Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Automatic Selective Encryption of DICOM Images

View through CrossRef
Securing DICOM images is essential to protect the privacy of patients, especially in the era of telemedicine and eHealth/mHealth. This increases the demand for rapid security. Nevertheless, a limited amount of research work has been conducted to ensure the security of DICOM images while minimizing the processing time. Hence, this paper introduces a selective encryption approach to reduce the processing time and sustain the robustness of security. The proposed approach selects regions within medical images automatically in the spatial domain using the pixel thresholding segmentation technique, then compresses and encrypts them using different encryption algorithms based on their importance. An adaptive two-region encryption approach is applied to single and multi-frame DICOM images, where the Region of Background (ROB) is encrypted using a light encryption algorithm, while the Region of Interest (ROI) is encrypted using a sophisticated encryption algorithm. For multi-frame DICOM images (Approach I), additional time-saving has been achieved by almost 10,000 times faster than the Naïve encryption approach, and 100 times better compression ratio, using one segmentation map based on a pre-defined reference frame for all the DICOM frames. For single-frame DICOM image (Approach II), a multi-region selective encryption approach is proposed, where the ROI is further split into three regions based on potential security threats, using a mathematical model that guarantees shorter encryption time in comparison with the Naive and the two-region encryption approaches, with almost 47% and 14% saving times, respectively. Based on the estimated processing time, Approach I outperformed Approach II noticeably. Further, cryptanalysis metrics are utilized to evaluate the proposed approaches, which indicate good robustness against a wide variety of attacks.
Title: Automatic Selective Encryption of DICOM Images
Description:
Securing DICOM images is essential to protect the privacy of patients, especially in the era of telemedicine and eHealth/mHealth.
This increases the demand for rapid security.
Nevertheless, a limited amount of research work has been conducted to ensure the security of DICOM images while minimizing the processing time.
Hence, this paper introduces a selective encryption approach to reduce the processing time and sustain the robustness of security.
The proposed approach selects regions within medical images automatically in the spatial domain using the pixel thresholding segmentation technique, then compresses and encrypts them using different encryption algorithms based on their importance.
An adaptive two-region encryption approach is applied to single and multi-frame DICOM images, where the Region of Background (ROB) is encrypted using a light encryption algorithm, while the Region of Interest (ROI) is encrypted using a sophisticated encryption algorithm.
For multi-frame DICOM images (Approach I), additional time-saving has been achieved by almost 10,000 times faster than the Naïve encryption approach, and 100 times better compression ratio, using one segmentation map based on a pre-defined reference frame for all the DICOM frames.
For single-frame DICOM image (Approach II), a multi-region selective encryption approach is proposed, where the ROI is further split into three regions based on potential security threats, using a mathematical model that guarantees shorter encryption time in comparison with the Naive and the two-region encryption approaches, with almost 47% and 14% saving times, respectively.
Based on the estimated processing time, Approach I outperformed Approach II noticeably.
Further, cryptanalysis metrics are utilized to evaluate the proposed approaches, which indicate good robustness against a wide variety of attacks.

Related Results

The Role of Standards in Accelerating the Uptake of Artificial Intelligence in Dermatology (Preprint)
The Role of Standards in Accelerating the Uptake of Artificial Intelligence in Dermatology (Preprint)
BACKGROUND The use of artificial intelligence (AI) for dermatology is showing great promise in research contexts. However, the clinical use of AI in dermato...
Reversible Anonymization of DICOM Images Using Automatically Generated Policies
Reversible Anonymization of DICOM Images Using Automatically Generated Policies
Many real-world applications in the area of medical imaging like case study databases require separation of identifying (IDATA) and non-identifying (MDATA) data, specifically those...
CytometryML, an XML format based on DICOM and FCS for analytical cytology data
CytometryML, an XML format based on DICOM and FCS for analytical cytology data
AbstractBackgroundFlow Cytometry Standard (FCS) was initially created to standardize the software researchers use to analyze, transmit, and store data produced by flow cytometers a...
Web Validation Service for Ensuring Adherence to the DICOM Standard
Web Validation Service for Ensuring Adherence to the DICOM Standard
The DICOM Standard has been fundamental for ensuring the interoperability of Picture Archive and Communications Systems (PACS). By compiling rigorously to the standard, medical ima...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Prototype of a JAVA/DICOM Image Server with Integrated Findings and Data Security
Prototype of a JAVA/DICOM Image Server with Integrated Findings and Data Security
The transfer of medical data within heterogeneous hard- and software infrastructures requires platform-independent standardized protocols and data formats such as DICOM. To avoid c...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...

Back to Top