Medical image security and EPR hiding using Shamir's secret sharing scheme

نویسندگان

  • Mustafa Ulutas
  • Güzin Ulutas
  • Vasif V. Nabiyev
چکیده

Medical applications such as telediagnosis require information exchange over insecure networks. Therefore, protection of the integrity and confidentiality of the medical images is an important issue. Another issue is to store electronic patient record (EPR) in the medical image by steganographic or watermarking techniques. Studies reported in the literature deal with some of these issues but not all of them are satisfied in a single method. A medical image is distributed among a number of clinicians in telediagnosis

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EPR Hidden Medical Image Secret Sharing using DNA Cryptography

Security of medical images is an important issue, since applications such as Tele diagnosis exchange information over insecure communication channels. In this paper, Shamir secret sharing algorithm combined with DNA cryptography is proposed. The method involves the dispersion of medical image and Electronic Patient Record (EPR) into shadow images, aiming at better security characteristics. The ...

متن کامل

Medical Image Dispersal using Enhanced Secret Sharing Threshold Scheme

Security on digital medical image storage system has become a significant concern in today’s healthcare institution. Picture Archiving and Communication (PACS) which is one of current conventional storage systems for digital medical images, faced with several security issues. It fails to guarantee digital medical image survivability, confidentiality and integrity. Based on this issue this study...

متن کامل

Nonlinear Secret Image Sharing Scheme

Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique ...

متن کامل

Authentication of Grayscale Images and Data Repairing Using Secret Sharing Method

Digital images are used to safeguard confidential & important information. But the problem is providing authentication, integrity and data security to these digital images. In existing techniques of security and authentication conventional watermarking schemes are used. In these techniques cryptography is the basic method adopted which has problem of tampering of information easily by hackers. ...

متن کامل

A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions

A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Systems and Software

دوره 84  شماره 

صفحات  -

تاریخ انتشار 2011