AUTHENTICATION AND ENCRYPTION FOR MEDICAL IMAGE SECURITY SYSTEM

A. Kannammal and S. Subha Rani

References

  1. [1] H.K. Huang, Picture archiving and communication systems: principles and applications (New York: Wiley, 1999), 251.
  2. [2] F. Cao, B.J. Liu, H.K. Huang, M.Z. Zhou, J. Zhang, X. Zhang, and G. Mogel, Fault-tolerant PACS server, SPIE MED Imaging 2002, 4685(44), 2002, 316–325.
  3. [3] A. Kannammal and S. Subha Rani, DICOM image authentication and encryption based on RSA and AES Algorithms, IRAM 2012, CCIS 330, 2012, 349–360.
  4. [4] L.O.M. Kobayashi, S.S. Furuie, P. Sergio, and L.M. Barreto, Providing integrity and authenticity in DICOM images: a novel approach, IEEE Transactions on Information Technology in Biomedicine, 13(4), 2009, 582–589.
  5. [5] W. Puech and J.M. Rodrigue, New crypto-watermarking method for medical images safe transfer, International Journal of Medical Informatics, 64, 2001, 429–438.
  6. [6] S.V. Dhavale, Blind robust image adaptive watermarking for medical images with multilevel security, International Journal of Computer Science and Application Issue, 2(3), 2010, 87–90.
  7. [7] S.M. Seth and R. Mishra, Comparative analysis of encryption algorithms for data communication, International Journal of Computer Science and Telecommunications, 2(2), 2011, 292–294.
  8. [8] A. Kannammal and S. Subha Rani, Two level security for medical images using watermarking/encryption algorithms, International Journal of Imaging Systems and Technology, 24, 2014, 111–120.
  9. [9] P. Karthigai Kumar and R. Sowmiya, Simulation of image encryption using AES encryption, IJCA Special Issue on Computational Science – New Dimensions and Perspectives (NCCSE), 2011, 166–172.
  10. [10] A. Kannammal, S. Subha Rani, and K. Pavithra, Authentication of medical images using secret sharing and watermarking techniques, National Journal of Technology, 9(1), 2013, 80–85.
  11. [11] D. Kundur and D. Hatzinakos, Diversity and attack characterization for improved robust watermarking, IEEE Trans Signal Process, 49, 2001, 2383–2396.
  12. [12] C.-S. Woo, J. Du1, and B. Pham, Multiple watermark method for privacy control and tamper detection in medical images, in C. Brian and A.J. Maeder (eds.), APRS Workshop on Digital Image Computing (WDIC2005), Brisbane, Southbank.
  13. [13] W. Puech and J.M. Rodrigues, A new cryptowatermarking method for medical images safe transfer, Proc. 12th European Signal Processing Conf., Vienna, Austria, 2004, 1481–1484.
  14. [14] A. Kannammal and S. Subha Rani, Authentication of DICOM images using multiple fragile watermarking techniques in wavelet domain, International Journal of Computer Science Issues (IJCSI), 8(6), 2011, 181–189.

Important Links:

Go Back