CFP last date
20 January 2025
Reseach Article

Secret Medical Image Sharing and EPR Data Embedding Scheme over Cloud Computing Environment

by Fatma E.-z. A. Elgamal, Noha A. Hikal, F. E. Z. Abou-chadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 11
Year of Publication: 2013
Authors: Fatma E.-z. A. Elgamal, Noha A. Hikal, F. E. Z. Abou-chadi
10.5120/11887-7926

Fatma E.-z. A. Elgamal, Noha A. Hikal, F. E. Z. Abou-chadi . Secret Medical Image Sharing and EPR Data Embedding Scheme over Cloud Computing Environment. International Journal of Computer Applications. 69, 11 ( May 2013), 19-26. DOI=10.5120/11887-7926

@article{ 10.5120/11887-7926,
author = { Fatma E.-z. A. Elgamal, Noha A. Hikal, F. E. Z. Abou-chadi },
title = { Secret Medical Image Sharing and EPR Data Embedding Scheme over Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 11 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 19-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number11/11887-7926/ },
doi = { 10.5120/11887-7926 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:29:59.610016+05:30
%A Fatma E.-z. A. Elgamal
%A Noha A. Hikal
%A F. E. Z. Abou-chadi
%T Secret Medical Image Sharing and EPR Data Embedding Scheme over Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 11
%P 19-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The fast development in the term of telecommunication helps on the appearance of variety of modern applications such as the telemedicine where the patients' digital data can transfer over insecure mediums between the doctors for farther diagnosis and dealing with these transmitted data. Therefore, the protection of the exchanged medical data is essential especially when working on the cloud computing environment, where the security is considered a major issue. In addition to the security, the high visibility of the medical images must also be achieved. This paper presents a novel approach that guarantees the secure sharing of medical images over the cloud computing environment by providing the mean of trust management between the authorized parities of these data and also allows the privacy sharing of the Electronic Patients' Records (EPR) string data between those parities while preserving the shared medical image from the distortion. The experimental results show the efficiency of the proposed scheme and also the robustness against various types of attacks.

References
  1. Sonika C. Rathi, Vandana S. Inamdar, "Analysis of watermarking techniques for medical images preserving ROI", Computer Science & Information Technology (CS & IT 05) - open access-Computer Science Conference Proceedings (CSCP), 2012, pp. 297–308.
  2. Borko Furht, Armondo Escalante, HandBook of Cloud computing, Springer Science + business Media, LLC 2010.
  3. Danwei Chen and Yanjun He, "A Study on Secure Data Storage Strategy in Cloud Computing", Journal of Convergence Information Technology, Volume 5, Number 7, September 2010.
  4. Mustafa Ulutas, Güzin Ulutas, Vasif V. Nabiyev. " Medical image security and EPR hiding using Shamir's secret sharing scheme". The Journal of Systems and Software 84 (2011), 341–353.
  5. M. Sudha, Dr. Bandaru Rama Krishna Rao, M. Monica "A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment" International Journal of Computer Applications, Volume 12– No. 8, December 2010 pp. 19-23.
  6. Tran, D. H. ; Hai-Long Nguyen; Wei Zha; Wee Keong Ng. "Towards security in sharing data on cloud-based social networks ". 8th International Conference on Information, Communications and Signal Processing. DOI: 10. 1109/ICICS. 2011. 6173582, 2011, Page(s): 1 – 5.
  7. Yanjiang Yang, Youcheng Zhang. "A Generic Scheme for Secure Data Sharing in Cloud". 40th International Conference on Parallel Processing Workshops (ICPPW 2011) , DOI: 10. 1109/ICPPW. 2011. 51, Page(s): 145 – 153.
  8. M. Ahmed, Yang Xiang. "Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing" . 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. DOI: 10. 1109/TrustCom. 2011. 17. Page(s): 111 – 117.
  9. Xiaodong Sun, Guiran Chang , Fengyun Li. "A Trust Management Model to Enhance Security of Cloud Computing Environments". 2011 Second International Conference on Networking and Distributed Computing (ICNDC), 21-24 Sept. Page(s): 244 – 248.
  10. Chao-Tung Yang; Lung-Teng Chen; Wei-Li Chou; Kuan-Chieh Wang, "Implementation of a Medical Image File Accessing System on Cloud Computing". 2010 IEEE 13th International Conference on Computational Science and Engineering (CSE), DOI:10. 1109/CSE. 2010. 48, pp. :321-326
  11. G. Kanagaraj,A. C. Sumathi. "Proposal of an open-source Cloud computing system for exchanging medical images of a Hospital Information System". 2011 3rd International Conference on Trendz in Information Sciences and Computing (TISC), DOI:10. 1109/TISC. 2011. 6169102 . Page(s): 144 – 149.
  12. Junning Fu, Chaokun Wang ; Zhiwei Yu ; Jianmin Wang ; Jia-Guang Sun . "A Watermark-Aware Trusted Running Environment for Software Clouds". IEEE Fifth Annual China Grid Conference, 16-18 July 2010, Page(s): 144 – 151.
  13. Yu-Chao Liu, Yu-Tao Ma, Hai-Su Zhang, De-Yi Li and Gui-Sheng Chen," A method for trust management in cloud computing: data coloring by cloud watermarking" , International journal of automation and computing, 2011.
  14. Ingemar J. Cox, Digital Watermarking and Steganography, Morgan Kaufmann, Burlington, MA, USA, 2008.
  15. House of Commons, Health Committee. The Electronic Patient Record. Sixth Report of Session 2006–07, Volume I, Ordered by The House of Commons to be printed 25 July 2007.
  16. Z. Eslami and J. Zarepour Ahmadabadi, "Secret image sharing with authentication-chaining and dynamic embedding", the journal of systems and software 84, 2011.
  17. MATLAB version 7. 6. 0. 324 (R2008a), 2008, computer software, The MathWorks Inc. , Natick.
  18. D. P. Kroese, T. Taimre, Z. I. Botev, Handbook of Monte Carlo Methods. Wiley Series in Probability and Statistics, John Wiley & Sons, New York, 2011, ch. 1, pp. 7.
  19. Deyi Li, Yi Du, Artificial Intelligence with Uncertainty, Chapman and Hall/CRC, pp. 107–151, September 27, 2007.
  20. A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
  21. Teddy Furon, Watermarking for alternative requirements, INRIA, Université de Rennes 1, 2005.
  22. RadLink centre (2000) RadLink Diagnostic Imaging, http://radlink. com. sg/ [Accessed 17/1/2013].
  23. SoftWays' Medical Imaging Group (2003) Magnetic Resonance - Technology Information Portal, http://www. mr-tip. com/ [Accessed 17/1/2013].
  24. Alain Horé and Djemel Ziou, " Image quality metrics: PSNR vs. SSIM", 2010 International Conference on Pattern Recognition, 2010 IEEE.
  25. Farhad Rahimi and Hossein Rabbani, "A dual adaptive watermarking scheme in contourlet domain for DICOM images", BioMedical Engineering OnLine, 2011.
  26. Yue Wu, Joseph P. Noonan, Sos Agaian, "NPCR and UACI Randomness Tests for Image Encryption", Journal of Selected Areas in Telecommunications (JSAT), April Edition, 2011.
  27. Chun-Shien Lu, Multimedia security: steganography and digital watermarking techniques for protection of intellectual property. Idea Group Inc (IGI), 2005, pp. 100.
  28. Hao-Kuan Tso and Der-Chyuan Lou, "Medical image protection using secret sharing scheme". In Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC '12). ACM, New York, NY, USA, Article 93, 4 pages, (2012).
  29. Surya Pratap Singh, Paresh Rawat and Sudhir Agrawal, "A Robust Watermarking Approach using DCT-DWT". International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, Volume 2, Issue 8, August 2012).
  30. U. M. Gokhale and Y. V. Joshi, "A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet Domain". ACEEE Int. J. on Network Security, Vol. 02, No. 03, July 2011.
  31. Khaled Loukhaoukha, Jean-Yves Chouinard, and Abdellah Berdai, "A Secure Image Encryption Algorithm Based on Rubik's Cube Principle". Hindawi Publishing Corporation Journal of Electrical and Computer Engineering Volume 2012, Article ID 173931, 13 pages.
  32. Patil Ramana Reddy, Munaga. V. N. K. Prasad and D. Srinivasa Rao, "Digital Image Watermarking Using SPIHT". International Journal of Recent Trends in Engineering, Vol 2, No. 3, November 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing EPR Cloud drops encryption spatial synchronization authentication