Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems

被引:0
作者
Kester, Quist-Aphetsi [1 ,2 ,3 ,4 ]
机构
[1] Ghana Technol Univ, Accra, Ghana
[2] Univ Brest, UMR CNRS 6285, Lab STICC, Brest, France
[3] CRITAC, Satellite Commun & Nav Syst Dept, Accra, Ghana
[4] CRITAC, Directorate Informat Assurance & Intelligence Res, Accra, Ghana
来源
E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2016) | 2018年 / 208卷
关键词
Cloud computing; Medical images; Health information systems; Security; Cryptography; RECORDS;
D O I
10.1007/978-3-319-66742-3_27
中图分类号
F0 [经济学]; F1 [世界各国经济概况、经济史、经济地理]; C [社会科学总论];
学科分类号
0201 ; 020105 ; 03 ; 0303 ;
摘要
Cloud computing has provided tremendous opportunities for a lot of organizations in cutting operating cost, making data available to distributed units, provision of easy interoperability etc. Health information systems forms a critical parts of one's countries information technology infrastructure due to the sensitivity and nature of data processed over time with regards treatment history, medical records etc. And medical images form dominant part of the sensitive patient data. Hence privacy and security needs to be guaranteed for such images stored in the cloud. Most of the access security and encryption approaches are left for the cloud owners to manage and these poses a lot of insecurity if the system is compromised. In our wok, we proposed a hybrid spatial cryptographic and watermarking technique for authentication and security of medical images before storage in the cloud. Due to the sensitive nature of medical images, we were able to achieve full recoverability of the plain image after decryption and dewatermarking without pixel loss. Our results showed to be very effective and reliable for fully recoverable images.
引用
收藏
页码:281 / 291
页数:11
相关论文
共 16 条
  • [1] Abdelhak M., 2015, HLTH INFORM MANAGEME
  • [2] Abokhdair Nuha Omran, 2010, Proceedings of the 2010 6th International Conference on Digital Content, Multimedia Technology and its Applications (IDC 2010), P20
  • [3] Transmission and storage of medical images with patient information
    Acharya, R
    Bhat, PS
    Kumar, S
    Min, LC
    [J]. COMPUTERS IN BIOLOGY AND MEDICINE, 2003, 33 (04) : 303 - 310
  • [4] Anderson R.J., 1996, Security in Clinical Information Systems
  • [5] Ashtiyani M, 2008, 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, P2633
  • [6] Recent advances - Consumer health informatics
    Eysenbach, G
    [J]. BMJ-BRITISH MEDICAL JOURNAL, 2000, 320 (7251): : 1713 - 1716
  • [7] A security architecture for interconnecting health information systems
    Gritzalis, D
    Lambrinoudakis, C
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2004, 73 (03) : 305 - 309
  • [8] Designing a System for Patients Controlling Providers' Access to their Electronic Health Records: Organizational and Technical Challenges
    Leventhal, Jeremy C.
    Cummins, Jonathan A.
    Schwartz, Peter H.
    Martin, Douglas K.
    Tierney, William M.
    [J]. JOURNAL OF GENERAL INTERNAL MEDICINE, 2015, 30 : S17 - S24
  • [9] Big Data Drives Cloud Adoption in Enterprise
    Liu, Huan
    [J]. IEEE INTERNET COMPUTING, 2013, 17 (04) : 68 - 71
  • [10] Adopting electronic medical records in primary care: Lessons learned from health information systems implementation experience in seven countries
    Ludwick, D. A.
    Doucette, John
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2009, 78 (01) : 22 - 31