8 research outputs found

    Literature Study on Data Protection for Cloud Storage

    Get PDF
    Many data security and privacy incidents are observed in today Cloud services. On the one hand, Cloud service providers deal with    a large number of external attacks. In 2018, a total of 1.5 million Sing Health patients’ non-medical personal data were stolen from the health system in Singapore. On the other hand, Cloud service providers cannot be entirely trusted either. Personal data may be exploited in a malicious way such as in the Face book and Cambridge Analytical data scandal which affected 87 million users in 2018. Thus, it becomes increasingly important for end users to efficiently protect their data (texts, images, or videos) independently from Cloud service providers. In this paper, we aim at presenting a novel data protection scheme by combining fragmentation, encryption, and dispersion with high performance and enhanced level of protection as Literature study

    Securing DICOM images based on adaptive pixel thresholding approach

    Get PDF
    This paper presents a novel efficient two-region Selective encryption approach that exploits medical images statistical properties to adaptively segment Digital Imaging and Communications in Medicine (DICOM) images into regions using thresholding technique in the spatial domain. This approach uses adaptive pixel thresholding, in which thresholds for same DICOM modality, anatomy part and pixel intensities' range were extracted off-line. Then, the extracted thresholds were objectively and subjectively evaluated to select the most accurate threshold for the correspondent pixel intensities' range. In the on-line stage, DICOM images were segmented into a Region Of Interest (ROI) and a Region Of Background (ROB) based on their pixels intensities using the adopted thresholds. After that, ROI was encrypted using Advanced Encryption Standard (AES), while ROB was encrypted using XXTEA. The main goal of the proposed approach is to reduce the encryption processing time overhead in comparison with the Naïve approach; where all image pixels are encrypted using AES. The proposed approach aims to achieve a trade-off between processing time and a high level of security. The encryption time of the proposed approach can save up to 60% of the Naïve encryption time for DICOM images with small-medium ROI

    Literature Study On Cloud Based Healthcare File Protection Algorithms

    Get PDF
    There is a huge development in Computers and Cloud computing technology, the trend in recent years is to outsource information storage on Cloud-based services. The cloud provides  large storage space. Cloud-based service providers such as Dropbox, Google Drive, are providing users with infinite and low-cost storage. In this project we aim at presenting a protection method through by encrypting and decrypting the files to provide enhanced level of protection. To encrypt the file that we upload in cloud, we make use of double encryption technique. The file is been encrypted twice one followed by the other using two algorithms. The order in which the algorithms are used is that, the file is first encrypted using AES algorithm, now this file will be in the encrypted format and this encrypted file is again encrypted using RSA algorithm. The corresponding keys are been generated during the execution of the algorithm. This is done in order to increase the security level. The various parameters that we have considered here are security level, speed, data confidentiality, data integrity and cipher text size. Our project is more efficient as it satisfies all the parameters whereas the conventional methods failed to do so. The Cloud we used is Dropbox to store the content of the file which is in the encrypted format using AES and RSA algorithms and corresponding key is generated which can be used to decrypt the file. While uploading the file the double encryption technique is been implemented

    An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images

    Get PDF
    International audienceReversible data hiding in encrypted images (RDHEI) is an effective technique to embed data in the encrypted domain. An original image is encrypted with a secret key and during or after its transmission, it is possible to embed additional information in the encrypted image, without knowing the encryp-tion key or the original content of the image. During the decoding process, the secret message can be extracted and the original image can be reconstructed. In the last few years, RDHEI has started to draw research interest. Indeed, with the development of cloud computing, data privacy has become a real issue. However, none of the existing methods allow us to hide a large amount of information in a reversible manner. In this paper, we propose a new reversible method based on MSB (most significant bit) prediction with a very high capacity. We present two approaches, these are: high capacity reversible data hiding approach with correction of prediction errors and high capacity reversible data hiding approach with embedded prediction errors. With this method, regardless of the approach used, our results are better than those obtained with current state of the art methods, both in terms of reconstructed image quality and embedding capacity

    Automatic Selective Encryption of DICOM Images

    Get PDF
    Securing DICOM images is essential to protect the privacy of patients, especially in the era of telemedicine and eHealth/mHealth. This increases the demand for rapid security. Nevertheless, a limited amount of research work has been conducted to ensure the security of DICOM images while minimizing the processing time. Hence, this paper introduces a selective encryption approach to reduce the processing time and sustain the robustness of security. The proposed approach selects regions within medical images automatically in the spatial domain using the pixel thresholding segmentation technique, then compresses and encrypts them using different encryption algorithms based on their importance. An adaptive two-region encryption approach is applied to single and multi-frame DICOM images, where the Region of Background (ROB) is encrypted using a light encryption algorithm, while the Region of Interest (ROI) is encrypted using a sophisticated encryption algorithm. For multi-frame DICOM images (Approach I), additional time-saving has been achieved by almost 10,000 times faster than the Naïve encryption approach, and 100 times better compression ratio, using one segmentation map based on a pre-defined reference frame for all the DICOM frames. For single-frame DICOM image (Approach II), a multi-region selective encryption approach is proposed, where the ROI is further split into three regions based on potential security threats, using a mathematical model that guarantees shorter encryption time in comparison with the Naive and the two-region encryption approaches, with almost 47% and 14% saving times, respectively. Based on the estimated processing time, Approach I outperformed Approach II noticeably. Further, cryptanalysis metrics are utilized to evaluate the proposed approaches, which indicate good robustness against a wide variety of attacks.</jats:p

    Crypto-Compression of Medical Images by Selective Encryption of DCT

    No full text
    International audienceThe traffic of digital images has grown rapidly in the Internet. Security of image becomes important for many sectors mainly for medical applications. Nowadays, the transmission of medical images is a daily routine, especially over wireless (battlefields, traffic accidents, etc). Partial encryption is an approach to reduce the computational resources for huge volumes of multimedia data in low power network. This paper presents a method of partial or selective encryption for JPEG images. It is based on encryption of some quantified DCT coefficients in low and high frequencies. We have combined compression and encryption in order to fully dissimulate the visual information of the image and to see the image in low quality resolution
    corecore