Home   >   CSC-OpenAccess Library   >    Manuscript Information
An Integrated Algorithm supporting Confidentiality and Integrity for secured Access and Storage of DICOM Images
Suresh Jaganathan, Arun Fera M
Pages - 47 - 57     |    Revised - 15-03-2012     |    Published - 16-04-2012
Volume - 6   Issue - 2    |    Publication Date - April 2012  Table of Contents
Medical Images, DICOM, Encryption, Healthcare, Confusion, Diffusion, Message Digest.
In healthcare industry, the patient\'s medical data plays a vital role because diagnosis of any ailments is done by using those data. The high volume of medical data leads to scalability and maintenance issues when using health-care provider\'s on-site picture archiving and communication system (PACS) and network oriented storage system. Therefore a standard is needed for maintaining the medical data and for better diagnosis. Since the medical data reflects in a similar way to individuals’ personal information, secrecy should be maintained. Maintaining secrecy can be done by encrypting the data, but as medical data involves images and videos, traditional text based encryption/decryption schemes are not adequate for providing confidentiality. In this paper, we propose an algorithm for securing the DICOM format medical archives by providing better confidentiality and maintaining their integrity. Our contribution in this algorithm is of twofold: (1) Development of Improved Chaotic based Arnold Cat Map for encryption/decryption of DICOM files and (2) Applying a new hash algorithm based on chaotic theory for those encrypted files for maintaining integrity. By applying this algorithm, the secrecy of medical data is maintained. The proposed algorithm is tested with various DICOM format image archives by studying the following parameters i) PSNR - for quality of images and ii) Key - for security.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
Chia-Chi Teng, Jonathan Mitchell, Christopher Walker, Alex Swan, Cesar Davila, David Howard, Travis Needham (2010), ”A Medical Image Archive Solution in the Cloud”. IEEE, 10.1109/ICSESS.2010.555234 3, pp 431-434
De wang, Yuan-biaozhang (2009) ”Image encryption algorithm based on s-boxes substitution and chaos random sequence”. International Conference on Computer Modeling and Simulation, DOI 10.1109/ICCMS.2009.26.
Gabriel Peterson (1997), Arnolds Cat Map, Math 45 Linear Algebra, Fall 1997.
Guanrong Chen, Yaobin Mao b, Charles K. Chui (2003) ”A symmetric image encryption scheme based on 3D chaotic cat maps”. Science Direct, doi:10.1016 / j.chaos.2003.12.022.
Kashyap, S.; Karthik, K. (2010) ”Authenticating encrypted data”. IEEE, 10.1109/NCC.2011.5734696, pp 1-5.
Katherine Struss (2009) ”A Chaotic Image Encryption”. Spring, Mathematics Senior Seminar, 4901.
Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law (2006) ”A Fast Image Encryption Scheme based on Chaotic Standard Map”. Cryptography and Security conference cited as arXiv:cs/0609158v1 , Volume 372, Issue 15, pp 2645-2652.
Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law (2006),”A Fast Image Encryption Scheme based on Chaotic Standard Ma p”. Cryptography and Security conference cited as arXiv:cs/0609158v1 , Volume 372, Issue 15, pp 2645-2652.
Kwok-Wo Wong, Bernie Sin-Hung Kwok,(2007) ”An Efficient Diffusion Approach for Chaosbased Image Encryption”. 3rd International conference Physics and Control (Physcon 2007)
Ling Bin, Liu Lichen, Zhang Jan (2010) ”Image encryption algorithm based on chaotic map and S-DES”.IEEE ,10.1109/ICACC.2010. 5486998, pp 41-44.
LjupEoKocarev, GoceJakimoski, Toni Stojanovski, Ulrich Parlit (1998), ”From chaotic maps to encryption schemes”, Circuits and Sys tems, 1998. ISCAS 98. Proceedings of the 1998 IEEE International Symposium. 10.1109/ISCAS.1998.698968, vol.4, pp 514 – 517.
Monisha Sharma (2010), ”Image encryption techniques using chaotic schemes: A review”. International Journal of Engineering Science and Technology Vol. 2(6),2359-2363, ISSN: 0975-5462, pp 1-10.
Muhammad Asim and VarunJeoti,(2007) ”Image Encryption: Comparison between AES and a Novel Chaotic Encryption Scheme” I EEE. 10.1109/ICSCN.2007.350697, pp 65-69.
ShiguoLian, Jinsheng Sun, Zhiquan Wang (2005) ”Security analysis of a chaos-based image encryption algorithm”. Science direct, Physica A: Statistical Mechanics and its Applications 351 (2-4) , pp 645-661.
ShuaiRen, ChengshiGao, Qing Dai, XiaoFeiFei (2010) ”Attack to an Image Encryption Algorithm based on Improved Chaotic Cat Maps”.3rd International Congress on Image and Signal Processing (CISP2010), 10.1109/CISP.2010.5647659, pp 533-536.
Suresh Jaganathan, M B Geetha Manjusha, 2011, “dFuse: An Optimized Compression Algorithm for DICOM-format image archive”, International Journal of Biometrics and Bioinformatics (IJBB), Volume (5) ,Issue (2) , 42-52, ISNN: 1985-2347
Yaobin Mao and Guanrong Chen (2005), ”Chaos-Based image encryption”. www.open-image.org/725publication/journal/CBIE.pdf
YUAN-BIAO ZHANG, ”Chaos based cryptography. An alternative to algebraic cryptography”.2008.
Zhiliang Zhu, KeZhai, Beilei Wang, Hongjuan Liu, Huiyan Jiang (2009) ”Research on Chaos-based Message Digest Method for Medical Images”. IEEE, 1109/CISP.2009.5301139, pp 1-510
Zhu Yu, Zhou Zhe, Yang Haibing, Pan Wenjie, Zhang Yunpeng (2010), ”A Chaos-Based Image Encryption Algorithm Using Wavelet Transform” IEEE , 10.1109/IEMBS.2010.5628061, pp 1037-1040.
Mr. Suresh Jaganathan
- India
Mr. Arun Fera M
- India