Medical Image Security with Cheater Identification Using Secret Sharing Scheme

  • Arun Krishnan
  • Manik Lal Das
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 395)


Security of medical images and relevant patient information is a matter of important concern while using public networks for transfer of medical images between patients and clinicians. Clinicians require to confirm the legitimacy of patient medical images for applications such as telediagnosis and teleconsultation. Furthermore, medical image should not be perceivable to unauthorized parties with malicious intentions on the patient’s health. As a result, medical images must be protected with suitable primitives while transferring them over public channel. In this paper, we present a scheme for protecting medical images using a threshold secret sharing scheme. The proposed scheme protects images from unauthorized access and intermediate tampering, thus, ensuring confidentiality and integrity of the shared images and associated patient records. The scheme takes into consideration the possibility of malevolence from any of the participating clinicians and detects and identifies cheating among the clinicians, if any. The proposed scheme is analyzed and simulated with electronic patient records and the experimental results satisfy all the properties of the scheme.


Medical image Cheater identification Secret sharing 


  1. 1.
    A. Shamir. How to share a secret. In: Communications of the ACM, 22(11):612–613, 1979.Google Scholar
  2. 2.
    M. Tompa and H. Woll. How to share a secret with cheaters. In: Journal of Cryptology, 1(2):133–138, 1988.Google Scholar
  3. 3.
    I. C. Lin. A \((t, n)\) Threshold Secret Sharing System With Efficient Identification Of Cheaters. In: Computing and Informatics, 24:529–541, 2005.Google Scholar
  4. 4.
    T. C. Wu and T. S. Wu. Cheating detection and cheater identification in secret sharing schemes. In: IEEE Proceedings of Computers and Digital Techniques,142(5):367–369, 1995.Google Scholar
  5. 5.
    C. C. Chang, P. Y. Lina, Z. H. Wangb, and M. C. Lib. A Sudoku-based Secret Image Sharing Scheme with Reversibility. In: Journal of Communications, 5(1):5–12, 2010.Google Scholar
  6. 6.
    E. B. Abdelsatir, S. Salahaldeen, H. Omar, and A. Hashim. A Novel \((k, n)\) Secret Sharing Scheme from Quadratic Residues for Grayscale Images. In: International Journal of Network Security and Its Applications, 6(4), 2014.Google Scholar
  7. 7.
    M. Ulutas, G. Ulutas, and V. Nabiyev. Medical image security and EPR hiding using Shamir’s secret sharing scheme. In: Journal of Systems and Software, 84:341–353, 2011.Google Scholar
  8. 8.
    M. Saeedand H. S. Shahhoseini, and A. Mackvandi. An improved two-party Password Authenticated Key Exchange protocol without server’s public key. In Proceedings of the IEEE International Conference on Communication Software and Networks, pp. 90–95, 2011.Google Scholar

Copyright information

© Springer India 2017

Authors and Affiliations

  1. 1.DA-IICTGandhinagar GujaratIndia

Personalised recommendations