| Literature DB >> 33507698 |
Pavithra Prabhu1, Manjunath K N1, Chitra Rajarama2, Anjali Kulkarni3, Rajendra Kurady4.
Abstract
BACKGROUND: While transmitting the medical images in radiology information systems the adversary effect can break the CIA (Confidentiality, Integrity, and Availability) triads of information security. The objective of the study was to transmit the complete set of image objects in a dataset without data integrity violation.Entities:
Keywords: AES technique; Block Cipher; Digitally Reconstructed Radiograph; Encryption; Zig-Zag pattern
Year: 2021 PMID: 33507698 PMCID: PMC8184166 DOI: 10.31557/APJCP.2021.22.1.185
Source DB: PubMed Journal: Asian Pac J Cancer Prev ISSN: 1513-7368
Figure 1The Image Acquisition in Radio-Diagnosis Using the Spiral Scan Technology and Transmitting the Images Over the Network (CT scan of a patient including the image reconstruction from the projection data) (Image source: (Kalender, 2006))
Figure 2The DRR Image Calculation in a Specific Direction and Applying the Encryption Scheme on the Individual Blocks
Figure 3The 2D X-Ray Image Created from a Dataset of 1000 CT Images of Abdomen Scan which Shows the Large Intestine Distribution (C=-200, W=1500), A. Left-Right view, B. Anterior-Posterior view, and C. Inferior to Superior view
The Comparison of Different Metrics Calculated in the Empirical Testing (Only Ten Datasets are Shown)
| Use cases of image injection techniques | ||||||
|---|---|---|---|---|---|---|
| Dataset | DRR direction | Metric |
|
|
| Inference |
| Colon CT1 | Coronal | ~hist(DRR1,DRR2) | data is modified | |||
| RMSE | 23.4 | 22.6 | 19.61 | data is modified | ||
| Ankle CT1 | Coronal | ~hist(DRR1,DRR2) | data is modified | |||
| RMSE | 28.1 | 26.3 | 18.3 | data is modified | ||
| HeadNeck1 | Coronal | ~hist(DRR1,DRR2) | data is modified | |||
| RMSE | 18.4 | 19.4 | 25.5 | data is modified | ||
| Nasopharynx | Coronal | ~hist(DRR1,DRR2) | data is modified | |||
| RMSE | 32.5 | 29.3 | 17.5 | data is modified | ||
| Colon CT2 | Axial | ~hist(DRR1,DRR2) | data is modified | |||
| RMSE | 12.5 | 13.2 | 22.43 | data is modified | ||
| Colon CT3 | Axial | ~hist(DRR1,DRR2) | data is modified | |||
| RMSE | 33.15 | 31.5 | 19.92 | data is modified | ||
| HeadNeck2 | Sagittal | ~hist(DRR1,DRR2) | data is modified | |||
| RMSE | 24.65 | 26.33 | 22.12 | data is modified | ||
| HeadNeck3 | Axial | ~hist(DRR1,DRR2) | data is modified | |||
| RMSE | 33.21 | 31 | 21.98 | data is modified | ||
| HeadNeck4 | Sagittal | ~hist(DRR1,DRR2) | data is modified | |||
| RMSE | 22.1 | 23.4 | 14.33 | data is modified | ||
| HeadNeck5 | Coronal | ~hist(DRR1,DRR2) | data is modified | |||
| RMSE | 45 | 41.5 | 9.4 | data is modified | ||
Figure 4The Result of the Proposed Method Along with the Image Injection Techniques (addition - row 1, deletion - row 5, and the Modification of Pixel Intensities - row 4. Column (a): The stack of axial CT images of different datasets, Column (b): The DRR image created from the 3D volume. Column (c): Image injection techniques including the addition of image from other datasets, deletion from the existing dataset, and modifying the pixels. Column (d): The DRR image recalculated at the receiver. Column (e): The histogram difference of DRR of each block among sixteen blocks of an image at source and at the destination. Visualization of the images is with colon window settings (0C, 2000W)
Comparison of the Methodology and the Test Cases Reported in Other Literature
| Authors | Methodology | Achieved | Achieved Authenticity | Tested for | Tested for dataset |
|---|---|---|---|---|---|
| Hiba and Ali 2017 | Reversible watermarking technique | Yes | Yes | No | No |
| Fathima and Chitra, 2016 | Quaternation technique | Yes | Yes | Yes | No |
| Petros and mentos, 2016 | ROI Reversible Steganography scheme | Yes | No | Yes | No |
| Anna and sonal 2015 | Elgamal_Discrete Cosine | Yes | Yes | No | No |
| Kobayashi et al., 2009 | Hashing techniques | No | Yes | Yes | No |
| Ali et al., 2015 | AES-Galois + Whirlpool | Yes | Yes | Yes | No |
| Sugnaya and Amudha 2014 | AES+RC4+QIM | Yes | Yes | Yes | No |
| Blackleedge and al-Rawi, 2014 | Stegacryption method | Yes | No | Yes | No |
| Dalel et al., 2011 | RC4+LSB substitution+QIM | Yes | Yes | No | No |
| Puech and Rodrigues, 2014 | Public Key and Secret key ciphering(RSA)+ Watermarking | Yes | Yes | No | No |
| Our study | AES encryption on DRR image | Yes | Yes | Yes | Yes |