Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(451.48KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
An Integrated Algorithm supporting Confidentiality and Integrity for secured Access and Storage of DICOM Images
Suresh Jaganathan, Arun Fera M
Pages - 47 - 57     |    Revised - 15-03-2012     |    Published - 16-04-2012
Volume - 6   Issue - 2    |    Publication Date - April 2012  Table of Contents
MORE INFORMATION
KEYWORDS
Medical Images, DICOM, Encryption, Healthcare, Confusion, Diffusion, Message Digest.
ABSTRACT
In healthcare industry, the patient\'s medical data plays a vital role because diagnosis of any ailments is done by using those data. The high volume of medical data leads to scalability and maintenance issues when using health-care provider\'s on-site picture archiving and communication system (PACS) and network oriented storage system. Therefore a standard is needed for maintaining the medical data and for better diagnosis. Since the medical data reflects in a similar way to individuals’ personal information, secrecy should be maintained. Maintaining secrecy can be done by encrypting the data, but as medical data involves images and videos, traditional text based encryption/decryption schemes are not adequate for providing confidentiality. In this paper, we propose an algorithm for securing the DICOM format medical archives by providing better confidentiality and maintaining their integrity. Our contribution in this algorithm is of twofold: (1) Development of Improved Chaotic based Arnold Cat Map for encryption/decryption of DICOM files and (2) Applying a new hash algorithm based on chaotic theory for those encrypted files for maintaining integrity. By applying this algorithm, the secrecy of medical data is maintained. The proposed algorithm is tested with various DICOM format image archives by studying the following parameters i) PSNR - for quality of images and ii) Key - for security.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
1 Chia-Chi Teng, Jonathan Mitchell, Christopher Walker, Alex Swan, Cesar Davila, David Howard, Travis Needham (2010), ”A Medical Image Archive Solution in the Cloud”. IEEE, 10.1109/ICSESS.2010.555234 3, pp 431-434
2 Suresh Jaganathan, M B Geetha Manjusha, 2011, “dFuse: An Optimized Compression Algorithm for DICOM-format image archive”, International Journal of Biometrics and Bioinformatics (IJBB), Volume (5) ,Issue (2) , 42-52, ISNN: 1985-2347
3 Zhiliang Zhu, KeZhai, Beilei Wang, Hongjuan Liu, Huiyan Jiang (2009) ”Research on Chaos-based Message Digest Method for Medical Images”. IEEE, 1109/CISP.2009.5301139, pp 1-510
4 LjupEoKocarev, GoceJakimoski, Toni Stojanovski, Ulrich Parlit (1998), ”From chaotic maps to encryption schemes”, Circuits and Sys tems, 1998. ISCAS 98. Proceedings of the 1998 IEEE International Symposium. 10.1109/ISCAS.1998.698968, vol.4, pp 514 – 517.
5 YUAN-BIAO ZHANG, ”Chaos based cryptography. An alternative to algebraic cryptography”.2008.
6 Yaobin Mao and Guanrong Chen (2005), ”Chaos-Based image encryption”. www.open-image.org/725publication/journal/CBIE.pdf
7 Guanrong Chen, Yaobin Mao b, Charles K. Chui (2003) ”A symmetric image encryption scheme based on 3D chaotic cat maps”. Science Direct, doi:10.1016 / j.chaos.2003.12.022.
8 Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law (2006),”A Fast Image Encryption Scheme based on Chaotic Standard Ma p”. Cryptography and Security conference cited as arXiv:cs/0609158v1 , Volume 372, Issue 15, pp 2645-2652.
9 Ling Bin, Liu Lichen, Zhang Jan (2010) ”Image encryption algorithm based on chaotic map and S-DES”.IEEE ,10.1109/ICACC.2010. 5486998, pp 41-44.
10 Monisha Sharma (2010), ”Image encryption techniques using chaotic schemes: A review”. International Journal of Engineering Science and Technology Vol. 2(6),2359-2363, ISSN: 0975-5462, pp 1-10.
11 Muhammad Asim and VarunJeoti,(2007) ”Image Encryption: Comparison between AES and a Novel Chaotic Encryption Scheme” I EEE. 10.1109/ICSCN.2007.350697, pp 65-69.
12 Zhu Yu, Zhou Zhe, Yang Haibing, Pan Wenjie, Zhang Yunpeng (2010), ”A Chaos-Based Image Encryption Algorithm Using Wavelet Transform” IEEE , 10.1109/IEMBS.2010.5628061, pp 1037-1040.
13 De wang, Yuan-biaozhang (2009) ”Image encryption algorithm based on s-boxes substitution and chaos random sequence”. International Conference on Computer Modeling and Simulation, DOI 10.1109/ICCMS.2009.26.
14 Gabriel Peterson (1997), Arnolds Cat Map, Math 45 Linear Algebra, Fall 1997.
15 Kashyap, S.; Karthik, K. (2010) ”Authenticating encrypted data”. IEEE, 10.1109/NCC.2011.5734696, pp 1-5.
16 Katherine Struss (2009) ”A Chaotic Image Encryption”. Spring, Mathematics Senior Seminar, 4901.
17 ShiguoLian, Jinsheng Sun, Zhiquan Wang (2005) ”Security analysis of a chaos-based image encryption algorithm”. Science direct, Physica A: Statistical Mechanics and its Applications 351 (2-4) , pp 645-661.
18 Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law (2006) ”A Fast Image Encryption Scheme based on Chaotic Standard Map”. Cryptography and Security conference cited as arXiv:cs/0609158v1 , Volume 372, Issue 15, pp 2645-2652.
19 ShuaiRen, ChengshiGao, Qing Dai, XiaoFeiFei (2010) ”Attack to an Image Encryption Algorithm based on Improved Chaotic Cat Maps”.3rd International Congress on Image and Signal Processing (CISP2010), 10.1109/CISP.2010.5647659, pp 533-536.
20 Kwok-Wo Wong, Bernie Sin-Hung Kwok,(2007) ”An Efficient Diffusion Approach for Chaosbased Image Encryption”. 3rd International conference Physics and Control (Physcon 2007)
Mr. Suresh Jaganathan
- India
Mr. Arun Fera M
- India
fera26@gmail.com