Abstract

The transmission of medical records over indiscrete and open networks has caused an increase in fraud involving stealing patients’ information, owing to a lack of security over these links. An individual’s medical documents represent confidential information that demands strict protocols and security, chiefly to protect the individual’s identity. Medical image protection is a technology intended to transmit digital data and medical images securely over public networks. This paper presents some background on the different methods used to provide authentication and protection in medical information security. This work develops a secure cryptography-based medical image reclamation algorithm based on a combination of techniques: discrete cosine transform, steganography, and watermarking. The novel algorithm takes patients’ information in the form of images and uses a discrete cosine transform method with artificial intelligence and watermarking to calculate peak signal-to-noise ratio values for the images. The proposed framework uses the underlying algorithms to perform encryption and decryption of images while retaining a high peak signal-to-noise ratio value. This value is hidden using a scrambling algorithm; therefore, a unique patient password is required to access the real image. The proposed technique is demonstrated to be robust and thus able to prevent stealing of data. The results of simulation experiments are presented, and the accuracy of the new method is demonstrated by comparisons with various previously validated algorithms.

Highlights

  • In the current world, images are captured by digital cameras, camcorders, and scanners and transmitted via social media sites

  • The method is validated by comparing the peak signal-to-noise ratio (PSNR) values and correlation coefficients obtained with multiple images

  • This paper presents a method for encryption and decryption of medical images using discrete cosine transform (DCT)

Read more

Summary

Introduction

Images are captured by digital cameras, camcorders, and scanners and transmitted via social media sites. Embedding an invisible or transparent message in an image is a potential solution to these problems, as it is possible to extract the embedded information to verify the authenticity of the image. The large amounts of data handled in hospitals may sometimes result in the wrong information being distributed to patients, with potentially life-threatening consequences. This necessitates quicker encryption–decryption processing for all images. As low-frequency coefficients are mostly zero after quantization, our suggested approach employs encryption to maintain the high compression ratio of the JPEG method, using a secure cryptosystem. The objective of this work was to provide secure protection and authentication using watermarking and steganography techniques based on DCT.

Objectives
Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.