Abstract

In medical practice, the scanned image of the patient between the patient and the doctor is confidential. If info is stored on a single server and the server is successfully attacked, it is possible to expose confidential information. Password encryption and data authentication are commonly used to protect patient data, however, encryption and data authentication are computationally expensive and take time to execute on a mobile device. In addition, it is not easy for the patient details related to medical images to leak if the hacked image are not visual.Therefore, in this paper, we propose a way to make medical images remain untouched in this sense. We use our method to quickly create two shadows from two medical images and store them on two servers. Revealing a shadow image does nothing to compromise the confidentiality of a patient’s health. This method is based on Hamming code. With low computational cost, the proposed scheme is suitable for tablet, pamphlets and other mobile devices.

Highlights

  • Medical images play a major role in precise and detailed diagnoses nowadays

  • We propose a scheme, which creates shadow images from medical images and stores them in different databases

  • We theoretically prove that our scheme based on (7,4) Hamming code is a (2,2) secret sharing scheme satisfying the threshold condition, which only two shadows S1 and S2 can collaborate to recover the original images I1 and I2

Read more

Summary

Introduction

Doctors rely on them to figure out patients’ illnesses and devise treatment programs. The images contain a lot of information regarding the patients’ health conditions. The law mandates the confidentiality of patients’ medical records. Only made available to the doctors involving in the treatment of a patient. Image confidentiality is often achieved by employing cryptographic encryption and data authentication mechanisms [1,2,3,4]. These methods are known to require a large amount of computing power, and encryption/decryption takes a long time to execute, especially on power-limited mobile devices such as tablets and phablets. A swift response cannot be provided to doctors

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call