: Meghnad Saha Institute of Technology, Kolkata, India Meghnad Saha Institute of Technology, Kolkata, IndiaMeghnad Saha Institute of Technology, Kolkata, India
The necessity of fast and secure diagnosis is vital in the medical world. Nowadays, the transmission of medical images is a daily routine and it is necessary to find an efficient way to transmit them over the Internet. In this paper we propose a new technique to cipher an image for safe and de-noised transmission employing image cryptography and image to image steganography. The hospitals and health systems in general are entrusted the tedious task of managing and supervising huge volume of medical and patient information. Owing to the extreme popularity and potential of Cloud Computing in recent times, in this paper its usage in secure storage, archiving and accessing of medical images and data is considered as an appealing recourse to the healthcare infrastructure for enhanced patient care.
:Image encryption; Image to Image steganography; Cloud computing
Indrajit Das, Arnab Halder , Sanjoy Roy, Secure Medical Image Sharing and Storing (Image Encryption and Hiding) in Cloud Environment, Advances in Industrial Engineering and Management, vol. 5, no. 2, 2016, pp. 208-213, doi: 10.7508/aiem.2016.02.008
(size: 571.39 kB, 208-213
, Download times:
W. Puech, Image Encryption and Compression for Medical Image Security, proceeding of IEEE Image Processing Theory, Tools & Applications.
M. Yang, L. Song, M. Trifas, D. Buenos-aires, L. Chen, J. Elston, Secure Patient Information and Privacy in Medical Imaging IEEE.
F. Gonzalez and J. Hernandez, 1999. A tutorial on Digital Watermarking, In IEEE annual Carnahan conference on security technology, Spain.
X. P. Zhang, 2011. IEEE signal processing letters, reversible data hiding in encrypted image, vol. 18, no. 4, april 255
J. Eggers, J. Su, B. Girod, 2000. Robustness of a blind image watermarking scheme, Proc. IEEE Int. Conf. on Image Proc., Vancouver.
E. AbuKhousa, N. Mohamed, J. Al-Jaroodi, 2012. e-Health Cloud: Opportunities and Challenges, Future Internet, vol. 4, pp. 621-645.
H. Munchh, U. Engelmann, A. Schroeter, H. Meinzer, 2003. Web-based distribution of radiological images from PACS to EPR, International Congress Series., vol. 1256, pp. 873-879.
S. Boucherkha and M. Benmohamed, 2004. A lossless watermarking based authentication system for medical images, Proc. of International Conf on Computational Intelligence, Istanbul, Turkey, pp. 240-243.
D. Pitt, et al. 2010. Imaging cortical lesions in multiple sclerosis with ultra-high-field magnetic resonance imaging, Archives of Neurology, vol. 67, no. 7, pp. 812-818.
A. K. Al-Frajat and H. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview, Journal of Applied Sciences, , vol. 10, no. 15, pp. 1650-1655.
C. C. Teng, J. Mitchell, C. Walker, A. Swan, C. Davila, 2010. A Medical Image Archive Solution in the Cloud. Software Engineering and Service Sciences (ICSESS), IEEE International Conference, Beijing, China.
O. Shimrat, 2012. Cloud Computing and Health care. Available online: http://www.himss.org/content/files/Code%2093_Shimrat_CloudComputingandHealthcare_2009.pdf.
C. C. Teng, 2010. J. Mitchell, C. Walker, 2010. A Medical Image Archive Solution in the Cloud. In Proceedings of the 2010 IEEE International Conference on Software Engineering and Service Sciences (ICSESS), Beijing, China, vol. 16-18, pp. 431-434
Cloud Computing: Clear Benefits: The Emerging Role of Cloud Computing in Healthcare Information Systems. Availableonline:http://www.techrepublic.com/whitepapers/cloud-computing-clear-benefits-the-emerging-role-of-cloud-computing-in-healthcare informationsystems/2384337 (accessed on 28 June 2012).
A. Kaletsch, and A. Sunyaev, 2011. Privacy Engineering: Personal Health Records in Cloud Computing Environments. In Proceedings of the 32nd International Conference on Information Systems (ICIS 2011), Shanghai, China, vol. 4-7 December, pp. 1-11.
A. Kaletsch and A. Sunyaev, 2011. Privacy Engineering: Personal Health Records in Cloud Computing Environments. In Proceedings of the International Conference on Information Systems (ICIS 2011), Shanghai, China, vol. 4-7 December.
W. Lee and C. Lee, 2008. A cryptographic key management solution for hipaa privacy/security regulations. IEEE Transactions on Information Technology in Biomedicine, vol. 12, no. 1, pp. 34 - 41, 2008.
Maglogiannis, L. Kazatzopoulos, K. Delakouridis, S. Hadjiefthymiades, 2009. Enabling location privacy and medical data encryption in patient telemonitoring systems. IEEETransactions on Information Technology in Biomedicine, vol. 13, no. 6, pp. 946-954.
M. Hu, M. Jiang, Wagner, D. Dong, 2007. Privacy-preserving tele- cardiology sensor networks: toward a lowcost portable wireless hardware/software design.”IEEE Transactions on Information Technology in Biomedicine, vol. 11, no. 6, pp. 619-627.
D. Wang, W. Peng, H. Wang, H. Sharif, A. Chen, H. Khoynezhad, 2010. Resource-aware secure ECG healthcare monitoring through body sensor networks.” Wireless Communications, IEEE, vol. 17, no. 1, pp. 12-19.