Skip to main content

Medical Image Security with Cheater Identification Using Secret Sharing Scheme

  • Conference paper
  • First Online:
Book cover Proceedings of the International Conference on Signal, Networks, Computing, and Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 395))

Abstract

Security of medical images and relevant patient information is a matter of important concern while using public networks for transfer of medical images between patients and clinicians. Clinicians require to confirm the legitimacy of patient medical images for applications such as telediagnosis and teleconsultation. Furthermore, medical image should not be perceivable to unauthorized parties with malicious intentions on the patient’s health. As a result, medical images must be protected with suitable primitives while transferring them over public channel. In this paper, we present a scheme for protecting medical images using a threshold secret sharing scheme. The proposed scheme protects images from unauthorized access and intermediate tampering, thus, ensuring confidentiality and integrity of the shared images and associated patient records. The scheme takes into consideration the possibility of malevolence from any of the participating clinicians and detects and identifies cheating among the clinicians, if any. The proposed scheme is analyzed and simulated with electronic patient records and the experimental results satisfy all the properties of the scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Shamir. How to share a secret. In: Communications of the ACM, 22(11):612–613, 1979.

    Google Scholar 

  2. M. Tompa and H. Woll. How to share a secret with cheaters. In: Journal of Cryptology, 1(2):133–138, 1988.

    Google Scholar 

  3. I. C. Lin. A \((t, n)\) Threshold Secret Sharing System With Efficient Identification Of Cheaters. In: Computing and Informatics, 24:529–541, 2005.

    Google Scholar 

  4. T. C. Wu and T. S. Wu. Cheating detection and cheater identification in secret sharing schemes. In: IEEE Proceedings of Computers and Digital Techniques,142(5):367–369, 1995.

    Google Scholar 

  5. C. C. Chang, P. Y. Lina, Z. H. Wangb, and M. C. Lib. A Sudoku-based Secret Image Sharing Scheme with Reversibility. In: Journal of Communications, 5(1):5–12, 2010.

    Google Scholar 

  6. E. B. Abdelsatir, S. Salahaldeen, H. Omar, and A. Hashim. A Novel \((k, n)\) Secret Sharing Scheme from Quadratic Residues for Grayscale Images. In: International Journal of Network Security and Its Applications, 6(4), 2014.

    Google Scholar 

  7. M. Ulutas, G. Ulutas, and V. Nabiyev. Medical image security and EPR hiding using Shamir’s secret sharing scheme. In: Journal of Systems and Software, 84:341–353, 2011.

    Google Scholar 

  8. M. Saeedand H. S. Shahhoseini, and A. Mackvandi. An improved two-party Password Authenticated Key Exchange protocol without server’s public key. In Proceedings of the IEEE International Conference on Communication Software and Networks, pp. 90–95, 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manik Lal Das .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer India

About this paper

Cite this paper

Krishnan, A., Das, M.L. (2017). Medical Image Security with Cheater Identification Using Secret Sharing Scheme. In: Lobiyal, D., Mohapatra, D., Nagar, A., Sahoo, M. (eds) Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Lecture Notes in Electrical Engineering, vol 395. Springer, New Delhi. https://doi.org/10.1007/978-81-322-3592-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-3592-7_12

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-3590-3

  • Online ISBN: 978-81-322-3592-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics