1,062 research outputs found

    New Watermarking/Encryption Method for Medical Imaging FULL Protection in m-Health

    Get PDF
    In this paper, we present a new method for medical images security dedicated to m-Health based on a combination between a novel semi reversible watermarking approach robust to JPEG compression, a new proposed fragile watermarking and a new proposed encryption algorithm. The purpose of the combination of these three proposed algorithms (encryption, robust and fragile watermarking) is to ensure the full protection of medical image, its information and its report in terms of confidentiality and reliability (authentication and integrity). A hardware implementation to evaluate our system is done using the Texas instrument C6416 DSK card by converting m-files to C/C++ using MATLAB coder. Our m-health security system is then run on the android platform. Experimental results show that the proposed algorithm can achieve high security with good performance

    Using digital watermarking to enhance security in wireless medical image transmission

    Get PDF
    This is the published version of the article. Copyright 2010 Mary Ann Liebert Inc.During the last few years, wireless networks have been increasingly used both inside hospitals and in patients’ homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. Methods: We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. Results: The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. Discussion: The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.The General Secretariat for Research and Technology of the Hellenic Ministry of Development and the British Council

    Lime: Data Lineage in the Malicious Environment

    Full text link
    Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. The threat now extends to our personal lives: a plethora of personal information is available to social networks and smartphone providers and is indirectly transferred to untrustworthy third party and fourth party applications. In this work, we present a generic data lineage framework LIME for data flow across multiple entities that take two characteristic, principal roles (i.e., owner and consumer). We define the exact security guarantees required by such a data lineage mechanism toward identification of a guilty entity, and identify the simplifying non repudiation and honesty assumptions. We then develop and analyze a novel accountable data transfer protocol between two entities within a malicious environment by building upon oblivious transfer, robust watermarking, and signature primitives. Finally, we perform an experimental evaluation to demonstrate the practicality of our protocol

    A Secured Joint Encrypted Watermarking In Medical Image Using Block Cipher Algorithm

    Get PDF
    ABSTRACT At present year, most of the hospitals and diagnostic centre have exchanging the biomedical information through wireless media. reliability of the information can be verified by adding ownership data as the watermarking and encryption in the original information. In our proposed work, a joint encryption/watermarking system for the purpose of protecting medical image. This system based on approach which combines a substitutive watermarking algorithm with an encryption algorithm, advanced encryption standard (AES) in counter mode. If the watermarking and encryption are conducted jointly at the protection stage, watermark extraction and decryption can be applied independently. The capability of our system to securely make available security attributes in encrypted domains while minimizing the elapsed time. Furthermore, by making use of the AES algorithm in counter (CTR) mode make our compliant with the DICOM (Digital Imaging and Communications in Medicine) standard
    • …
    corecore