Secure medical image-sharing mechanism based on visual cryptography in EHR system

Author(s):  
Dana Yang ◽  
Inshil Doh ◽  
KiJoon Chae
2019 ◽  
Vol 8 (4) ◽  
pp. 2797-2800

visual cryptography system proposed a image encryption and decryption method. In the proposed method Red, Green, Blue color images using visual cryptography. In existing system is working for share created, it is encrypted separately by using visual secret share creation (VSS) algorithms. The proposed work is original images share1 and ahare2 created XOR-Based visual cryptography. This proposed schemes share1 encryption and share2 encryption included in RSA algorithm. The share1 and ahare2 decryption process is enable secret image sharing and then stacking. The proposed system is value calculate the PSNR and MSE formula and then image security using NPCR and UACI formula. The visual cryptography existing work to compare the proposed work and better results quality of RGB color images. The color image encryption and decryption using RSA algorithm and matlab coding.


Author(s):  
B.A. Nurul Nadiyya ◽  
Koredianto Usman ◽  
Suci Aulia ◽  
B.C. Erizka

In the medical world, a digital medical image is a requirement for image sharing in which the confidential data of the patient should be protected from unauthorized access. This study proposes a technique that can preserve image confidentiality using image encryption. This approach converts the original image into another shape that can not be visually interpreted, so unauthorized parties can not see an image's substance. This research proposes a method of X-Ray images encryption based on Arnold's Cat Map and Bose Chaudhuri Hocquenghem by shuffling coordinates from the original pixel into new coordinates. The Bose Chaudhuri Hocquenghem encoding scheme strengthens Arnold's cat map encryption by detecting and fixing bits of an image pixel value error. This study comprises results checked by giving the X-Ray or rontgen image noise with distinct variances. These algorithms are supposed to provide decrypted images with high accuracy and are more resistant to attack. Our result showed that the system using Bose Chaudhuri Hocquenghem codes has a better Peak Signal-to-Noise Ratio result equal to infinity and Bit Error Rate, equivalent to 0 at a more significant variance of each form of noise than the process using Arnold's Cat Map codes only. The Brute Force Attack for Bose Chaudhuri Hocquenghem takes 2.86 × 1058 years, while Arnold's Cat Map takes 3.9 × 1011 years, so the Bose Chaudhuri Hocquenghem code is more resistant to Brute Force Attack than the Arnold's Cat Map method.


Author(s):  
Randhir Kumar ◽  
Rakesh Tripathi

Currently, sharing and access of medical imaging is a significant element of present healthcare systems, but the existing infrastructure of medical image sharing depends on third-party approval. In this chapter, the authors have proposed a framework in order to provide a decentralized storage model for medical image sharing through IPFS and blockchain technology that remove the hurdle of third-party dependency. In the proposed model, the authors are sharing the imaging and communications in medicine (DICOM) medical images, which consist of various information related to disease, and hence, the framework can be utilized in the real-time application of the healthcare system. Moreover, the framework maintains the feature of immutability, privacy, and availability of information owing to the blockchain-based decentralized storage model. Furthermore, the authors have also discussed how the information can be accessed by the peers in the blockchain network with the help of consensus. To implement the framework, they have used the python ask and anaconda python.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 21075-21083 ◽  
Author(s):  
Ahmed A. Abd El-Latif ◽  
Bassem Abd-El-Atty ◽  
M. Shamim Hossain ◽  
Md. Abdur Rahman ◽  
Atif Alamri ◽  
...  

Various types of encryption techniques have been used for data security. Complex algorithms are followed for this purpose in most of the methods. Confidentiality is provided by a technique called visual cryptography excluding of any intricate computations and algorithms. In this paper, we put forward an innovative method called Histogram Localization based Blockwise (HLB) approach to solve pixel expansion problem at the same time it will increase the security and visual quality for highly confidential secret image which is in color. According to this method, the secret shares are generated based on the histogram and also the number of black pixels in the corresponding block. The image size of resultant shares is same as in the original secret image. These shares are distributed to participants, and human vision system is used for decryption purpose.


Sign in / Sign up

Export Citation Format

Share Document