[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2184751.2184860acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Medical image protection using secret sharing scheme

Published: 20 February 2012 Publication History

Abstract

With the establishment of medical information system, lots of medical images are stored in computer and transmitted among hospitals by network. Once the medical images are stolen or abused, the rights of the patients will suffer violation. The paper proposes a secret sharing scheme to protect the security of the medical images. No one can obtain any information from one of the shared images unless the authorized people. Experimental results show that the proposed scheme not only protect the security of the medical images, but also recover the medical images without distortion.

References

[1]
Shamir, A. 1979. How to share a secret. Communication of the ACM. 22, 11 (1979), 612--613.
[2]
Blakley, G. R. 1979. Safeguarding cryptographic keys. AFIPS conference proceedings. 48 (1979), 313--317.
[3]
Naor, N. and Shamir, A. Visual cryptography. Advances in Cryptology: Eurocrypt'94. LNCS, 950 (1994), 1--12.
[4]
Hou, Y.-C. and Tu, S.-F. Visual cryptography techniques for color images without pixel expansion. Journal of Information, Technology and Society. 1 (2004), 95--110.
[5]
Tu, S.-F. and Hou, Y.-C. Design of visual cryptographic methods with smooth-looking decoded images of invariant size for grey-level images. The Imaging Science Journal. 55 (2007), 90--101.
[6]
Huang, Y.-J., Lee, C.-C., Wu, H.-C., Chang, J.-D., Tsai, C.-S., and Tsao, Y.-T. Novel non-expanded visual cryptography scheme with block encoding. Journal of Computers. 22, 2 (July. 2011), 61--71.
[7]
Lukac, R. and Plataniotis, K. N. Bit-level based secret sharing for image encryption. Pattern Recognition. 38 (2005), 767--772.
[8]
Shyu, S.-J. Image encryption by random grids. Pattern Recognition, 40, 3 (2007), 1014--1031.
[9]
Kafri, O. and Keren, E. Encryption of pictures and shapes by random grids. Optics Letters. 12, 6 (1987), 377--379,
[10]
Chen, T.-H. and Tsao, K.-H. Visual secret sharing by random grids revisited. Pattern Recognition. 42, 9 (2009), 2203--2217.
[11]
Wang, D.-S., Zhang, L., Ma, N., and Li, X.-B. Two secret sharing schemes based on boolean operations. Pattern Recognition. 40, 10 (2007), 2776--2785.

Cited By

View all
  • (2023)Secret Image Sharing Schemes: A Comprehensive SurveyIEEE Access10.1109/ACCESS.2023.330405511(98333-98361)Online publication date: 2023
  • (2016)A secure framework for medical image storage based on multi-cloud2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)10.1109/CloudTech.2016.7847683(88-94)Online publication date: May-2016

Index Terms

  1. Medical image protection using secret sharing scheme

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICUIMC '12: Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
    February 2012
    852 pages
    ISBN:9781450311724
    DOI:10.1145/2184751
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 February 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. medical images
    2. multi-bit grid
    3. pixel expansion
    4. random grid
    5. secret sharing

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ICUIMC '12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 251 of 941 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Secret Image Sharing Schemes: A Comprehensive SurveyIEEE Access10.1109/ACCESS.2023.330405511(98333-98361)Online publication date: 2023
    • (2016)A secure framework for medical image storage based on multi-cloud2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)10.1109/CloudTech.2016.7847683(88-94)Online publication date: May-2016

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media