DocumentCode
3608087
Title
Crypto-based algorithms for secured medical image transmission
Author
Al-Haj, Ali ; Abandah, Gheith ; Hussein, Noor
Author_Institution
Comput. Eng., Princess Sumaya Univ., Amman, Jordan
Volume
9
Issue
6
fYear
2015
Firstpage
365
Lastpage
373
Abstract
Booming telemedicine applications makes it deemed necessary to provide security services for such applications. The algorithms proposed in this field can be grouped into three classes: watermarking-based algorithms, crypto-based algorithms and hybrid algorithms. In this study, the authors propose two crypto-based algorithms capable of providing confidentiality, authenticity and integrity services to medical images exchanged in telemedicine applications. Strong cryptographic functions with internally generated symmetric keys and hash codes are used. The advanced encryption standard-Galois counter mode is used with the whirlpool hash function to provide confidentiality and authenticity, and the elliptic curve digital signature algorithm is used to provide authenticity and integrity. The proposed algorithms are based on the digital imaging and communication in medicine (DICOM) standard; however, unlike the standard, the algorithms provide confidentiality, authenticity and integrity for the header data, as well as for the pixel data of the DICOM images. Effectiveness of the proposed algorithms is evaluated and demonstrated through extensive experimentation using a benchmark set of DICOM images.
Keywords
image watermarking; medical image processing; public key cryptography; telemedicine; visual communication; DICOM standard; advanced encryption standard-Galois counter mode; authenticity services; confidentiality services; crypto-based algorithm; cryptographic functions; digital imaging and communication in medicine standard; elliptic curve digital signature algorithm; hash codes; header data; hybrid algorithm; integrity services; pixel data; secured medical image transmission; symmetric keys; telemedicine applications; watermarking-based algorithm; whirlpool hash function;
fLanguage
English
Journal_Title
Information Security, IET
Publisher
iet
ISSN
1751-8709
Type
jour
DOI
10.1049/iet-ifs.2014.0245
Filename
7295676
Link To Document