An Innovative Approach to Solve Healthcare Issues Using Big Data Image Analytics

An Innovative Approach to Solve Healthcare Issues Using Big Data Image Analytics

Ramesh R., Udayakumar E., Srihari K., Sunil Pathak P.
Copyright: © 2021 |Pages: 11
DOI: 10.4018/IJBDAH.20210101.oa2
Article PDF Download
Open access articles are freely available for download

Abstract

The increasing adoption of transmission of medical images through internet in healthcare has led to several security threats to patient medical information. Permitting quiet data to be in peril may prompt hopeless harm, ethically and truly to the patient. Accordingly, it is important to take measures to forestall illicit access and altering of clinical pictures. This requests reception of security components to guarantee three fundamental security administrations – classification, content-based legitimacy, and trustworthiness of clinical pictures traded in telemedicine applications. Right now, inside created symmetric key cryptographic capacities are utilized. Pictorial model-based perceptual image hash is used to provide content-based authentication for malicious tampering detection and localization. The presentation of the projected algorithm has been evaluated using performance metrics such as PSNR, normalized correlation, entropy, and histogram analysis, and the simulation results show that the security services have been achieved effectively.
Article Preview
Top

Many threats posed by DICOM images. Some of those algorithms and their drawbacks are described in the next sections.

2.1. Crypto-Based Algorithms

This may reliably get modified. Believability and uprightness are suited the pixel data using propelled marks with inside delivered keys and it fails to give content based validity which is basic for change restriction. The count furthermore doesn't give mystery, validity and decency for the header data using big data.

Owing to the limitations referred to above, Al-Haj (Al-Haj & Hussein, 2015) propose a novel arrangement that keeps an eye on the security issues looked by the above arrangement. The count gives authenticity, protection and decency. In any case, the estimation doesn't have the modify constraint limit which is needed in the dependability affirmation of restorative pictures.

2.2. Hybrid Algorithms

At the point when everything is said in done, give uprightness restorative picture, while CRCs are fittingly used perceive modified zones in the got picture. Nevertheless, crossbreed estimations experience from being computation raised. Likewise, 1piece change in a cyclic redundancy code or a hash code will provoke fake affirmation and wrong genuineness check.

Top

3. Proposed Algorithm

The proposed calculation tends to every one of the restrictions looked by earlier works referenced in Section 2 by giving privacy. It likewise gives content based validation to the pixel information of DICOM picture by utilizing visual model based perceptual picture hashing capacity for altering recognition and limitation.

The proposed calculation comprises of two systems: the encryption and mark creation methodology, the decoding and mark check technique and the alter confinement strategy if the mark is seen as inauthentic. The calculation utilizes AES-GCM, the whirlpool hash capacity and ECDSA for DICOM header information and AES-GCM, the perceptual picture hashing and ECDSA for DICOM pixel information which gives classification, uprightness and substance based validness for the DICOM pictures.

3.1. Encryption and Signature Creation Procedure

A strategy has the classified characteristics of header information and pixel information sources of info and its yields are halfway scrambled DICOM header and completely encoded pixel information. The system is appeared in Figure 1.

Figure 1.

Encryption and signature creation producer of the proposed algorithm

IJBDAH.20210101.oa2.f01

3.1.1. Header Data Confidentiality

A strategy scrutinizes each and every private nature of the header data and scrambles their novel characteristics using AES-GCM using big data. The customer won't have the choice qualities, the instatement vector and the encryption key vary beginning with one picture then onto the following. This sidesteps the potential weakness introduced in the encryption platform (Santhi, 2017b). This strategy decodes the encoded pixel information and the halfway scrambled DICOM header information, and confirms their validness (Das & Kundu, 2013) and honesty as appeared in Figure 2 and Figure 3. On the off chance that the pixel information is seen as inauthentic, at that point the strategy will find the altered locale in the DICOM picture (Vetrivelan, 2017).

Figure 2.

Pixel data decryption and signature verification procedure

IJBDAH.20210101.oa2.f02

The names, validness and decency (Mohan, 2020; Ramesh, 2016) of the arranged characteristics of the pixel data are affirmed. If the two marks are not composed, by then adjusting control estimation as delineated in zone IV and as showed up in Figure 3. Must be applied and the modified areas must be found (Santhi, 2017a).

Figure 3.

Header data decryption and signature verification procedure

IJBDAH.20210101.oa2.f03

Complete Article List

Search this Journal:
Reset
Volume 9: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 8: 1 Issue (2023)
Volume 7: 1 Issue (2022)
Volume 6: 2 Issues (2021)
Volume 5: 2 Issues (2020)
Volume 4: 2 Issues (2019)
Volume 3: 2 Issues (2018)
Volume 2: 2 Issues (2017)
Volume 1: 1 Issue (2016)
View Complete Journal Contents Listing