Abstract
Medical images are private to doctor and patient. Digital medical images should be protected against unauthorized viewers. One way to protect digital medical images is using cryptography to encrypt the images. This paper proposes a method for encrypting medical images with a traditional symmetric cryptosystem. We use biometrics to protect the cryptographic key. Both encrypted image and cryptographic key can be transmitted over public networks with security and only the person that owns the biometrics information used in key protection can decrypt the medical image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Huang, H. K. . Picture archiving and communication systems: principles and applications. New York : Wiley, 1999.
National Electrical Manufacturers Association (NEMA). Digital Imaging and Communications in Medicine (DICOM), Part 15: Security Profiles, PS 3.15-2007. Rosslyn, VA : s.n., 2007.
US Department of Health and Human Services. HIPAA. [Online] http://aspe.os.dhhs.gov/admnsimp.
Medical image security in a HIPAA mandated PACS environment. F., Cao, H.K., Huang e X.Q., Zhou. s.l. : Elsevier, December 2003, Computerized Medical Imaging and Graphics, Vol. 27.
Stinson, D. , R.. Cryptography: theory and pratice. 2. Ontario, Canada : Chapman & Hall/CRC, 2002. p. 339. 1-58488-206-9.
NIST. Advanced Encryption Standard (AES). [Online] 2001, [http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf].
Rivest, R., Shamir, A. and Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM. 1978, Vol. Vol. 21, 2, pp. 120-126.
Norcen R.; Podesser M.; Pommer A.; Schmidt H.-P.; Uhl A. Confidential storage and transmission of medical image data. Computers in Biology and Medicine, Vol. 33, 3, 2003. pp. 277-292.
Smith, J.P. Authentication of digital medical images with digital signature technology. Radiology, Vol. 194, 1995. pp 771-774.
Jain, Anil K., Ross, Arun, and Prabhakar, Salil. An Introduction to Biometric Recognition. IEEE transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics. 2004, Vol. 14, 1, pp. 4-20.
Dass, Sarat C. and Jain, Anil K. Fingerprint Classification Using Orientation Field Flow Curves. . Proceedings of the Fourth Indian Conference on Computer Vision, Graphics & Image Processing.2004, pp. 650-655.
Uludag, Umut, et al. Biometric cryptosystems: issues and challenges. . Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management. 2004, Vol. 92, pp 948- 960.
Juels, Ari e Sudan, Madhu A fuzzy vault scheme... Proceedings of the IEEE International Symposium on Information Theory, pp 408.
Uludag, U., Pankantti, S., and Jain, A. K. Fuzzy vault for fingerprints. AVBPA, Lecture Notes in Computer Science. 2005, Vol. 3546, pp. 310-319.
Clancy, T. Charles, Kiyavash, Negar e Lin, Dennis J. Secure smartcard-based fingerprint authentication. New York : ACM Press. WBMA’03: Proceedingsof the 2003 ACM SIGMM Workshop on Biometrics Methods AND Applications. 2003, pp. 45-52.
Uludag, U. and Jain, A. K Securing Fingerprint Template: Fuzzy Vault with Helper Data.. Computer Vision and Pattern Recognition Workshop. 2006, pp. 163-163.
Maltoni, D., Maio, D., Jain, a. K., and Prabhakar, S.. Handbook of Fingerprint Recognition. New York : Springer, 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media B.V.
About this paper
Cite this paper
Fornazin, M., Netto, D.B., Cavenaghi, M.A., Marana, A.N. (2008). Protecting Medical Images with Biometric Information. In: Sobh, T. (eds) Advances in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8741-7_52
Download citation
DOI: https://doi.org/10.1007/978-1-4020-8741-7_52
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-8740-0
Online ISBN: 978-1-4020-8741-7
eBook Packages: Computer ScienceComputer Science (R0)