2014
DOI: 10.1007/s10278-014-9734-8
|View full text |Cite
|
Sign up to set email alerts
|

Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images

Abstract: Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
23
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 45 publications
(23 citation statements)
references
References 19 publications
0
23
0
Order By: Relevance
“…The cause of the flaw is that the internally generated keys and initialisation vectors were sent in the DICOM header in clear (not encrypted). Therefore compared with the algorithms proposed in this paper, the algorithm reported in [42] achieves authentication and integrity of the header and pixel data of the DICOM images, whereas confidentiality is not achieved. The algorithm is compared with the DICOM standard and Kobayashi scheme in Table 3.…”
Section: Performance Comparisonmentioning
confidence: 97%
See 2 more Smart Citations
“…The cause of the flaw is that the internally generated keys and initialisation vectors were sent in the DICOM header in clear (not encrypted). Therefore compared with the algorithms proposed in this paper, the algorithm reported in [42] achieves authentication and integrity of the header and pixel data of the DICOM images, whereas confidentiality is not achieved. The algorithm is compared with the DICOM standard and Kobayashi scheme in Table 3.…”
Section: Performance Comparisonmentioning
confidence: 97%
“…Finally, it is worthwhile mentioning that an attempt to achieve the three security services for DICOM images has been reported by one of the authors in a crypto-based algorithm in [42]. The algorithm relies on the three cryptographic functions which have been used in the two proposed algorithms.…”
Section: Performance Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…The security of computer field is provided with possibility techniques to cover these threats, like digital signature and watermarking techniques [1]. Watermarking techniques are applied in many fields in order to protect the content from unauthorized user [2], ensuring data integrity and authenticity [3], copyright proof [4] and data ownership [5]. The electronic data have to achieve security requirements.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography is the approach adopted in the digital imaging and communications in medicine (DICOM) standard which uses symmetric encryption, hashing functions, and digital signatures to provide integrity and authenticity [9][10][11]. However, a major limitation of pure cryptography is that the loss or deletion of the attached digital signature makes the image untrustworthy and thus it becomes hard to verify its integrity and authenticity.…”
Section: Introductionmentioning
confidence: 99%