Abstract
Security of medical images and relevant patient information is a matter of important concern while using public networks for transfer of medical images between patients and clinicians. Clinicians require to confirm the legitimacy of patient medical images for applications such as telediagnosis and teleconsultation. Furthermore, medical image should not be perceivable to unauthorized parties with malicious intentions on the patient’s health. As a result, medical images must be protected with suitable primitives while transferring them over public channel. In this paper, we present a scheme for protecting medical images using a threshold secret sharing scheme. The proposed scheme protects images from unauthorized access and intermediate tampering, thus, ensuring confidentiality and integrity of the shared images and associated patient records. The scheme takes into consideration the possibility of malevolence from any of the participating clinicians and detects and identifies cheating among the clinicians, if any. The proposed scheme is analyzed and simulated with electronic patient records and the experimental results satisfy all the properties of the scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
A. Shamir. How to share a secret. In: Communications of the ACM, 22(11):612–613, 1979.
M. Tompa and H. Woll. How to share a secret with cheaters. In: Journal of Cryptology, 1(2):133–138, 1988.
I. C. Lin. A \((t, n)\) Threshold Secret Sharing System With Efficient Identification Of Cheaters. In: Computing and Informatics, 24:529–541, 2005.
T. C. Wu and T. S. Wu. Cheating detection and cheater identification in secret sharing schemes. In: IEEE Proceedings of Computers and Digital Techniques,142(5):367–369, 1995.
C. C. Chang, P. Y. Lina, Z. H. Wangb, and M. C. Lib. A Sudoku-based Secret Image Sharing Scheme with Reversibility. In: Journal of Communications, 5(1):5–12, 2010.
E. B. Abdelsatir, S. Salahaldeen, H. Omar, and A. Hashim. A Novel \((k, n)\) Secret Sharing Scheme from Quadratic Residues for Grayscale Images. In: International Journal of Network Security and Its Applications, 6(4), 2014.
M. Ulutas, G. Ulutas, and V. Nabiyev. Medical image security and EPR hiding using Shamir’s secret sharing scheme. In: Journal of Systems and Software, 84:341–353, 2011.
M. Saeedand H. S. Shahhoseini, and A. Mackvandi. An improved two-party Password Authenticated Key Exchange protocol without server’s public key. In Proceedings of the IEEE International Conference on Communication Software and Networks, pp. 90–95, 2011.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer India
About this paper
Cite this paper
Krishnan, A., Das, M.L. (2017). Medical Image Security with Cheater Identification Using Secret Sharing Scheme. In: Lobiyal, D., Mohapatra, D., Nagar, A., Sahoo, M. (eds) Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Lecture Notes in Electrical Engineering, vol 395. Springer, New Delhi. https://doi.org/10.1007/978-81-322-3592-7_12
Download citation
DOI: https://doi.org/10.1007/978-81-322-3592-7_12
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-3590-3
Online ISBN: 978-81-322-3592-7
eBook Packages: EngineeringEngineering (R0)