Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  A Secure Transmission Approach for Medical Images and Patient's Information by Using Cryptography and Steganography  
  Authors : Jamal N. Bani Salameh
  Cite as:

 

Nowadays many medical images and patient's information are transferred between different parties to be reviewed and evaluated by physicians who are geographically apart. Any illegal modification in this information during transmission may lead to wrong assumptions and wrong diagnosis. Therefore, the security of medical images and patient's information has always been a concern. In this research, we developed a new security system that combines cryptography and steganography techniques to provide a secure distribution for both the medical images and patient's information to the other party over un-secure channel to protect it against attackers. For cryptography we used our encryption algorithm MJEA (for Modified Jamal Encryption Algorithm); it is a symmetric (64-bit) block encryption algorithm with (120-bit) key. For steganography we used a very simple algorithm that hides the patient's information within the medical image by using bit-by-bit Xoring. The proposed system deals with the medical image and patient's information as shares, the first share represents the medical image after it will be encrypted by using MJEA and the second share represents all patient's information embedded in the medical image and encrypted by using MJEA. For more security, before transmit the two shares they will be mixed together by using a scrambling algorithm. We adopted different simulation metrics for evaluating the performance of the proposed system such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and the histogram distribution analysis. For this purpose, the proposed technique was applied on several gray scale medical images with different sizes of patient's information. All experimental results proved the strength of the proposed system in securing both the medical image and patient's information while transmission over unsecure channel. At the receiver side, the proposed system was able to recover back the original medical image and the patient's information that was sent by the sender without any loss.

 

Published In : IJCSN Journal Volume 7, Issue 5

Date of Publication : October 2018

Pages : 289-303

Figures :12

Tables : 03

 

Dr. Jamal N. Bani Salameh : was born in Irbed, Jordan. He received the B.C degree in Electrical Engineering from Mutah University, Jordan, in 1988, M.S. and Ph.D. degrees in Computer Engineering from New Mexico State University, U.S.A, in 2000 and 2005. Dr. Bani Salameh became Associate Professor at the Department of Computer Engineering of Mutah University in 2013 and has published widely in international journals. He now works as Vice Dean of Faculty of Engineering at Mutah University. His research interests are in the fields of wireless computer networks, multicast routing, network security and cryptography. Dr. Bani Salameh held a number of administrative positions including Chairman of the IT Department, SUR College for Applied Sciences, Oman, Sept. 2010 - Aug. 2011, Chairman of the Computer Engineering Department, Mutah University, Jordan, Sept. 2015 - Sept. 2016.

 

Medical image, Patient's information, Data hiding, Telemedicine, Cryptography, Steganography

Medical information and medical images are often closely related to patients' privacies which should be kept secret and need to be protected while transmission over unsecured channel for diagnosis in order to prevent malicious tampering.

 

[1] M. Barni, F. Bartolini, "Data Hiding for Fighting Piracy", IEEE Signal Processing Magazine, Vol. 21, No. 2, 2004, pp. 28-39. [2] V. Fotopoulos, M. Stavrinou, and A. Skodras, "Medical Image Authentication and Self-Correction Through an Adaptive Reversible Watermarking Technique", in Proceedings of the 8th IEEE International Conference on BioInformatics and BioEngineering (BIBE'08), 2008, pp. 1-5. [3] O. Pianykh, Digital Imaging and Communications in Medicine (DICOM), Springer-Verlag, 2012. [4] L. Kobayashi, S. Furuie, and P. Barreto, "Providing Integrity and Authenticity in DICOM Images: A novel Approach", IEEE Transactions on Information Technology in Biomedicine, Vol. 13, Issue. 4, 2009, pp. 582-589. [5] W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, 2013. [6] G. Alvarez, S. Li, and L. Hemandez, "Analysis of Security Problems in A medical Image Encryption System", Computers in Biology and Medicine, Vol. 37, No. 3, 2007, pp. 424-427. [7] U. Acharva, P. Bhat, S. Kumar, and L. Min, "Transmission and Storage of Medical Images with Patient Information", Computers in Biology and Medicine, Vol. 33, No. 4, 2003, pp. 303-310. [8] A. Mahmood, R. Dony, "Segmentation Based Encryption Method for Medical Images", in Proceedings of the 6th International Conference on Internet Technology and Secured Transactions, December 2011. [9] F. Taleb, "A New Chaos Based Image Encryption Scheme Using Chaotic Logistic Maps", in Proceedings of the Multimedia Computing and Systems 2014 International Conference (ICMCS), 2014, pp. 1222-1228. [10] H. Chao, C. CM, S. Miaou, "A Data Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records", IEEE Transactions on Information Technology in Biomedicine, Vol. 6, No. 1, 2002, pp. 46-53. [11] G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, and R. Collorec, "Relevance of Watermarking in Medical Imaging", in: Proceeding of IEEE-EMBS Conference on Information Technology Application in Biomedicine, Arlington, 2000. [12] C. Cruz, R. Reyes, J. Mendoza, M. Nakano, and H. Perez, "A Novel Verification Scheme for Watermarking Based Image Content Authentication Systems", Telecommunications and Radio Engineering, Vol. 67, No. 19, 2008, pp. 1777-1790. [13] A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, "Multiple Image Watermarking Applied to Health Information Management", IEEE Transactions on Information Technology in Biomedicine, Vol. 10, No. 4, 2006, pp. 722-732. [14] D. Nilanjan, P. Moumita , D. Achintya, "A Session Based Blind Watermarking Technique Within the NROI of Retinal Fundus Images for Authentication Using DWT, Spread Spectrum and Harris Corner Detection", International Journal of Modern Engineering Research, Vol. 2, Issue. 3, 2010, pp. 749-757. [15] M. Soliman, A. Hassanien, N. Ghali, and H. Onsi, "An Adaptive Watermarking Approach for Medical Imaging Using Swarm Intelligent", International Journal of Smart Home, Vol. 6, No. 1, 2012, pp. 37- 49. [16] X. Zhou and H. Huang, "Authenticity and Integrity of Digital Mammography Images", IEEE Transactions on Medical Imaging, Vol. 20, No. 8, 2001, pp. 784- 791. [17] M. E. Whitman, H. J. Mattord, Principles of Information Security, Fourth Edition, Course Technology, 2012. [18] P. Hall, Modern Cryptography: Theory and Practice, Hewlett-Packard Company, 2003. [19] M. Juneja , P. Sandhu, "Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption", in Proceedings of the International Conference on Advances in Recent Technologies in Communication and Computing, 2009, pp. 302-305. [20] K. Joshi, R. Yadav, "A New LSB-S Image Steganography Method Blend with Cryptography for Secret Communication", in Proceedings of the Third International Conference on Image Information, 2015, pp. 86-90. [21] Y. Renaer, Z. Zhiwei, T. Shun, D. Shilei, "Image Steganography Combined with DES Encryption Preprocessing", in Proceedings of the Sixth International Conference on Measuring Technology and Mechatronics Automation, 2014, pp. 323-326. [22] S. Ushll, G. Kumal, K. Boopathybagan, "A Secure Triple Level Encryption Method Using Cryptography and Steganography", in Proceedings of the International Conference on Computer Science And Network Technology, 2011, pp. 1017-1020. [23] G. S. Charan, N. Kumar, B. Karthikeyan, V. Yanathan and K. Lakshmi, "A Novel LSB Based Image Steganography with Multi-Level Encryption", International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, 19-20 March 2015. [24] S. Laskar, K. Hemachandran, "High Capacity Data Hiding Using LSB Steganography and Encryption", International Journal of Database Management Systems, Vol. 4, No. 6, 2012, pp. 57-62. [25] W. Al-qwider, J. Bani Salameh, "A Novel Technique for Securing Data Communication Systems by Using Cryptography and Steganography", Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 3, No. 2, 2017, pp. 110-130. [26] X. Zhang, "Reversible data hiding in encrypted image", IEEE Signal Processing Letters, Vol. 18, No. 4, 2011, pp. 255-258. [27] W. Hong, T. Chen, and H. Wu, "An Improved Reversible Data Hiding in Encrypted Images Using Side Match", IEEE Signal Processing Letters, Vol. 19, No. 4, 2011, 2012, pp. 199-202. [28] A. Lavanya and V. Natarajan, "Watermarking Patient Data in Encrypted Medical Images", in Proceedings of the Sadhana-Academy in Engineering Sciences,2012, Vol. 37, pp. 723-729. [29] X. Zhang, "Separable Reversible Data Hiding in Encrypted Image", IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, 2012, pp. 826- 832. [30] D. Bouslimi, G. Coatrieux, M. Cozic, and C. Roux, "A Joint Encryption /Watermarking System for Verifying the Reliability of Medical Images", IEEE Transactions on Information Technology in Biomedicine, Vol. 16, 2012, pp. 891-899. [31] S. Zhang, G. Tiegang, and L. Gao, "A Novel Encryption Frame for Medical Image with Watermark Based on Hyperchaotic System", Mathematical Problems in Engineering, Vol. 11, 2014, https://doi.org/10.1155/2014/240749. [32] W. Puech, "An Efficient Hybrid Method for Safe Transfer of Medical Images", in Proceedings of the 2nd International Conference: E-Medical Systems, 2008, PP. 29-31. [33] A. Umamageswari, U. Ferni, and G. Suresh, "A Survey on Security in Medical Image Communication", International Journal of Computer Applications, Vol. 30, No.3, 2011. [34] D. Bouslimi, and G. Coatrieux, "A joint Watermarking/Encryption Algorithm for Verifying Medical Image Integrity and Authenticity in Both Encrypted and Spatial Domains", in Proceedings of the 33th Annual International Conference of the IEEE- EMBS, Massachusetts USA, 2011. [35] P. Viswanathan and P. Krishna, "Randomized Cryptographic Fusion Watermarking Medical Image with Reversible Property", International Journal of Computer Information Systems, Vol. 2, 2011. [36] J. Bani Salameh, "A New Symmetric-Key Block Ciphering Algorithm", Middle-East Journal of Scientific Research (MEJSR), Vol. 12, No. 5, 2012, pp. 662-673. [37] J. Bani Salameh, "An Investigation of the Use of MJEA in Image Encryption", WSEAS Transactions on Computers, Vol. 15, 2016, pp. 12-23.