DocumentCode :
3608087
Title :
Crypto-based algorithms for secured medical image transmission
Author :
Al-Haj, Ali ; Abandah, Gheith ; Hussein, Noor
Author_Institution :
Comput. Eng., Princess Sumaya Univ., Amman, Jordan
Volume :
9
Issue :
6
fYear :
2015
Firstpage :
365
Lastpage :
373
Abstract :
Booming telemedicine applications makes it deemed necessary to provide security services for such applications. The algorithms proposed in this field can be grouped into three classes: watermarking-based algorithms, crypto-based algorithms and hybrid algorithms. In this study, the authors propose two crypto-based algorithms capable of providing confidentiality, authenticity and integrity services to medical images exchanged in telemedicine applications. Strong cryptographic functions with internally generated symmetric keys and hash codes are used. The advanced encryption standard-Galois counter mode is used with the whirlpool hash function to provide confidentiality and authenticity, and the elliptic curve digital signature algorithm is used to provide authenticity and integrity. The proposed algorithms are based on the digital imaging and communication in medicine (DICOM) standard; however, unlike the standard, the algorithms provide confidentiality, authenticity and integrity for the header data, as well as for the pixel data of the DICOM images. Effectiveness of the proposed algorithms is evaluated and demonstrated through extensive experimentation using a benchmark set of DICOM images.
Keywords :
image watermarking; medical image processing; public key cryptography; telemedicine; visual communication; DICOM standard; advanced encryption standard-Galois counter mode; authenticity services; confidentiality services; crypto-based algorithm; cryptographic functions; digital imaging and communication in medicine standard; elliptic curve digital signature algorithm; hash codes; header data; hybrid algorithm; integrity services; pixel data; secured medical image transmission; symmetric keys; telemedicine applications; watermarking-based algorithm; whirlpool hash function;
fLanguage :
English
Journal_Title :
Information Security, IET
Publisher :
iet
ISSN :
1751-8709
Type :
jour
DOI :
10.1049/iet-ifs.2014.0245
Filename :
7295676
Link To Document :
بازگشت