Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure

被引:0
|
作者
Darwish, Ashraf [1 ]
Hassanien, Aboul Ella [2 ]
Tan, Qing [3 ]
Pal, Nikhil R. [4 ]
机构
[1] Helwan Univ, Fac Sci, Cairo, Egypt
[2] Cairo Univ, Fac Comp Informat, Cairo, Egypt
[3] Athabasca Univ, Athabasca, AB, Canada
[4] Indian Stat Inst, Kolkata, W Bengal, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we present a securing patient medical images and authentication system to increase the security, confidentiality and integrity of medical images transmitted through the Internet. A public key encryption technique was used to encrypt the patient capturing fingerprint and then embed it into the patient medical image. The fingerprint has been encrypted using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then, by embedding the encrypted patient's fingerprint using a technique for digital watermarking in the Discrete Cosine Transform (DCT) domain makes the medical image be robust to several common attacks. The experimental results on different medical imaging modalities demonstrate the efficiency and transparency of the watermarking system.
引用
收藏
页码:27 / 34
页数:8
相关论文
共 50 条
  • [41] Securing communication by attribute-based authentication in HetNet used for medical applications
    Tufail A. Lone
    Aabid Rashid
    Sumeet Gupta
    Sachin Kumar Gupta
    Duggirala Srinivasa Rao
    Mohd Najim
    Ashutosh Srivastava
    Abhishek Kumar
    Lokendra Singh Umrao
    Achintya Singhal
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [42] Securing communication by attribute-based authentication in HetNet used for medical applications
    Lone, Tufail A.
    Rashid, Aabid
    Gupta, Sumeet
    Gupta, Sachin Kumar
    Rao, Duggirala Srinivasa
    Najim, Mohd
    Srivastava, Ashutosh
    Kumar, Abhishek
    Umrao, Lokendra Singh
    Singhal, Achintya
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [43] A Modified Securities Model Based on Public Key Infrastructure
    Tan, Wuzheng
    Xie, Yongquan
    Li, Dan
    Liu, Mei
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL III, 2010, : 123 - 126
  • [44] Scheme of Electronic Seal Based on Public Key Infrastructure
    Zhang Jiuhua
    2008 WORKSHOP ON POWER ELECTRONICS AND INTELLIGENT TRANSPORTATION SYSTEM, PROCEEDINGS, 2008, : 61 - 64
  • [45] A Collaborative Modeling Platform Based on Public Key Infrastructure
    Tan, Wuzheng
    Yang, Maojiang
    Ye, Feng
    Ren, Wei
    2009 IITA INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS ENGINEERING, PROCEEDINGS, 2009, : 203 - 206
  • [46] A Modified Securities Model Based on Public Key Infrastructure
    Tan, Wuzheng
    Xie, Yongquan
    Li, Dan
    Liu, Mei
    APPLIED INFORMATICS AND COMMUNICATION, PT III, 2011, 226 : 252 - +
  • [47] NPKI: Nested certificate based public key infrastructure
    Levi, A
    Caglayan, MU
    ADVANCES IN COMPUTER AND INFORMATION SCIENCES '98, 1998, 53 : 397 - 404
  • [48] A Realistic Lightweight Authentication Protocol for Securing Cloud based RFID System
    Surekha, B.
    Narayana, K. Lakshmi
    Jayaprakash, P.
    Vorugunti, Chandra Sekhar
    2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2016, : 54 - 60
  • [49] Android-Based Token Authentication for Securing The Online Transaction System
    Wahjuni, Sri
    Pristian, Rizky
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 174 - 177
  • [50] Trustful: A Decentralized Public Key Infrastructure and Identity Management System
    Dua, Amit
    Barpanda, Siddharth Sekhar
    Kumar, Neeraj
    Tanwar, Sudeep
    2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2020,