Virtual microscopy and public-key cryptography for Internet telepathology

被引:24
|
作者
Strauss, JS [1 ]
Felten, CL [1 ]
Okada, DH [1 ]
Marchevsky, AM [1 ]
机构
[1] Cedars Sinai Med Ctr, Dept Pathol & Lab Med, Los Angeles, CA 90048 USA
关键词
D O I
10.1258/1357633991933404
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The Internet is a potentially inexpensive, widely available medium for telepathology, but there are concerns about its reliability and security. Using a digital camera, 41 photomicrographs of transbronchial biopsies, at x 100 optical magnification, were captured and digitized at 2700 x 3400 pixel, 24 bit/pixel resolution. The image files were saved in JPEG format at medium compression, attached to text files with patient information, encrypted for security in the S/MIME format using a digital signature and digital envelope, and transmitted by email. Received email files were decrypted automatically and the images viewed with standard software. Telepathology diagnoses were compared with original interpretations. The images averaged 810 kByte in size. The encryption and decryption did not cause significant delays in overall transmission time and, together with transmission, did not produce noticeable image degradation. The received image files could be viewed in a manner that simulated light microscopy. There was agreement between telepathology and original diagnoses in 92% of the cases. All the discrepancies were due to inadequate area selection because the pathological features of interest were present in histological levels other than those photographed. The use of high-resolution digital photomicrography, the Internet and public-key cryptography offers an effective and relatively inexpensive method of telepathology consultation. The method is best suited for the diagnosis of small biopsy specimens that require the transmission of only a few digital images that represent the majority of the biopsy materials.
引用
收藏
页码:105 / 110
页数:6
相关论文
共 50 条
  • [1] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    [J]. AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [2] THE ADOLESCENCE OF PUBLIC-KEY CRYPTOGRAPHY
    DIFFIE, W
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 2 - 2
  • [3] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    [J]. SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &
  • [4] Public-key cryptography and availability
    Stabell-Kulo, T
    Lupetti, S
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 222 - 232
  • [5] UNTANGLING PUBLIC-KEY - CRYPTOGRAPHY
    SCHNEIER, B
    [J]. DR DOBBS JOURNAL, 1992, 17 (05): : 16 - &
  • [6] NONINTERACTIVE PUBLIC-KEY CRYPTOGRAPHY
    MAURER, UM
    YACOBI, Y
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 498 - 507
  • [7] PUBLIC-RANDOMNESS IN PUBLIC-KEY CRYPTOGRAPHY
    DESANTIS, A
    PERSIANO, G
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 46 - 62
  • [8] A reconfigurable public-key cryptography coprocessor
    Zeng, XY
    Chen, C
    Zhang, QL
    [J]. PROCEEDINGS OF 2004 IEEE ASIA-PACIFIC CONFERENCE ON ADVANCED SYSTEM INTEGRATED CIRCUITS, 2004, : 172 - 175
  • [9] A Cryptocurrency Without Public-Key Cryptography
    Bonneau, Joseph
    Miller, Andrew
    [J]. SECURITY PROTOCOLS XXII, 2014, 8809 : 350 - 358
  • [10] PRIVACY, FREEDOM AND PUBLIC-KEY CRYPTOGRAPHY
    RICE, R
    [J]. INFORMATION AGE, 1986, 8 (04): : 208 - 214