Secured Transmission of Medical Images in Radiology Using AES Technique

  • Pavithra Prabhu
  • K. N. Manjunath
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 31)


Medical imaging technology results in more than thousands of images per patient and transmitting them securely over an insecure network is a challenging task still. Maintaining the data integrity against intruder is important. This paper discusses a hybrid method which combines image processing and cryptography to make sure that all images are securely transmitted. In the proposed method, a Digitally Reconstructed Radiograph (DRR) is generated from all the images of a 3D volume of the patient, and then divided the DRR image into four equal quadrants. The zigzag pattern was applied to all these sixteen quadrants. Each quadrant was separately encrypted in block cipher mode using AES algorithm. At the receiver side, the DRR was regenerated from all the transmitted images and was compared with the deciphered blocks using histogram comparison of each block. The method was applied to CT images of 40 patients of brain tumor, CT colonography, and nasopharynx dataset. The image injection techniques were applied and tested the result with the addition of image, deletion of an image and through modification of Hounsfield values.


DICOM DRR Zigzag, CT scan AES Block cipher 


  1. 1.
    The DICOM Chapter 3 (2012) PS 3.3 [Online]. NEMA USA, Virginia, pp 390–1174. Accessed 19 June 2016
  2. 2.
    Kalender WA (2006) X-ray computed tomography. Phys Med Biol 51(13):29–43CrossRefGoogle Scholar
  3. 3.
    Abdel-Nabi H, Al-Haj A (2017) Efficient joint encryption and data hiding algorithm medical images security. In: 8th international conference on information and communication systems (ICICS)Google Scholar
  4. 4.
    Al-Haj A, Abandah G, Hussein N (2015) Crypto based algorithms for secured medical image transmission. Inst Eng Technol (IET) J 9(6):365–373CrossRefGoogle Scholar
  5. 5.
    Kobayashi L, Furuie S, Barreto P (2009) Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13(4):582–589CrossRefGoogle Scholar
  6. 6.
    Natsheh QN, Li B, Gale AG (2016) Security of multi-frame DICOM images using X-OR encryption approach. In: International conference on medical imaging understanding and analysis, at Loughborough, UKGoogle Scholar
  7. 7.
    Puech W, Rodrigues M (2004) A new crypto-watermarking method for medical images safe transfer. In: 12th European signal processing conferenceGoogle Scholar
  8. 8.
    Blackledge J, Al-Rawi A, Tobin P (2014) Stegacryption of DICOM metadata. In: 25th IET Irish signals and systems conference 2014 and 2014 China-Ireland international conference on information and communications technologies (ISSC 2014/CIICT 2014)Google Scholar
  9. 9.
    Fathima Nasreen K, Chitra P (2016) A robust encryption and digital watermarking scheme for DICOM images using quaternion and DWT-SVD. In: Online international conference on green engineering and technologies (IC-GET), 2016Google Scholar
  10. 10.
    Bouslimia D, Coatrieuxa G, Rouxa C (2011) Joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echo graphic images. In: Computer methods and programs in biomedicine in Elsevier, pp 45–47Google Scholar
  11. 11. National Cancer Institute (NCI) [Online]. Accessed 27 Feb 2016
  12. 12.
    Manjunath KN, Siddalingaswamy PC, GK Prabhu (2017) Measurement of smaller colon polyp in CT Colonography images using morphological image processing. Int J Comput Assist Radiol Surg (Springer) 1–11.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringManipal Institute of Technology, Manipal Academy of Higher EducationManipalIndia

Personalised recommendations