Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices

被引:54
|
作者
Sajjad, Muhammad [1 ]
Muhammad, Khan [2 ]
Baik, Sung Wook [2 ]
Rho, Seungmin [3 ]
Jan, Zahoor [1 ]
Yeo, Sang-Soo [4 ]
Mehmood, Irfan [5 ]
机构
[1] Islamia Coll Peshawar, Digital Image Proc Lab, Dept Comp Sci, Peshawar, Pakistan
[2] Sejong Univ, Intelligent Media Lab, Dept Digital Contents, Coll Elect & Informat Engn, Seoul, South Korea
[3] Sungkyul Univ, Dept Media Software, Anyang, South Korea
[4] Mokwon Univ, Div Convergence Comp & Media, Daejeon, South Korea
[5] Sejong Univ, Dept Comp Sci & Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Medical image processing; Image steganography; Visual saliency models; Selective image encryption; Mobile-cloud computing; Information security; Resource-constrained devices; ALGORITHM;
D O I
10.1007/s11042-016-3811-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the problem of outsourcing the selective encryption of a medical image to cloud by resource-constrained devices such as smart phone is addressed, without revealing the cover image to cloud using steganography. In the proposed framework, the region of interest of the medical image is first detected using a visual saliency model. The detected important data is then embedded in a host image, producing a stego image which is outsourced to cloud for encryption. The cloud which has powerful resources, encrypts the image and sent back the encrypted marked image to the client. The client can then extract the selectively encrypted region of interest and can combine it with the region of non-interest to form a selectively encrypted image, which can be sent to medical specialists and healthcare centers. Experimental results and analysis validate the effectiveness of the proposed framework in terms of security, image quality, and computational complexity and verify its applicability in remote patient monitoring centers.
引用
收藏
页码:3519 / 3536
页数:18
相关论文
共 50 条
  • [1] Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices
    Muhammad Sajjad
    Khan Muhammad
    Sung Wook Baik
    Seungmin Rho
    Zahoor Jan
    Sang-Soo Yeo
    Irfan Mehmood
    [J]. Multimedia Tools and Applications, 2017, 76 : 3519 - 3536
  • [2] Phased Scheduling for Resource-Constrained Mobile Devices in Mobile Cloud Computing
    Li, Chunlin
    Li, Layuan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (04) : 2817 - 2837
  • [3] Phased Scheduling for Resource-Constrained Mobile Devices in Mobile Cloud Computing
    Chunlin Li
    Layuan Li
    [J]. Wireless Personal Communications, 2014, 77 : 2817 - 2837
  • [4] Provable Data Possession of Resource-Constrained Mobile Devices in Cloud Computing
    Yang, Jian
    Wang, Haihang
    Wang, Jian
    Tan, Chengxiang
    Yu, Dingguo
    [J]. Journal of Networks, 2011, 6 (07) : 1033 - 1040
  • [5] Masked encryption algorithm mCrypton for resource-constrained devices
    Karpinskyy, M.
    Korkishko, L.
    Furmanyuk, A.
    [J]. IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 628 - +
  • [6] Jini lookup service for resource-constrained mobile devices
    Kim, CH
    Oh, M
    Choi, H
    [J]. PDPTA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-4, 2003, : 1575 - 1578
  • [7] Runtime Classification of Mobile Malware for Resource-Constrained Devices
    Milosevic, Jelena
    Malek, Miroslaw
    Ferrante, Alberto
    [J]. E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 195 - 215
  • [8] Distributed Execution for Resource-Constrained Mobile Consumer Devices
    Kim, Seonggun
    Rim, Heungsoon
    Han, Hwansoo
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2009, 55 (02) : 376 - 384
  • [9] A Mobile GIS Application to Heavily Resource-Constrained Devices
    Robert P.Biuk-Aghai
    [J]. Geo-spatial Information Science, 2004, (01) : 50 - 57
  • [10] An efficient mobile location-based security service framework for resource-constrained devices
    Zhang, Yinghui
    Ma, Xinwei
    Wu, Axin
    Ren, Fangyuan
    Zheng, Dong
    [J]. International Journal of Network Security, 2020, 22 (04) : 698 - 707