Abstract
The responsibility of maintaining patient’s records is with medical personnel. The medical personnel are supposed not to disclose any kind of medical information related to the patient. This is also applicable for the medical information discovered by medical personnel in connection with the treatment of the patient. With the advent of technology and its penetration into the medical field in the form of telemedicine and e-health, the challenge of maintaining confidentiality is becoming complex. The confidentiality needs to be protected from storage of medical image or transmission of image from a medical database center to other. Nowadays, the information of patient is printed in the corner of the medical image. This can be accessed by anybody or even the machine can access and store the information. During an electronic transmission, the patient information may be intercepted by a third party. This may lead to big lawsuit. Apart from these security issues, for scenarios such as medical research, the image should be used but patient information should be hidden. Also for diagnostic purposes, the information of the patient should be readily accessible to the medical personnel. These constraints lead to the necessity of suitable security techniques for medical image storage and transmission. If suitable security techniques are not applied, privacy of patients will be stake. Hence, numerous methods are being implemented by individuals, governments and businesses for secured transmission of patient’s data. For patient’s privacy protection, secured transmission requires techniques like cryptography and watermarking. These techniques achieve confidentiality and integrity. In this work, a new approach has been developed for secured transmission of medical images.
Similar content being viewed by others
Change history
14 June 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s12652-022-04162-8
References
Ahmed R, Hassan B, Li B (2018) Robust hybrid watermarking for security of medical images in computer-aided diagnosis based telemedicine applications. In: 2018 IEEE international symposium on signal processing and information technology (ISSPIT), pp 1–5
Berlekamp E, McEliece R, Van Tilborg H (1978) On the inherent intractability of certain coding problems. IEEE Trans Inf Theory 24(3):384–386
de Carvalho DF, Chies R, Freire AP, Martimiano LA, Goularte R (2008) Video steganography for confidential documents: integrity, privacy and version control. In: Proceedings of the 26th annual ACM international conference on design of communication, pp 199–206
Deepa R, Sutha J (2017) Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Biomed Res 2017:315–320
Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Human Comput 11(3):1309–1324
John RM, Cherian JP (2015) Secure image transmission via mosaic images using genetic algorithm. Int J Innovat Res Sci Technol 2(5):208–213
Junaid KM, Ravindran G (2012) Modified DWT based medical image transmission using reduced storage space. Asian J Biomed Pharmaceut Sci 2(10):24–32
Kamble P, Patil S (2018) Medical image security with cheater identification. In: 2018 fourth international conference on computing communication control and automation (ICCUBEA), pp 1–6
Kester QA, Nana L, Pascu AC, Gire S, Eghan JM, Quaynor NN (2015) A security technique for authentication and security of medical images in health information systems. In 2015, 15th international conference on computational science and its applications, pp 8–13
Lo-Varco G, Puech W, Dumas M (2003) DCT-based watermarking method using error correction coding. In ICAPR'03: international conference on advances in pattern recognition, pp 347–350
McEliece RJ (1978) A public-key cryptosystem based on algebraic. Coding Thv 4244:114–116
Norcen R, Podesser M, Pommer A, Schmidt HP, Uhl A (2003) Confidential storage and transmission of medical image data. Comput Biol Med 33(3):277–292
Pande AP, Thakur NV (2018) A survey on different ways of secure image transmission. Int Res J Eng Technol 5(2):407–413
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934
Rohini S, Bairagi V (2010) Lossless medical image security. Int J Appl Eng Res 1(3):536–541
Sneha PS, Sankar S, Kumar AS (2020) A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. J Ambient Intell Human Comput 11(3):1289–1308
Soleymani A, Ali ZM, Nordin MJ (2012) A survey on principal aspects of secure image transmission. Proc World Acad Sci Eng Technol 66:247–254
Umamageswari A, Suresh GR (2013) Security in medical image communication with arnold's cat map method and reversible watermarking. In: 2013, international conference on circuits, power and computing technologies (ICCPCT), pp 1116–1121
Zhang J, Hou D, Ren H (2016) Image encryption algorithm based on dynamic DNA coding and Chen’s hyperchaotic system. Math Probl Eng 2016:1–11
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-04162-8
About this article
Cite this article
Madhusudhan, K.N., Sakthivel, P. RETRACTED ARTICLE: A secure medical image transmission algorithm based on binary bits and Arnold map. J Ambient Intell Human Comput 12, 5413–5420 (2021). https://doi.org/10.1007/s12652-020-02028-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02028-5