- Yun Tan ORCID:orcid.org/0000-0002-9855-823416,
- Jiaohua Qin ORCID:orcid.org/0000-0002-7549-773116,
- Ling Tan ORCID:orcid.org/0000-0002-8779-016917,
- Hao Tang ORCID:orcid.org/0000-0003-2202-051517 &
- …
- Xuyu Xiang ORCID:orcid.org/0000-0002-2778-753116
Part of the book series:Lecture Notes in Computer Science ((LNISA,volume 11065))
Included in the following conference series:
2496Accesses
Abstract
With the development of big data, cloud computing and artificial intelligence, smart healthcare based on Internet plus has become a highly attractive application area. Medical image storage and analysis are progressively becoming cloud-based, providing the preconditions for the efficient cooperation of remote diagnostics and the full sharing of research resources. However, the frequent medical data breach events have greatly infringed on the privacy of users and brought about huge social losses. Therefore, how to strengthen medical images security and privacy protection during transmission, storage and use is very urgent. In this paper, the security requirements of medical images in cloud computing are analyzed. And a survey is introduced focusing on the development status of medical images security techniques in recent 5 years. The open issues of medical image security are also analyzed in this paper, which point out the possible directions for future research.
Supported by the National Natural Science Foundation of China (Grant No.61772561) and the Key Research & Development Plan of Hunan Province (Grant No.2018NK2012).
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 5719
- Price includes VAT (Japan)
- Softcover Book
- JPY 7149
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
United States Department of Health and Human Services. HIPPA: medical privacy national standards to protect the privacy of personal health information.http://www.hhs.gov/ocr/privacy/
Kromtech Security Discovers Health Data Breach of 150K Patients.http://healthitsecurity.com/news/kromtech-security-discovers-health-data-breach-of-150k-patients/
Hacker Might Have Stolen the Healthcare Data for Half of Norway’s Population.http://www.bleepingcomputer.com/news/security/hacker-might-have-stolen-the-healthcare-data-for-half-of-norways-population/
Kavitha, P.K., Saraswathi, P.V.: A survey on medical image encryption. In: 1st International Conference on Applied Soft Computing Techniques, International Journal of Scientific Research in Science and Technology, vol. 3, pp. 1–8. India (2017)
Umamageswari, A., Ferni Ukrit, M., Suresh, G.R.: A survey on security in medical image communication. Int. J. Comput. Appl.30(3), 41–45 (2011)
Mousavi, S.M., Naghsh, A., Abu-Bakar, S.A.: Watermarking techniques used in medical images: a survey. J. Digit. Imaging27(6), 714–729 (2014)
Nazeer, M., Kim, D.G., Nargis, B., Malik, Y.M.: A Fresnelet-based encryption of medical images using Arnold transform. Int. J. Adv. Comput. Sci. Appl.4(3), 131–140 (2013)
Xing, Y.L., Han, B.R., Shi, F.U.: A medical image scrambling method based on Arnold and Knights tour algorithm. J. Suzhou Vocat. Univ.4(3), 20–25 (2015)
Wahballa, O., Wahaballa, A., Li, F., Idris, I.I., Xu, C.: Medical image encryption scheme based on Arnold transformation and ID-AK protocol. Int. J. Netw. Secur.19(5), 76–78 (2017)
Sui, M., Li, J., Dong, C., Bai, Y.: The encrypted watermarking for medical image based on Arnold scrambling and DWT. J. Converg. Inf. Technol.8(5), 893–902 (2013)
Venkateswarlu, L., Reddy, B.E., Rao, N.V.: Arnold-wavelet based robust watermarking technique for medical images. In: International Conference on ICT in Business Industry & Government, pp. 1–5. IEEE, Indore (2016).https://doi.org/10.1109/ICTBIG.2016.7892689
Liu, Y., Li, J.: The medical image watermarking algorithm using DWT-DCT and logistic. In: International Conference on Computing & Convergence Technology, vol. 3(2), pp. 599–603. IEEE, Seoul (2012)
Lu, J., Wang, M., Dai, J., Huang, Q., Li, L., Chang: C.-C.: Multiple watermark scheme based on DWT-DCT quantization for medical images. J. Inf. Hiding Multimed. Signal Process.6(3), 458–472 (2015)
Singh, A.K.: Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed. Tools Appl.76(6), 1–18 (2017)
Fu, C., Meng, W.H., Zhan, Y.F., Zhu, Z.L., Lau, F.C.: An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med.43(8), 1000–1010 (2013)
Zhang, S., Gao, T., Gao, L.: A novel encryption frame for medical image with watermark based on hyperchaotic system. Math. Probl. Eng.1(8), 1–11 (2014)
Chai, X., Cheng, Y.: A novel medical image encryption algorithm based on four-dimensional memristive hyper-chaotic system. Comput. Era5(1), 53–58 (2016)
Kanso, A., Ghebleh, M.: An efficient and robust image encryption scheme for medical applications. Commun. Nonlinear Sci. Numer. Simul.24(3), 98–116 (2015)
Chen, X., Hu, C.J.: Medical image encryption based on multiple chaotic mapping and wavelet transform. Biomed. Res.28(20), 9001–9008 (2017)
Dai, Y., Wang, H., Wang, Y.: Chaotic medical image encryption algorithm based on bit-plane decomposition. Int. J. Pattern Recognit. Artif. Intell.30(4), 643–660 (2016)
Xiao, C., Hu, C.J.: Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J. Biol. Sci.24(8), 62–70 (2017)
Shamir, A.: How to share a secret. Commun. ACM22(11), 612–613 (1979)
Sangeetha, M., Arumugam, C., Senthilkumar, K.M.: Encryption for sharing of secret medical images. Res. J. Biotechnol.10(2), 19–21 (2015)
Ahmad, T., Studiawan, H., Ahmad, H.S., Ijtihadie, R.M., Wibisono, W.: Shared secret-based steganography for protecting medical data. In: International Conference on Computer, pp. 1–5. IEEE, Bandung (2014).https://doi.org/10.1109/IC3INA.2014.7042606
Marwan, M., Kartit, A., Ouahmane, H.: Secure cloud-based medical image storage using secret share scheme. In: International Conference on Multimedia Computing & Systems, pp. 1–5. IEEE, Marrakech (2016).https://doi.org/10.1109/ICMCS.2016.7905649
Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science266(11), 1021–1024 (1994)
Cui, G., Qin, L., Wang, Y., Zhang, X.: Information security technology based on DNA computing. In: IEEE International Workshop on Anti-counterfeiting, pp. 1–3. IEEE, Xiamen (2007).https://doi.org/10.1109/IWASID.2007.373746
Kumar, C.V., Natarajan, V., Poonguzhali, P.: Secured patient information transmission using reversible watermarking and DNA encryp-tion for medical images. Appl. Math. Sci.9(48), 2381–2391 (2015)
Ravichandran, D., Praveenkumar, P., Rayappan, J., Amirtharajan, R.: DNA Chaos blend to secure medical privacy. IEEE Trans. Nanobiosci.16(8), 850–858 (2017)
Akkasaligar, P.T., Biradar, S.: Secure medical image encryption based on intensity level using Chaos theory and DNA cryptography. In: IEEE International Conference on Computational Intelligence & Computing Research, pp. 1–10. IEEE, Chennai (2016).https://doi.org/10.1109/ICCIC.2016.7919681
Anusudha, K., Venkateswaran, N., Valarmathi, J.: Secured medical image watermarking with DNA codec. Multimed. Tools Appl.2(8), 1–22 (2016)
Author information
Authors and Affiliations
Central South University of Forestry and Technology, Changsha, 410004, China
Yun Tan, Jiaohua Qin & Xuyu Xiang
Second Xiangya Hospital of Central South University, Changsha, 410011, China
Ling Tan & Hao Tang
- Yun Tan
You can also search for this author inPubMed Google Scholar
- Jiaohua Qin
You can also search for this author inPubMed Google Scholar
- Ling Tan
You can also search for this author inPubMed Google Scholar
- Hao Tang
You can also search for this author inPubMed Google Scholar
- Xuyu Xiang
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toYun Tan.
Editor information
Editors and Affiliations
Nanjing University of Information Science and Technology, Nanjing, China
Xingming Sun
Nanjing University of Information Science and Technology, Nanjing, China
Zhaoqing Pan
Department of Computer Science, Purdue University, West Lafayette, IN, USA
Elisa Bertino
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Tan, Y., Qin, J., Tan, L., Tang, H., Xiang, X. (2018). A Survey on the New Development of Medical Image Security Algorithms. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_42
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-030-00011-0
Online ISBN:978-3-030-00012-7
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative