Advertisement

Secured Image Transmission in Medical Imaging Applications—A Survey

  • Pavithra Prabhu
  • K. N. ManjunathEmail author
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 31)

Abstract

Radiology Information Systems (RIS) involves the transmission of medical images between the PACS server and the workstation over the network for analysis. The images during transmission are vulnerable due to the intruders, and it is essential to secure the images. Because processing the adulterated images is unethical and can mislead the radio diagnosis. The combination of image processing and the cryptographic techniques can resolve this problem to some extent. Over a period, the technology has improved a lot, and several images securing methods are discussed by various researchers. This review paper is an effort in reviewing the existing secured image transmission technologies, their pros, and cons and the scope of the future work.

Keywords

DICOM Medical image exchanging Watermarking techniques Joint encryption 

References

  1. 1.
    The DICOM chapter 3 (2012). PS 3.3. [Online] Virginia: NEMA USA, pp 390–1174. http://dicom.nema.org/standard.html [Accessed 19 June. 2016]
  2. 2.
    Bouslimi D, Coatrieux G, Roux C (2011) Joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echo graphic images. Comput Methods Prog Biomed Elsevier 45–47Google Scholar
  3. 3.
    Stallings W (2010) Cryptography and network security, Pearson, 5th ed pp 91–430Google Scholar
  4. 4.
    Suganya G, Amudha K (2014) Medical image integrity control using joint watermarking techniques. In: International conference on green computing communication and electrical engineering (ICGCCEE)Google Scholar
  5. 5.
    Fathima Nasreen K, Chitra P (2016) A robust encryption and digital watermarking scheme for DICOM images using quaternation and DWT-SVD. In: International conference on green engineering and technologies (IC-GET)Google Scholar
  6. 6.
    Dzwonkowski M, Papaj M, Rykaczewski R (2015) A new quaternion based encryption method for DICOM images. IEEE Trans Image Process 24:11MathSciNetCrossRefGoogle Scholar
  7. 7.
    Abdel-Nabi H, Al-Haj A (2017) Efficient joint encryption and data hiding algorithm medical images security. In: 8th international conference on information and communication systems (ICICS)Google Scholar
  8. 8.
    Mehto A, Mehra N (2015) Adaptive lossless medical image watermarking algorithm based on DCT and DWT. In: International conference on Information and Privacy, Nagpur IndiaGoogle Scholar
  9. 9.
    Mantos PL, Maglogiannis I (2016) Sensitive patient data hiding using a ROI Reversible steganography scheme for DICOM images. J Med Syst.  https://doi.org/10.1007/s10916-016-0514-5
  10. 10.
    Kundu MK, Das S (2010) Lossless ROI medical image watermarking technique with enhanced security and high pay load embedding capacity. In: International conference on pattern recognisationGoogle Scholar
  11. 11.
    Babu A, Ayyappan S (2015) A reversible crypto-watermarking system for secure medical image transmission. In: IEEE INDICONGoogle Scholar
  12. 12.
    Liao X et al (2017) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng. http://dx.doi.org/10.1016/j.compeleceng.2017.08.020
  13. 13.
    Sarani N, Amudha K (2015) A security technique based on watermarking and encryption for medical images. In: IEEE sponsored conference ICIIECSGoogle Scholar
  14. 14.
    Kobayashi L, Furuie S, Barreto P (2009) Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13(4):582–589CrossRefGoogle Scholar
  15. 15.
    Al-Haj A, Abandah G, Hussein N (2015) Crypto based algorithms for secured medical image transmission. Instit Eng Technol (IET) J 9(6):365–373CrossRefGoogle Scholar
  16. 16.
    Dworki M (2007) Recommendation for block cipher modes of operation: Galois/countermode (GCM) and GMAC (NIST Special Publication, 800–38D)Google Scholar
  17. 17.
    Barreto P, Rijmen V (2003) The WHIRLPOOL hashing function. http://planeta.terra.com.br/informatica/paulobarreto/whirlpool.zip
  18. 18.
    Natsheh N, Li B, Gale AG (2016) Security of multi-frame DICOM images using X-OR encryption approach. In: International conference on medical imaging understanding and analysisGoogle Scholar
  19. 19.
    Puech W, Rodrigues M (2004) A new crypto-watermarking method for medical images safe transfer. In: 12th European signal processing conferenceGoogle Scholar
  20. 20.
    Blackledge J, Al-Rawi A, Tobin P (2014) Stegacryption of DICOM metadata. In: 25th IET irish signals & systems conference 2014 and 2014 China-Ireland international conference on information and communications technologies (ISSC 2014/CIICT 2014)Google Scholar
  21. 21.
    Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved Elgamal encryption technique. Optik 147(2017):88–102CrossRefGoogle Scholar
  22. 22.
    Ulutas M, Ulutas G, Nabiyev VV (2011) Medical image security and EPR using Shamir’s secrete sharing scheme. J Syst Softw 84 (2011):341–353Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringManipal Institute of Technology, Manipal Academy of Higher EducationManipalIndia

Personalised recommendations