Abstract

Telemedicine applications are more and more used due to the rapid development of digital imaging and information and communication technologies. Medical information which include digital medical images and patient’s information are extracted and transmitted over insecure networks for clinical diagnosis and treatments. Digital watermarking is one of the main approaches used to ensure the security of medical images. Nevertheless, in some cases, the only use of digital watermarking is not sufficient to reach a high level of security. Indeed, the watermark could carry essential patient information and needs to be protected. In such cases, cryptography may be used to protect the watermark and to improve the overall secured management in the medical environment. In this paper, we propose a clone-resistant watermarking approach combining a difference expansion watermarking technique with a cryptographic technique based on secret keys generated by a clone-resistant device called Secret Unknown Ciphers (SUCs). The use of SUCs to sign the watermark enforces the security of medical images during their transfer and storage. Experimental results show that the system provides a high level of security against various forms of attacks.

Highlights

  • In the universal declaration of human rights, health and medical care are considered as fundamental rights of humans [1]

  • We have proposed a clone-resistant watermarking approach for telemedicine applications

  • Unknown Ciphers (SUCs) of the medical device to sign the watermark in order to generate a one-time watermark signature

Read more

Summary

Introduction

In the universal declaration of human rights, health and medical care are considered as fundamental rights of humans [1]. The concatenation operator links the algorithm after signing a hashed value of the original medical image. The concatenation operator original medical image and the digital signature to generate a signed image. Links the original medical image and the digital signature to generate a signed image. The presented digital signature scheme deploys a hash function and asymmetric original medical image. The asymmetric encryption algorithms are considered as intensive techniques, relatively slow, and a certificate authority is required to manage the public computationally intensive techniques, relatively slow, and a certificate authority is required to keys [13]

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.