheikh, S. A., Khan, Q. U., & Malik, F. M. (2016). SEP performance of triangular QAM with MRC spatial diversity over fading channels. EURASIP Journal on Wireless Communications and Networking, 2016, 1–16.CrossRef
22.
Zurück zum Zitat He, Z. A., Ma, W. A., Shao, S. A., Wu, F. A., Qing, C. B., & Tang, Y. A. (2016). Performance of an M-QAM full-duplex wireless system with a nonlinear amplifier. Science China Information Sciences, 59, 1–9. He, Z. A., Ma, W. A., Shao, S. A., Wu, F. A., Qing, C. B., & Tang, Y. A. (2016). Performance of an M-QAM full-duplex wireless system with a nonlinear amplifier. Science China Information Sciences, 59, 1–9.
24.
Zurück zum Zitat Kester, Q.-A., Nana, L., Pascu, A. C., & Gire, S. (2013). A new encryption cipher for securing digital images of video surveillance devices using Diffie-Hellman-MD5 algorithm and RGB pixel shuffling. In European modelling symposium (pp. 305–311). Kester, Q.-A., Nana, L., Pascu, A. C., & Gire, S. (2013). A new encryption cipher for securing digital images of video surveillance devices using Diffie-Hellman-MD5 algorithm and RGB pixel shuffling. In European modelling symposium (pp. 305–311).
26.
Zurück zum Zitat Deng, S., Zhan, Y., Xiao, D., & Li, Y. (2011). Analysis and improvement of a hash-based image encryption algorithm. Communications in Nonlinear Science and Numerical Simulation, 16, 3269–3278.MathSciNetCrossRefMATH Deng, S., Zhan, Y., Xiao, D., & Li, Y. (2011). Analysis and improvement of a hash-based image encryption algorithm. Communications in Nonlinear Science and Numerical Simulation, 16, 3269–3278.MathSciNetCrossRefMATH
27.
29.
Zurück zum Zitat Tareef, A., & Al-Ani, A. (2015). A highly secure oblivious sparse coding-based watermarking system for ownership verification. Expert Systems with Applications, 42, 2224–2233.CrossRef Tareef, A., & Al-Ani, A. (2015). A highly secure oblivious sparse coding-based watermarking system for ownership verification. Expert Systems with Applications, 42, 2224–2233.CrossRef
30.
Zurück zum Zitat Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2008). A survey on spectrum management in cognitive radio network. IEEE Communications Magazine, 46, 1.CrossRef Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2008). A survey on spectrum management in cognitive radio network. IEEE Communications Magazine, 46, 1.CrossRef
33.
Zurück zum Zitat Sergio, S. F., Marina, S. R., Ramon, A. M., Marcelo, S., Nivaldo, B., & Gustavo, H. M. B. M. (2007). Managing medical images and clinical information. IEEE Transaction on Information Technology Biomedicine, 11, 17–24.CrossRef Sergio, S. F., Marina, S. R., Ramon, A. M., Marcelo, S., Nivaldo, B., & Gustavo, H. M. B. M. (2007). Managing medical images and clinical information. IEEE Transaction on Information Technology Biomedicine, 11, 17–24.CrossRef
34.
Zurück zum Zitat Stefan, K., & Fabien, A. P. P. (2000). Information hiding techniques for steganography and digital watermarking. Boston: Artek House. Stefan, K., & Fabien, A. P. P. (2000). Information hiding techniques for steganography and digital watermarking. Boston: Artek House.
35.
Zurück zum Zitat Shoemaker, C. (2000). Independent study, hidden bits: A survey of techniques for digital watermarking. EER-290 Prof Rudko Spring. Shoemaker, C. (2000). Independent study, hidden bits: A survey of techniques for digital watermarking. EER-290 Prof Rudko Spring.
36.
Zurück zum Zitat Chung, Y. Y., & Wong, M. T. (2003) Implementation of digital watermarking system. In 2003 IEEE international conference on consumer electronics, 2003 ICCE. IEEE (pp. 214–215). Chung, Y. Y., & Wong, M. T. (2003) Implementation of digital watermarking system. In 2003 IEEE international conference on consumer electronics, 2003 ICCE. IEEE (pp. 214–215).
37.
Zurück zum Zitat Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006). Secure and efficient health data management through multiple watermarking on medical images. Medical and Biological Engineering and Computing, 44, 619–631.CrossRef Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006). Secure and efficient health data management through multiple watermarking on medical images. Medical and Biological Engineering and Computing, 44, 619–631.CrossRef
38.
Zurück zum Zitat Le, H. M., & Aburdene, M. (2006). The discrete Gould transform and its applications. Proceedings of SPIE—The International Society for Optical Engineering, 6064, 156. Le, H. M., & Aburdene, M. (2006). The discrete Gould transform and its applications. Proceedings of SPIE—The International Society for Optical Engineering, 6064, 156.
39.
Zurück zum Zitat Skodras, A. N. (2013). Discrete Gould transform—Fast realizations and data hiding. In Proceedings of the IET seminar digest. Skodras, A. N. (2013). Discrete Gould transform—Fast realizations and data hiding. In Proceedings of the IET seminar digest.
40.
Zurück zum Zitat Kumar, S. K. N., Kumar, H. S. S., & Panduranga, H. T. (2013). Hardware software co-simulation of dual image encryption using Latin square image. In Proceedings of the 4th international conference on computing, communications and networking technologies (pp. 1–5). https://doi.org/10.1109/ICCCNT.2013.6726681. Kumar, S. K. N., Kumar, H. S. S., & Panduranga, H. T. (2013). Hardware software co-simulation of dual image encryption using Latin square image. In Proceedings of the 4th international conference on computing, communications and networking technologies (pp. 1–5). https://​doi.​org/​10.​1109/​ICCCNT.​2013.​6726681.
42.
Zurück zum Zitat Padmapriya, P., Kala, L., Nisha, R., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Hungarian sculptured discrete Gould transformed bit planes—A double puzzled image. In International conference on computer communication and informatics (pp. 1–4). https://doi.org/10.1109/ICCCI.2015.7218068. Padmapriya, P., Kala, L., Nisha, R., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Hungarian sculptured discrete Gould transformed bit planes—A double puzzled image. In International conference on computer communication and informatics (pp. 1–4). https://​doi.​org/​10.​1109/​ICCCI.​2015.​7218068.
46.
48.
Zurück zum Zitat Lang, J. (2015). Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Optics Communications, 338, 181–192.CrossRef Lang, J. (2015). Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Optics Communications, 338, 181–192.CrossRef
Metadaten
Titel
Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network
verfasst von
Padmapriya Praveenkumar
P. Catherine Priya
J. Avila
K. Thenmozhi
John Bosco Balaguru Rayappan
Rengarajan Amirtharajan
Publikationsdatum
16.08.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4795-x

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt