An Efficient and Lossless Cryptosystem for Security in Tele-Ophthalmology Applications Using Chaotic Theory

An Efficient and Lossless Cryptosystem for Security in Tele-Ophthalmology Applications Using Chaotic Theory

Garima Mehta (Amity University, Noida, India), Malay Kishore Dutta (Amity University, Noida, India) and Pyung Soo Kim (Korea Polytechnic University, Siheung, South Korea)
Copyright: © 2016 |Pages: 20
DOI: 10.4018/IJEHMC.2016100102
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Tele-ophthalmology has gained a lot of popularity as it involves retinal fundus images which can be analyzed for identification of severe diseases like diabetic retinopathy and glaucoma. With this increasing popularity, requirement for medical data confidentiality and privacy has also increased during transmission or storage. To meet this challenge, this paper propose an efficient and lossless cryptosystem based upon chaotic theory for encryption of medical fundus images. In the proposed encryption scheme a strategic combination of scrambling and substitution architecture is proposed which complements each other. The proposed scheme of encryption for fundus images is challenging as these images are 3-D color image and cannot be compressed as compression may not be able to retain all relevant medical information. For performance analysis, the proposed algorithm has been evaluated for perceptual and cryptographic security. The experimental results indicate that the proposed method is lossless and resistant against attacks making the proposed scheme suitable for real time applications.
Article Preview

1. Introduction

In today’s growing health care sector, telemedicine, the art of transfer of medical data over telecommunication channels (Montagnat, 2004; Nayak, 2009; Nayak,2004) for specialized medical expertise and improved patient care is gaining a lot of popularity. Telemedicine offer either offline/ online consultation with medical professionals for routine or specialized consultation on current medical health of the patient. Telemedicine may be applied to various types of medical data like MRI, Eco graphic images, X-Ray images, CT scan or retinal images etc. stored in electronic format in the medical databases (Norcen, 2003). These medical databases are specially designed for acquisition and storage of medical image data acquired from the patients worldwide to reduce the wastage of resources or duplicate examinations, analysis and medical health checkups.

One of the budding branches of telemedicine is tele-ophthalmology (Ng, 2009) which enables ophthalmologists to take ocular images to quantify microcirculation for diagnosing diseases like Diabetic Retinopathy and Glaucoma (Helen, 1999). The benefit of using tele-ophthalmology is to diagnose and monitor ophthalmic diseases for the patients living in distant areas. For security and data confidentiality in tele-ophthalmology applications there is a need to create a secure communication channel through which retinal images can be transferred. Hence to reduce the security risks, encryption may be introduced in area of tele-ophthalmology. Another reason for encryption of medical data is to provide the medical data confidentiality and accessible to authorized users only (Formazin, 2008) The choice of encryption method employed is very important since conventional cryptography mechanisms like RSA and AES are not suitable for encryption of medical data (Fu, 2013) due to its relatively large size and highly complexity. Further this method doesn’t support real time applications because of computational complexities. To solve these issues different encryption algorithms were developed.

As telemedicine is emerging as powerful technology advancement in the field of health care, the transmission of bulky medical images over the networks has also increased. As transmission networks are vulnerable to security breaches, the need of securing digital medical images is becoming an important concern. Encryption seems to provide an effective way around to prevent the loss of identity of medical images as it maintains confidentiality and integrity of the medical images. Existing work related to encryption of medical data has been done over CT images, X-Ray images, echo-graphic images, mammographic images in chaotic domain (Ashtiyani, 2008; Abokhdair, 2010; Fu, 2013). All these kind of medical images are usually 2-dimenstional images whereas retinal images considered in this work are three dimensional color depth images. Moreover, for these retinal images dimensional reduction or compression may not be possible as well as loss of information during encryption and decryption process is undesirable since any loss of information may lead to false diagnosis. Thereby there is a need to develop a lossless and efficient encryption scheme to secure these colored retinal images.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing