Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images
详细信息    查看全文
  • 作者:Ali Al-Haj (1)

    1. Department of Computer Engineering
    ; King Abdullah II Faculty of Engineering ; Princess Sumaya University for Technology ; Al-Jubeiha ; PO Box 1438 ; Amman ; 11941 ; Jordan
  • 关键词:Cryptography ; Telemedicine ; DICOM ; Confidentiality ; Integrity ; Authenticity
  • 刊名:Journal of Digital Imaging
  • 出版年:2015
  • 出版时间:April 2015
  • 年:2015
  • 卷:28
  • 期:2
  • 页码:179-187
  • 全文大小:1,242 KB
  • 参考文献:1. Raghupathi, W, Tan, J (2002) Strategic IT applications in health care. Commun ACM 45: pp. 56-61 CrossRef
    2. Huang, H (1999) PACS鈥擝asic principles and applications. Wiley, New York
    3. Ashley R: Telemedicine: Legal, ethical and liability considerations. J Am Diet Assoc 102: no.2, 2002.
    4. The Health Insurance Portability and Accountability Act (HIPAA), March 2009. [Online]. Available at http://www.hhs.gov/ocr/ privacy/index.html
    5. Chao, H, Hsu, C, Miaou, S (2002) A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6: pp. 46-53 CrossRef
    6. Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. In: Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine, Arlington, USA, Nov. 2000, pp. 250鈥?55
    7. Coatrieux G, Lecornu L, Sankur B, Roux Ch: A review of image watermarking applications in healthcare. In: Porc. of IEEE-EMBC Conf., New York, USA, 2006, pp. 4691鈥?694
    8. Giakoumaki, A, Pavlopoulos, S, Koutsouris, D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10: pp. 722-732 CrossRef
    9. Zhou, XQ, Huang, HK, Lou, SL (2001) Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20: pp. 784-791 CrossRef
    10. Guo, X, Zhuang, T (2009) Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22: pp. 620-628 CrossRef
    11. Thodi, D, Rodr铆guez, J (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16: pp. 721-730 CrossRef
    12. Celik, M, MU, G, Sharma, A, Tekalp, (2006) Lossless watermarking for image authentication: A new framework and an implementation. IEEE Trans Image Process 15: pp. 1042-1049 CrossRef
    13. Liew, S, Zain, J (2011) Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 24: pp. 114-125 CrossRef
    14. Osamah, M, Khoo, B (2011) Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24: pp. 114-125 CrossRef
    15. Pianykh, O (2012) Digital Imaging and Communications in Medicine (DICOM). Springer, Berlin Heidelberg CrossRef
    16. Digital Imaging and Communications in Medicine (DICOM) Standard, DICOM. (2006). [Online]. Available at http://medical.nema.org/dicom/2006/
    17. Digital Imaging and Communications in Medicine (DICOM), part 15: Security profiles ed., National Electrical Manufacturers Association (NEMA), 2001, PS 3.15鈥?001
    18. Kobayashi, L, Furuie, S, Barreto, P (2009) Providing integrity and authenticity in DICOM images: A novel approach. IEEE Trans Inf Technol Biomed 13: pp. 582-589 CrossRef
    19. Security and Privacy: An Introduction to HIPAA, Privacy and Security Committee, Medical Imaging Informatics Section, NEMA [Online]. Available at http://medical.nema.org/privacy/privacy.html
    20. Digital Imaging and Communications in Medicine (DICOM) Supplement 55: Attribute Level Confidentiality DICOM Standards Committee, Working Group 14 Security 1300 N. 17th Street, Suite 1847 Rosslyn, Virginia 22209 USA VERSION: Final Text (Draft), 5 Sept. 2002 Security Supplement. Available at http://medical.nema.org/
    21. NEMA Standards Publication, Digital Imaging and Communications in Medicine (DICOM) Supplement 142: Clinical Trial De-Identification Profiles, Version 3, National Electrical Manufacturers Association, Washington, 2008
    22. Bendel and Mike: Hackers describe PS3 security as epic fail, gain unrestricted access. / Exophase.com, 2010
    23. Elbirt, J (2009) Understanding and Applying Cryptography and Data Security. CRC Press, USA
    24. Dworki M: Recommendation for block cipher modes of operation: Galois/Counter Mode (GCM) and GMAC. / NIST Special Publication, 800-38D, 2007
    25. Gueron and Shay: AES-GCM for efficient authenticated encryption鈥攅nding the reign of HMAC-SHA-1? In: Workshop on Real-World Cryptography, Stanford, USA, 2013
    26. Barreto P, Rijmen V, The WHIRLPOOL hashing function [online]. Available at http://planeta.terra.com.br/informatica/paulobarreto/whirlpool.zip. 2003
    27. Caelli, W, Dawson, E, Rea, S (1999) Elliptic curve cryptography, and digital signatures. Comput Secur 18: pp. 47-66 CrossRef
    28. Cook D, Ioannidis J, Keromytis A, Luck J: CryptoGraphics: Secret key cryptography using graphics cards. In: Proceedings of the Cryptographers鈥?Track at the RSA Conference, San Francisco, CA, USA, 2005, pp. 1鈥?8. The paper is published in the series Lecture Notes in Computer Science Volume 3376, 2005, pp 334鈥?50
  • 刊物类别:Medicine
  • 刊物主题:Medicine & Public Health
    Imaging and Radiology
  • 出版者:Springer New York
  • ISSN:1618-727X
文摘
Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality for the header data of the image but not for the pixel data. On the other hand, it offers mechanisms to achieve authenticity and integrity for the pixel data but not for the header data. In this paper, we propose a crypto-based algorithm that provides confidentially, authenticity, and integrity for the pixel data, as well as for the header data. This is achieved by applying strong cryptographic primitives utilizing internally generated security data, such as encryption keys, hashing codes, and digital signatures. The security data are generated internally from the header and the pixel data, thus a strong bond is established between the DICOM data and the corresponding security data. The proposed algorithm has been evaluated extensively using DICOM images of different modalities. Simulation experiments show that confidentiality, authenticity, and integrity have been achieved as reflected by the results we obtained for normalized correlation, entropy, PSNR, histogram analysis, and robustness.
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.