Literature DB >> 27167526

Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.

Petros L K Mantos1, Ilias Maglogiannis2.   

Abstract

The exchange of medical images over the Internet has evoked significant interest over the past few years due to the introduction of web and cloud based medical information systems. The protection of sensitive data has always been a key indicator in the performance of such systems. In this context, this work presents an algorithm developed for Digital Imaging and Communications in Medicine (DICOM) medical images, which applies secret-sharing steganography methods for ensuring the integrity of sensitive patient data as well as the important parts of the image. In the proposed algorithm, images are divided into two parts: the region of interest (ROI) and the region of non interest (RONI). Patient data and integrity hashes are positioned inside the ROI while the information (map) needed to recover the ROI before insertion is positioned in the RONI. Security of the extraction process is assured through the use of cryptography. The experimental results prove that the original (cover) images and the stego images provide an excellent visual equality result in terms of PSNR. Furthermore, they prove that the proposed scheme can be efficiently used as a steganography scheme in DICOM images with limited smooth areas.

Entities:  

Keywords:  DICOM medical images; Image processing; Secret sharing; Security; Steganography; Watermarking

Mesh:

Year:  2016        PMID: 27167526     DOI: 10.1007/s10916-016-0514-5

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  11 in total

1.  Enabling collaborative medical diagnosis over the Internet via peer-to-peer distribution of electronic health records.

Authors:  Ilias Maglogiannis; Delakouridis Constantinos; Leonidas Kazatzopoulos
Journal:  J Med Syst       Date:  2006-04       Impact factor: 4.460

2.  Multiple image watermarking applied to health information management.

Authors:  Aggeliki Giakoumaki; Sotiris Pavlopoulos; Dimitris Koutsouris
Journal:  IEEE Trans Inf Technol Biomed       Date:  2006-10

Review 3.  A review of image watermarking applications in healthcare.

Authors:  G Coatrieux; L Lecornu; B Sankur; Ch Roux
Journal:  Conf Proc IEEE Eng Med Biol Soc       Date:  2006

4.  A region-based lossless watermarking scheme for enhancing security of medical data.

Authors:  Xiaotao Guo; Tian-Ge Zhuang
Journal:  J Digit Imaging       Date:  2009-03       Impact factor: 4.056

5.  Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes.

Authors:  Jagadish Nayak; P Subbanna Bhat; U Rajendra Acharya; M Sathish Kumar
Journal:  J Med Syst       Date:  2009-06       Impact factor: 4.460

Review 6.  Cloud computing in medical imaging.

Authors:  George C Kagadis; Christos Kloukinas; Kevin Moore; Jim Philbin; Panagiotis Papadimitroulas; Christos Alexakos; Paul G Nagy; Dimitris Visvikis; William R Hendee
Journal:  Med Phys       Date:  2013-07       Impact factor: 4.071

7.  A secure steganography for privacy protection in healthcare system.

Authors:  Jing Liu; Guangming Tang; Yifeng Sun
Journal:  J Med Syst       Date:  2013-01-15       Impact factor: 4.460

8.  Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.

Authors:  Khan Muhammad; Muhammad Sajjad; Sung Wook Baik
Journal:  J Med Syst       Date:  2016-03-19       Impact factor: 4.460

9.  Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images.

Authors:  Osamah M Al-Qershi; Bee Ee Khoo
Journal:  J Digit Imaging       Date:  2009-11-25       Impact factor: 4.056

10.  Free DICOM de-identification tools in clinical research: functioning and safety of patient privacy.

Authors:  K Y E Aryanto; M Oudkerk; P M A van Ooijen
Journal:  Eur Radiol       Date:  2015-06-03       Impact factor: 5.315

View more
  6 in total

1.  A De-Identification Pipeline for Ultrasound Medical Images in DICOM Format.

Authors:  Eriksson Monteiro; Carlos Costa; José Luís Oliveira
Journal:  J Med Syst       Date:  2017-04-13       Impact factor: 4.460

2.  A New Method for Computed Tomography Angiography (CTA) Imaging via Wavelet Decomposition-Dependented Edge Matching Interpolation.

Authors:  Zeyu Li; Yimin Chen; Yan Zhao; Lifeng Zhu; Shengqing Lv; Jiahui Lu
Journal:  J Med Syst       Date:  2016-06-15       Impact factor: 4.460

3.  Secured Medical Images - a Chaotic Pixel Scrambling Approach.

Authors:  M Y Mohamed Parvees; J Abdul Samath; B Parameswaran Bose
Journal:  J Med Syst       Date:  2016-09-21       Impact factor: 4.460

4.  Data Integrity of Radiology Images Over an Insecure Network Using AES Technique.

Authors:  Pavithra Prabhu; Manjunath K N; Chitra Rajarama; Anjali Kulkarni; Rajendra Kurady
Journal:  Asian Pac J Cancer Prev       Date:  2021-01-01

5.  BOOST: Medical Image Steganography Using Nuclear Spin Generator.

Authors:  Bozhidar Stoyanov; Borislav Stoyanov
Journal:  Entropy (Basel)       Date:  2020-04-26       Impact factor: 2.524

6.  Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection.

Authors:  Aleksandra Mileva; Aleksandar Velinov; Vesna Dimitrova; Luca Caviglione; Steffen Wendzel
Journal:  Entropy (Basel)       Date:  2022-01-25       Impact factor: 2.524

  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.