UPSI Digital Repository (UDRep)
Start | FAQ | About

QR Code Link :

Type :article
Subject :L Education (General)
ISSN :1380-7501
Main Author :Bahbibi Rahmatullah
Additional Authors :Wang, Shir Li
Title :A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations
Place of Production :Tanjung Malim
Publisher :Fakulti Komputeran dan Meta Teknologi
Year of Publication :2023
Notes :Multimedia Tools and Applications
Corporate Name :Universiti Pendidikan Sultan Idris
HTTP Link :Click to view web link

Abstract : Universiti Pendidikan Sultan Idris
With the modernization of biomedical image equipment and image processing technology, the amount of medical image data increases rapidly. These medical images need to be transmitted over a public network between doctors or hospitals to provide telemedicine services and sometimes need to be uploaded to a telemedicine data center or health cloud due to limited local computing and storage resources. Medical images involve confidential and sensitive information of patients, and the confidentiality technology to protect patient privacy is becoming more and more important. These problems have been studied by many scholars, but these studies are largely limited and scattered. To the authors knowledge, there is no systematic literature review related to medical image confidentiality technology. To provide valuable insights into the technical environment and to support researchers, the available options and gaps in this research area must be understood. Therefore, in this study, the recent 5years research results in the field of medical image security are reviewed to map the field of study into a coherent taxonomy. We use five major academic databases which are (1) Medline, (2) IEEE Xplore, (3) WoS, (4) Scopus, and (5) ScienceDirect, and every literature related to (1) medical images, and (2) encryption were searched with a focus in these databases. These databases contain literature about medical image confidentiality technology. According to the classification scheme, the final data set consists of 123 pieces of literature, and are divided into five categories. The first category, which also occupies the most proportion, focuses on medical image confidentiality algorithms, and most of them adopt chaotic mapping correlative technology The second category considers multiple security requirements while studying medical image confidentiality. The third category combines medical image encryption and image compression technologies. The fourth category focuses on the hardware related medical image confidentiality design. The final category is the medical image security systems design. We then identify the basic characteristics of this emerging field from the following aspects; the motivations of using medical image confidentiality technology, the challenges of medical image confidentiality technology, and the recommendations for further research and use of medical image confidentiality technologies. Finally, the quality evaluation criteria of the medical image security algorithm are summarized, including but not limited to the evaluation of security and the evaluation of speed and time complexity. The results of the reference evaluation show that most studies on medical image security algorithms lack sufficient safety evaluation. This was evident from less than 30% of the total articles that used all kinds of security evaluation methods. 2020, Springer Science+Business Media, LLC, part of Springer Nature.

References

Abdmouleh MK, Khalfallah A, Bouhlel MS (2017) A novel selective encryption scheme for medical images transmission based-on JPEG compression algorithm. Procedia Comput Sci 112:369–376. https://doi.org/10.1016/j.procs.2017.08.026

Adeshina AM, Hashim R (2017) Computational approach for securing radiology-diagnostic data in connected health network using high-performance gpu-accelerated aes. Interdisciplin Sci: Computat Life Sci 9(1):140–152. https://doi.org/10.1007/s12539-015-0140-9

Ajili S, Hajjaji MA, Mtibaa A (2016) Combining watermarking and encryption algorithm for medical image safe transfer: method based on DCT. Int J Signal Imaging Syst Eng 9(4–5):242–251. https://doi.org/10.1504/IJSISE.2016.078269

Alaa M, Zaidan AA, Zaidan BB, Talal M, Kiah MLM (2017) A review of smart home applications based on internet of things. J Netw Comput Appl 97:48–65. https://doi.org/10.1016/j.jnca.2017.08.017

Al-Haj A (2015) Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images. J Digit Imaging 28(2):179–187. https://doi.org/10.1007/s10278-014-9734-8

Al-Haj A, Abandah G, Hussein N (2015) Crypto-based algorithms for secured medical image transmission. IET Inf Secur 9(6):365–373. https://doi.org/10.1049/iet-ifs.2014.0245

Alloghani M, Alani MM, Al-Jumeily D, Baker T, Mustafina J, Hussain A, Aljaaf AJ (2019) A systematic review on the status and progress of homomorphic encryption technologies. J Inf Secur Appl 48:102362. https://doi.org/10.1016/j.jisa.2019.102362

Alshaikh M, Laouamer L (2016) Efficient and robust encryption and watermarking technique based on a new chaotic map approach. Multimed Tools Appl 76(6):8937–8950. https://doi.org/10.1007/s11042-016-3499-7

Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(08):2129–2151. https://doi.org/10.1142/S0218127406015970

Amina S, Mohamed FK (2018) An efficient and secure chaotic cipher algorithm for image content preservation. Commun Nonlinear Sci Numer Simul 60:12–32. https://doi.org/10.1016/j.cnsns.2017.12.017

Anusudha K, Venkateswaran N, Valarmathi J (2017) Secured medical image watermarking with DNA codec. Multimed Tools Appl 76(2):2911–2932. https://doi.org/10.1007/s11042-015-3213-1

Arumugham S, Rajagopalan S, Rayappan JBB, Amirtharajan R (2018) Networked medical data sharing on secure medium–a web publishing mode for DICOM viewer with three layer authentication. J Biomed Inform 86:90–105. https://doi.org/10.1016/j.jbi.2018.08.010

Arumugham S, Rajagopalan S, Rayappan JBB, Amirtharajan R (2019) Tamper-resistant secure medical image carrier: an IWT–SVD–Chaos–FPGA combination. Arab J Sci Eng 44:1–20. https://doi.org/10.1007/s13369-019-03883-x

Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426–437. https://doi.org/10.1016/j.measurement.2019.02.069

Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):208. https://doi.org/10.1007/s10916-018-1053-z

Badr AM, Zhang Y, Umar HGA (2019) Dual authentication-based encryption with a delegation system to protect medical data in cloud computing. Electronics 8(2):171. https://doi.org/10.3390/electronics8020171

Bakshi A (2018) Secure authentication, privacy and integrity in telemedicine using visual cryptography. Int J Adv Sci Technol 117(1):11–28

Bakshi A, Patel AK (2019) Secure telemedicine using RONI halftoned visual cryptography without pixel expansion. J Inf Sec Appl 46:281–295. https://doi.org/10.1016/j.jisa.2019.03.004

Banik A, Shamsi Z, Laiphrakpam DS (2019) An encryption scheme for securing multiple medical images. J Inf Secur Appl 49:102398. https://doi.org/10.1016/j.jisa.2019.102398

Begum AAS, Nirmala S (2018) Secure visual cryptography for medical image using modified cuckoo search. Multimed Tools Appl 77(20):27041–27060. https://doi.org/10.1007/s11042-018-5903-y

Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on Chaos and DNA encoding. IEEE Access 7:36667–36681. https://doi.org/10.1109/ACCESS.2019.2906292

Bhardwaj R, Aggarwal A (2019) Hiding clinical information in medical images: an encrypted dual-image reversible data hiding algorithm with base-3 numeral framework. Optik 181:1099–1112. https://doi.org/10.1016/j.ijleo.2018.12.130

Borra S, Thanki R (2019) Crypto-watermarking scheme for tamper detection of medical images. Comp Methods Biomech Biomed Eng: Imaging Visual:1–11. https://doi.org/10.1080/21681163.2019.1595730

Bouslimi D, Coatrieux G (2016) A crypto-watermarking system for ensuring reliability control and traceability of medical images. Signal Process Image Commun 47:160–169. https://doi.org/10.1016/j.image.2016.05.021

Boussif M, Aloui N, Cherif A (2017) New watermarking/encryption method for medical images full protection in m-health. Int J Electric Comput Eng (2088–8708) 7(6):3385–3394. https://doi.org/10.11591/ijece.v7i6

Boussif M, Aloui N, Cherif A (2017) Smartphone application for medical images secured exchange based on encryption using the matrix product and the exclusive addition. IET Image Process 11(11):1020–1026. https://doi.org/10.1049/iet-ipr.2017.0229

Boussif M, Aloui N, Cherif A (2018) Secured cloud computing for medical data based on watermarking and encryption. IET Networks 7(5):294–298. https://doi.org/10.1049/iet-net.2017.0180

Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96–109. https://doi.org/10.1016/j.sigpro.2016.10.003

Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96–109. https://doi.org/10.1016/j.sigpro.2016.10.003

Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35–51. https://doi.org/10.1016/j.sigpro.2016.11.016

Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Networks 2017:1–12. https://doi.org/10.1155/2017/6729896

Chen X, Hu CJ (2017) Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J Biol Sci 24(8):1821–1827. https://doi.org/10.1016/j.sjbs.2017.11.023

Chen L, Wang S (2015) Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 65:69–75. https://doi.org/10.1016/j.compbiomed.2015.07.024

Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang Y (2015) An image encryption scheme using nonlinear interpixel computing and swapping based permutation approach. Commun Nonlinear Sci Numer Simul 23(1–3):294–310. https://doi.org/10.1016/j.cnsns.2014.11.021

Chen L, Liu J, Wen J, Mao H, Ge F, Zhao D (2015) Pseudo color image encryption based on three-beams interference principle and common vector composition. Opt Commun 338:110–116. https://doi.org/10.1016/j.optcom.2014.10.036

Chen J, Chen L, Zhang LY, Zhu ZL (2019) Medical image cipher using hierarchical diffusion and nonsequential encryption. Nonlinear Dynamics 96(1):301–322. https://doi.org/10.1007/s11071-019-04791-3

Chen Y, Tang C, Ye R (2020) Cryptanalysis and improvement of medical image encryption using highspeed scrambling and pixel adaptive diffusion. Signal Process 167:107286. https://doi.org/10.1016/j.sigpro.2019.107286

Dagadu JC, Li J (2018) Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimed Tools Appl 77(18):24289–24312. https://doi.org/10.1007/s11042-018-5725-y

Dagadu JC, Li JP, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wireless Personal Commun:1-22. https://doi.org/10.1007/s11277-019-06420-z

Dai Y, Wang H, Wang Y (2016) Chaotic medical image encryption algorithm based on bit-plane decomposition. Int J Pattern Recognit Artif Intell 30(04):1657001. https://doi.org/10.1142/S0218001416570019

Dai Y, Wang H, Sun H (2016) Cyclic-shift chaotic medical image encryption algorithm based on plain text key-stream. Int J Simulation–Syst Sci Technol 17(27). https://doi.org/10.5013/IJSSST.a.17.27.24

Dai Y, Wang H, Zhou Z, Jin Z (2016) Research on medical image encryption in telemedicine systems. Technol Health Care 24(s2):S435–S442. https://doi.org/10.3233/THC-161166

Devi RS, Thenmozhi K, Rayappan JBB, Amirtharajan R, Praveenkumar P (2019) Entropy influenced RNA diffused quantum Chaos to conserve medical data privacy. Int J Theor Phys 58(6):1937–1956. https://doi.org/10.1007/s10773-019-04088-6

Dong J, Li J, Duan Y, Guo Z (2016). A robust zero-watermarking algorithm for encrypted medical images in the DWT-DCT encrypted domain. Int J Simulat–Syst Sci Technol 17(43). https://doi.org/10.1007/978-3-319-39687-3_19

Dorgham O, Al-Rahamneh B, Almomani A, Khatatneh KF (2018) Enhancing the security of exchanging and storing DICOM medical images on the cloud. Int J Cloud Appl Comput (IJCAC) 8(1):154–172. https://doi.org/10.4018/IJCAC.2018010108

Dridi M, Hajjaji MA, Bouallegue B, Mtibaa A (2016) Cryptography of medical images based on a combination between chaotic and neural network. IET Image Process 10(11):830–839. https://doi.org/10.1049/iet-ipr.2015.0868

Dzwonkowski M, Rykaczewski R (2018) Secure quaternion Feistel cipher for DICOM images. IEEE Trans Image Process 28(1):371–380. https://doi.org/10.1109/TIP.2018.2868388

Dzwonkowski M, Papaj M, Rykaczewski R (2015) A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process 24(11):4614–4622. https://doi.org/10.1109/TIP.2015.2467317

El-Latif AAA, Abd-El-Atty B, Talha M (2017) Robust encryption of quantum medical images. IEEE Access 6:1073–1081. https://doi.org/10.1109/ACCESS.2017.2777869

Farah MB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics:1-24. https://doi.org/10.1007/s11071-019-05413-8


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries, kindly contact us at pustakasys@upsi.edu.my or 016-3630263. Office hours only.