Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure

被引:0
|
作者
Darwish, Ashraf [1 ]
Hassanien, Aboul Ella [2 ]
Tan, Qing [3 ]
Pal, Nikhil R. [4 ]
机构
[1] Helwan Univ, Fac Sci, Cairo, Egypt
[2] Cairo Univ, Fac Comp Informat, Cairo, Egypt
[3] Athabasca Univ, Athabasca, AB, Canada
[4] Indian Stat Inst, Kolkata, W Bengal, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we present a securing patient medical images and authentication system to increase the security, confidentiality and integrity of medical images transmitted through the Internet. A public key encryption technique was used to encrypt the patient capturing fingerprint and then embed it into the patient medical image. The fingerprint has been encrypted using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then, by embedding the encrypted patient's fingerprint using a technique for digital watermarking in the Discrete Cosine Transform (DCT) domain makes the medical image be robust to several common attacks. The experimental results on different medical imaging modalities demonstrate the efficiency and transparency of the watermarking system.
引用
收藏
页码:27 / 34
页数:8
相关论文
共 50 条
  • [1] Mutual Authentication in Securing Mobile Payment System using Encrypted QR Code based on Public Key Infrastructure
    Purnomo, Ariana Tulus
    Gondokaryono, Yudi Satria
    Kim, Chang-Soo
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON SYSTEM ENGINEERING AND TECHNOLOGY (ICSET), 2016, : 194 - 198
  • [2] A Public Key Authentication and Privacy Preserving Model for Securing Healthcare System
    Singh, Sarbjeet
    Kumar, Dilip
    IETE JOURNAL OF RESEARCH, 2023, 69 (08) : 5031 - 5043
  • [3] Fast public key infrastructure authentication based on CA caching
    Zhou, Haijian
    Luo, Ping
    Wang, Daoshun
    Dai, Yiqi
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2008, 48 (07): : 1160 - 1164
  • [4] Analysis of public key infrastructure systems for authentication
    Kim, JW
    Cho, HJ
    Hwang, IS
    Park, SY
    Lee, JK
    INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, PROCEEDINGS, 1999, : 187 - 192
  • [5] Analysis and Research of the Internet Real-Name Authentication System based on the Public Key Infrastructure
    Hu, Weixiong
    Cheng, Nanzhen
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III: UNLOCKING THE FULL POTENTIAL OF GLOBAL TECHNOLOGY, 2008, : 261 - 265
  • [6] Public key infrastructure - Securing the exchange of health information
    Van Dyk, J
    M D COMPUTING, 2000, 17 (05): : 44 - 46
  • [7] Special issue: securing computer communications with public key infrastructure
    Katsikas, SK
    Patel, A
    COMPUTER COMMUNICATIONS, 2003, 26 (16) : 1813 - 1814
  • [8] Securing the electronic market:: The KEYSTONE Public Key Infrastructure architecture
    Gritzalis, S
    Katsikas, SK
    Lekkas, D
    Moulinos, K
    Polydorou, E
    COMPUTERS & SECURITY, 2000, 19 (08) : 731 - 746
  • [9] ANFIS optimization-based watermarking for securing integrity of medical images with blockchain authentication
    Awasthi, Divyanshu
    Khare, Priyank
    Srivastava, Vinay Kumar
    Singh, Amit Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [10] Applicability of LTE Public Key Infrastructure based device authentication in Industrial Plants
    Ray, Apala
    Akerberg, Johan
    Bjorkman, Mats
    Blom, Rolf
    Gidlund, Mikael
    39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 510 - 515