Abstract
Background: While transmitting the medical images in radiology information systems the adversary effect can break the CIA (Confidentiality, Integrity, and Availability) triads of information security. The objective of the study was to transmit the complete set of image objects in a dataset without data integrity violation. Methods: In this paper a hybrid cryptographic technique which combines the prime details from the patient dataset (stack of axial 2D images) and the Advanced Encryption Standard (AES) method has been proposed. The steps include a) Creating an artificial X-ray image (DRR) from the 3D volume, b) dividing the DRR image in x and y directions equally into four regions, c) applying the zig-zag pattern to each quadrant, and d) encryption of each quadrant with block cipher mode using the AES algorithm. After dataset transmission the DRR image was regenerated at the receiver and compared each of the deciphered blocks (transmitted ones) using the histogram technique. Results: The technique was tested on CT and MRI scans of sixty datasets. The image injection techniques, such as adding and deleting an image from the dataset and modifying the image pixels, were tested. The results were validated statistically using mean square error and histogram matching techniques. Conclusion: The combination of the DRR and the AES technique has ensured the secured transmission of the entire dataset and not an individual image.
| Original language | English |
|---|---|
| Pages (from-to) | 185-193 |
| Number of pages | 9 |
| Journal | Asian Pacific Journal of Cancer Prevention |
| Volume | 22 |
| Issue number | 1 |
| DOIs | |
| Publication status | Published - 2021 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 3 Good Health and Well-being
All Science Journal Classification (ASJC) codes
- Epidemiology
- Oncology
- Public Health, Environmental and Occupational Health
- Cancer Research
Fingerprint
Dive into the research topics of 'Data Integrity Of Radiology Images Over an Insecure Network Using Aes Technique'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver