Securing Medical Images for Mobile Health Systems Using a Combined Approach of Encryption and Steganography

被引:2
|
作者
Jiang, Tao [1 ]
Zhang, Kai [1 ]
Tang, Jinshan [2 ]
机构
[1] Wuhan Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430065, Hubei, Peoples R China
[2] Michigan Technol Univ, Sch Technol, Houghton, MI 49931 USA
基金
中国国家自然科学基金;
关键词
Medical image encryption; RSA algorithm; Chaos; F5; steganography; Mobile phones; ALGORITHM; TELEMEDICINE; TELEHEALTH;
D O I
10.1007/978-3-319-95957-3_56
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a medical image encryption scheme which can be used in mobile health systems. The proposed scheme combines RSA algorithm, logistic chaotic encryption algorithm, and steganography technique to secure medical images. In the proposed scheme, we encrypt a medical image based on chaotic sequence and encrypt the initial value of the chaotic sequence using the RSA encryption algorithm. The encrypted information by RSA is hidden in the Image. Only legitimate users can obtain the parameter information and restore the image. In the receiver side, we apply the inverse methods to get the original image after an encrypted image is arrived. We have implemented a simple application on the Android platform and have evaluated its performance. The experimental results show that the proposed image encryption scheme is practical and feasible for mobile health systems.
引用
收藏
页码:532 / 543
页数:12
相关论文
共 50 条
  • [41] Two-level security approach combining watermarking and encryption for securing critical colored images
    Fkirin, Alaa
    Attiya, Gamal
    El-Sayed, Ayman
    [J]. OPTICAL AND QUANTUM ELECTRONICS, 2021, 53 (06)
  • [42] Securing AI Models Against Backdoor Attacks: A Novel Approach Using Image Steganography
    Ahmadi, Candra
    Chen, Jiann-Liang
    Lin, Yu -Ting
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2024, 25 (03): : 465 - 475
  • [43] Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenere cipher
    Boussif, Mohamed
    Aloui, Noureddine
    Cherif, Adnene
    [J]. IET IMAGE PROCESSING, 2020, 14 (06) : 1209 - 1216
  • [44] Resource-Optimized Selective Image Encryption of Medical Images Using Multiple Chaotic Systems
    Kiran, P.
    Parameshachari, B. D.
    [J]. INTERNATIONAL JOURNAL OF E-COLLABORATION, 2022, 18 (01)
  • [45] Secure data transmission for multibiometric identity verification systems using steganography and encryption
    Killioglu, Mehmet
    Taskiran, Murat
    Kahraman, Nihan
    [J]. PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2018, 24 (02): : 173 - 179
  • [46] An Improved Approach for Securing Document Images Using Dual Cover
    Vinodhini, R. E.
    Malathi, P.
    Kumar, T. Gireesh
    [J]. ADVANCES IN SIGNAL PROCESSING AND INTELLIGENT RECOGNITION SYSTEMS, 2018, 678 : 155 - 166
  • [47] Combining Digital Signature with Local Binary Pattern-Least Significant Bit Steganography Techniques for Securing Medical Images
    Madhusudhan, K. N.
    Sakthivel, P.
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2020, 10 (06) : 1288 - 1293
  • [48] Squint Pixel Steganography: A Novel Approach to Detect Digital Crimes and Recovery of Medical Images
    Rupa, Ch
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2016, 8 (04) : 37 - 47
  • [49] A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion
    Younes, Mohammad Ali Bani
    Jantan, Aman
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (06): : 247 - 254
  • [50] SECURING THE INCLUSION OF MEDICAL NUTRITION THERAPY IN MANAGED CARE HEALTH SYSTEMS
    EDELMAN, RD
    JOHNSON, RK
    COULSTON, AM
    [J]. JOURNAL OF THE AMERICAN DIETETIC ASSOCIATION, 1995, 95 (10) : 1100 - 1102