Skip to main content

Protecting Medical Images with Biometric Information

  • Conference paper
Advances in Computer and Information Sciences and Engineering

Abstract

Medical images are private to doctor and patient. Digital medical images should be protected against unauthorized viewers. One way to protect digital medical images is using cryptography to encrypt the images. This paper proposes a method for encrypting medical images with a traditional symmetric cryptosystem. We use biometrics to protect the cryptographic key. Both encrypted image and cryptographic key can be transmitted over public networks with security and only the person that owns the biometrics information used in key protection can decrypt the medical image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Huang, H. K. . Picture archiving and communication systems: principles and applications. New York : Wiley, 1999.

    Google Scholar 

  2. National Electrical Manufacturers Association (NEMA). Digital Imaging and Communications in Medicine (DICOM), Part 15: Security Profiles, PS 3.15-2007. Rosslyn, VA : s.n., 2007.

    Google Scholar 

  3. US Department of Health and Human Services. HIPAA. [Online] http://aspe.os.dhhs.gov/admnsimp.

    Google Scholar 

  4. Medical image security in a HIPAA mandated PACS environment. F., Cao, H.K., Huang e X.Q., Zhou. s.l. : Elsevier, December 2003, Computerized Medical Imaging and Graphics, Vol. 27.

    Google Scholar 

  5. Stinson, D. , R.. Cryptography: theory and pratice. 2. Ontario, Canada : Chapman & Hall/CRC, 2002. p. 339. 1-58488-206-9.

    Google Scholar 

  6. NIST. Advanced Encryption Standard (AES). [Online] 2001, [http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf].

    Google Scholar 

  7. Rivest, R., Shamir, A. and Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM. 1978, Vol. Vol. 21, 2, pp. 120-126.

    Article  MathSciNet  MATH  Google Scholar 

  8. Norcen R.; Podesser M.; Pommer A.; Schmidt H.-P.; Uhl A. Confidential storage and transmission of medical image data. Computers in Biology and Medicine, Vol. 33, 3, 2003. pp. 277-292.

    Article  Google Scholar 

  9. Smith, J.P. Authentication of digital medical images with digital signature technology. Radiology, Vol. 194, 1995. pp 771-774.

    Google Scholar 

  10. Jain, Anil K., Ross, Arun, and Prabhakar, Salil. An Introduction to Biometric Recognition. IEEE transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics. 2004, Vol. 14, 1, pp. 4-20.

    Google Scholar 

  11. Dass, Sarat C. and Jain, Anil K. Fingerprint Classification Using Orientation Field Flow Curves. . Proceedings of the Fourth Indian Conference on Computer Vision, Graphics & Image Processing.2004, pp. 650-655.

    Google Scholar 

  12. Uludag, Umut, et al. Biometric cryptosystems: issues and challenges. . Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management. 2004, Vol. 92, pp 948- 960.

    Google Scholar 

  13. Juels, Ari e Sudan, Madhu A fuzzy vault scheme... Proceedings of the IEEE International Symposium on Information Theory, pp 408.

    Google Scholar 

  14. Uludag, U., Pankantti, S., and Jain, A. K. Fuzzy vault for fingerprints. AVBPA, Lecture Notes in Computer Science. 2005, Vol. 3546, pp. 310-319.

    Google Scholar 

  15. Clancy, T. Charles, Kiyavash, Negar e Lin, Dennis J. Secure smartcard-based fingerprint authentication. New York : ACM Press. WBMA’03: Proceedingsof the 2003 ACM SIGMM Workshop on Biometrics Methods AND Applications. 2003, pp. 45-52.

    Google Scholar 

  16. Uludag, U. and Jain, A. K Securing Fingerprint Template: Fuzzy Vault with Helper Data.. Computer Vision and Pattern Recognition Workshop. 2006, pp. 163-163.

    Google Scholar 

  17. Maltoni, D., Maio, D., Jain, a. K., and Prabhakar, S.. Handbook of Fingerprint Recognition. New York : Springer, 2003.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media B.V.

About this paper

Cite this paper

Fornazin, M., Netto, D.B., Cavenaghi, M.A., Marana, A.N. (2008). Protecting Medical Images with Biometric Information. In: Sobh, T. (eds) Advances in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8741-7_52

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-8741-7_52

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-8740-0

  • Online ISBN: 978-1-4020-8741-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics