Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure

被引:0
|
作者
Darwish, Ashraf [1 ]
Hassanien, Aboul Ella [2 ]
Tan, Qing [3 ]
Pal, Nikhil R. [4 ]
机构
[1] Helwan Univ, Fac Sci, Cairo, Egypt
[2] Cairo Univ, Fac Comp Informat, Cairo, Egypt
[3] Athabasca Univ, Athabasca, AB, Canada
[4] Indian Stat Inst, Kolkata, W Bengal, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we present a securing patient medical images and authentication system to increase the security, confidentiality and integrity of medical images transmitted through the Internet. A public key encryption technique was used to encrypt the patient capturing fingerprint and then embed it into the patient medical image. The fingerprint has been encrypted using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then, by embedding the encrypted patient's fingerprint using a technique for digital watermarking in the Discrete Cosine Transform (DCT) domain makes the medical image be robust to several common attacks. The experimental results on different medical imaging modalities demonstrate the efficiency and transparency of the watermarking system.
引用
收藏
页码:27 / 34
页数:8
相关论文
共 50 条
  • [21] DPKI: A Blockchain-Based Decentralized Public Key Infrastructure System
    Papageorgiou, Alexander
    Loupos, Konstantinos
    Mygiakis, Antonis
    Krousarlis, Thomas
    2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,
  • [22] Smart contract assisted blockchain based public key infrastructure system
    Panigrahi, Amrutanshu
    Nayak, Ajit Kumar
    Paul, Rourab
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (01)
  • [23] A Novel Public Key Cryptosystem For Medical Images
    Santhosh, B.
    Viswanath, K.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 11 - 14
  • [24] Securing networked image transmission using public-key cryptography and identity authentication
    Gowda, V. Dankan
    Kumar, Pullela S. V. V. S. R.
    Latha, J.
    Selvakumar, C.
    Shekhar, R.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 779 - 791
  • [25] Securing Telecommunication based on Speaker Voice as the Public Key
    Enayah, Monther Rateb
    Samsudin, Azman
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (03): : 201 - 209
  • [26] PKI-SC: Public Key Infrastructure using Symmetric Key Cryptography for Authentication in VANETs
    Sakhreliya, Sumegha C.
    Pandya, Neha H.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 186 - 191
  • [27] Kerberos based public key authentication protocol
    Sheng, Huanye
    Wang, Jue
    Jisuanji Gongcheng/Computer Engineering, 24 (09): : 39 - 42
  • [28] An image authentication and verification based on public key
    Li Lizong
    Gao Tiegang
    Gu Qiaolun
    Bi Lei
    2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL II, PROCEEDINGS, 2009, : 389 - +
  • [30] The Proposed Public Key Infrastructure Authentication Framework (PKIAF) for Malaysian Government Agencies
    Nor, Noraida Aman
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ibrahim, Roslina
    Maarop, Nurazean
    ADVANCED SCIENCE LETTERS, 2015, 21 (10) : 3161 - 3164