Medical Image Infosecurity Using Hash Transformation and Optimization-Based Controller in a Health Information System: Case Study in Breast Elastography and X-Ray Image
Autor: | Chao-Lin Kuo, Chien-Ming Li, Pi-Yun Chen, Neng-Sheng Pai, Chia-Hung Lin, Jian-Xing Wu |
---|---|
Rok vydání: | 2020 |
Předmět: |
infosecurity
General Computer Science Computer science Hash function ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION Cryptography optimization based controller Encryption computer.software_genre Health informatics Control theory eHealth General Materials Science business.industry General Engineering Particle swarm optimization Digital health ComputingMethodologies_PATTERNRECOGNITION hash transformation signal-to-noise ratio lcsh:Electrical engineering. Electronics. Nuclear engineering Data mining business lcsh:TK1-9971 computer |
Zdroj: | IEEE Access, Vol 8, Pp 61340-61354 (2020) |
ISSN: | 2169-3536 |
DOI: | 10.1109/access.2020.2983428 |
Popis: | In recent years, several countries have increasingly promoted digital health to improve medical care quality and precision medicine. Concerns such as how to employ and manage medical data, including physiological signals and medical images, have emerged as one of the core issues in eHealth. The National Health Insurance of Taiwan has gradually generated cross-hospital medical image databases since the year 2018, including lung cancer, brain tumor, breast tumor, liver tumor, and coronary arterial diseases. Digitized medical image data can be stored in cloud databases or be transmitted via computer networks or wireless transmissions. However, patient confidentiality and transmission infosecurity are serious concerns in public channels or spaces, which raises the question of how to prevent data from being stolen, tampered, or peeked after receipt by unauthorized people. Hence, infosecurity has become an important issue in the digital era. This study proposes hash transformation with multi-secret keys and an optimization-based controller to engage a novel cryptographic method to encrypt and decrypt digital medical images in a health information system. Both the gradient descent (GD) and the particle swarm optimization (PSO)-based controllers are implemented to search the decryption key parameters. For a case study in breast elastography and X-ray images consisting of 150 benign tumors and 150 malignant tumors, the peak signal-to-noise ratio (PSNR) is used to evaluate the similarity of two images between the original images and the decrypted images. Conclusively, the PSO-based controller performed better than the GD-based controller and traditional cryptographic methods in terms of recovery reliability. |
Databáze: | OpenAIRE |
Externí odkaz: |