Content area
Full Text
http://crossmark.crossref.org/dialog/?doi=10.1007/s10916-016-0514-5&domain=pdf
Web End = J Med Syst (2016) 40: 156DOI 10.1007/s10916-016-0514-5
http://crossmark.crossref.org/dialog/?doi=10.1007/s10916-016-0514-5&domain=pdf
Web End = http://crossmark.crossref.org/dialog/?doi=10.1007/s10916-016-0514-5&domain=pdf
Web End = http://crossmark.crossref.org/dialog/?doi=10.1007/s10916-016-0514-5&domain=pdf
Web End = http://crossmark.crossref.org/dialog/?doi=10.1007/s10916-016-0514-5&domain=pdf
Web End = http://crossmark.crossref.org/dialog/?doi=10.1007/s10916-016-0514-5&domain=pdf
Web End = http://crossmark.crossref.org/dialog/?doi=10.1007/s10916-016-0514-5&domain=pdf
Web End = http://crossmark.crossref.org/dialog/?doi=10.1007/s10916-016-0514-5&domain=pdf
Web End = TRANSACTIONAL PROCESSING SYSTEMS
Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images
Petros L. K. Mantos1 & Ilias Maglogiannis1
Received: 4 January 2016 /Accepted: 29 April 2016 /Published online: 11 May 2016 # Springer Science+Business Media New York 2016
Abstract The exchange of medical images over the Internet has evoked significant interest over the past few years due to the introduction of web and cloud based medical information systems. The protection of sensitive data has always been a key indicator in the performance of such systems. In this context, this work presents an algorithm developed for Digital Imaging and Communications in Medicine (DICOM) medical images, which applies secret-sharing steganography methods for ensuring the integrity of sensitive patient data as well as the important parts of the image. In the proposed algorithm, images are divided into two parts: the region of interest (ROI) and the region of non interest (RONI). Patient data and integrity hashes are positioned inside the ROI while the information (map) needed to recover the ROI before insertion is positioned in the RONI. Security of the extraction process is assured through the use of cryptography. The experimental results prove that the original (cover) images and the stego images provide an excellent visual equality result in terms of PSNR. Furthermore, they prove that the proposed scheme can be efficiently used as a steganography scheme in DICOM images with limited smooth areas.
Keywords Watermarking . Steganography . Secret sharing . DICOM medical images . Security . Image processing
Introduction and related work
Recently Web and Cloud based medical information systems have dynamically entered the market of electronic healthcare systems. Thus, the exchange of medical data over the Internet and the storage of data in Cloud infrastructures is prospectively a common practice in modern hospital information systems [1, 2]. In addition, online collaboration systems such as the one presented in [3] require the exchange of medical images over the Internet. A key performance indicator for the adoption of such systems is data security...