ABSTRACT

In this multimedia ruled epoch, safe and secure exchanging of investigative information among doctors to share their expertise is very much required in e-medicine applications. The protection of medical image features with extreme uniqueness and integrity has become an alarming concern in the area of medical diagnosis systems. The established security algorithms cannot withstand the bulk size and high correlation provided by Digital Imaging in Communication and Medicine (DICOM) pixels. Similarly, conventional schemes cannot withstand the channel attacks and the security threats posed by the open communication medium. Hence, there arises a need to design and analyse security algorithm to handle medical images in an open threat communication channel. Picture Archiving and Communication System (PACS) integrates and communicates with various imaging systems associated with the patient record. Hence security must be offered to support inter-opera ability and to afford wide network teleservices.

Hence, this chapter proposes an authenticated secure communication medium to share Electronic Patient Record (EPR) among the peers to ensure confidentiality and seclusion. Electronic Patient Record (EPR) mostly dealt with the DICOM format. Hence a brief overview about DICOM, in association with Health Insurance Portability and Accountability Act (HIPAA), National Electrical Manufacturers Association (NEMA), PACS and the various modalities associated with it are discussed.

Image analysis like statistical attack analysis and differential attack analysis is carried out to prove the sternness of the proposed DICOM security algorithms. To prove the strength of the decryption algorithm, various attack analysis like cropping attack, noise attack, chosen plaintext attack and communication channel noises were considered. To provide security to patient data, various encryption techniques in DICOM based on chaotic maps, watermarking and embedding techniques using Quick Response (QR) codes and some Deoxyrebo Nucleic Acid (DNA) based cryptographic techniques in association with Latin Square Image Cipher (LSIC), Rubik’s and Hash function were discussed. Sample results were tabulated and shown in figures considering sample DICOM images.