Radiomic Features for Medical Images Tamper Detection by Equivalence Checking

被引:10
作者
Brunese, Luca [1 ]
Mercaldo, Francesco [2 ,4 ]
Reginelli, Alfonso [3 ]
Santone, Antonella [4 ]
机构
[1] Univ Molise, Dept Med & Hlth Sci Vincenzo Tiberio, Campobasso, Italy
[2] Natl Res Council Italy CNR, Inst Informat & Telemat, Pisa, Italy
[3] Univ Campania Luigi Vanvitelli, Dept Precis Med, Naples, Italy
[4] Univ Molise, Dept Biosci & Terr, Pesche, IS, Italy
来源
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019) | 2019年 / 159卷
关键词
Formal Methods; Equivalence Checking; Radiomic; WATERMARKING TECHNIQUE; AUTHENTICATION; RECOVERY; SECURITY; REGION; CLOUD;
D O I
10.1016/j.procs.2019.09.351
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital medical images are very easy to be modified for illegal purposes. An attacker may perform this act in order to stop a political candidate, sabotage research, commit insurance fraud, perform an act of terrorism, or even commit murder. Between the machine that performs medical scans and the radiologist monitor, medical images pass through different devices: in this chain an attacker can perform its malicious action. In this paper we propose a method aimed to avoid medical images modifications by means of equivalence checking. Magnetic images are represented as finite state automata and equivalence checking is exploited to check whether the medical resource have been subject to illegal modifications. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1795 / 1802
页数:8
相关论文
共 44 条
[1]  
Al-Qershi O. M., 2010, 2010 IEEE International Conference on Information Theory and Information Security, P151, DOI 10.1109/ICITIS.2010.5688743
[2]   Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images [J].
Al-Qershi, Osamah M. ;
Khoo, Bee Ee .
JOURNAL OF DIGITAL IMAGING, 2011, 24 (01) :114-125
[3]   Generation of game contents by social media analysis and MAS planning [J].
Amato, Flora ;
Moscato, Francesco ;
Xhafa, Fatos .
COMPUTERS IN HUMAN BEHAVIOR, 2019, 100 :286-294
[4]   Improving security in cloud by formal modeling of IaaS resources [J].
Amato, Flora ;
Moscato, Francesco ;
Moscato, Vincenzo ;
Colace, Francesco .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 :754-764
[5]   Model driven design and evaluation of security level in orchestrated cloud services [J].
Amato, Flora ;
Mazzocca, Nicola ;
Moscato, Francesco .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 106 :78-89
[6]   Model transformations of MapReduce Design Patterns for automatic development and verification [J].
Amato, Flora ;
Moscato, Francesco .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2017, 110 :52-59
[7]   An integrated framework for securing semi-structured health records [J].
Amato, Flora ;
De Pietro, Giuseppe ;
Esposito, Massimo ;
Mazzocca, Nicola .
KNOWLEDGE-BASED SYSTEMS, 2015, 79 :99-117
[8]  
[Anonymous], 1989, PRENTICE HALL INT SE
[9]  
[Anonymous], 2014, INT J TELEMEDICINE A
[10]  
[Anonymous], 2019, ARXIV190103597