scispace - formally typeset
Journal ArticleDOI

Medical image security in a HIPAA mandated PACS environment

TLDR
A dedicated PACS security server is proposed that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information.
About
This article is published in Computerized Medical Imaging and Graphics.The article was published on 2003-03-01. It has received 170 citations till now. The article focuses on the topics: Picture archiving and communication system & Cloud computing security.

read more

Citations
More filters
Journal ArticleDOI

Book review: Applied cryptography: Protocols, algorithms, and source code in C

TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.
Proceedings ArticleDOI

A Review of Image Watermarking Applications in Healthcare

TL;DR: It is concluded that watermarking has found a niche role in healthcare systems, as an instrument for protection of medical information, for secure sharing and handling of medical images.
Journal ArticleDOI

An efficient and secure medical image protection scheme based on chaotic maps

TL;DR: The proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm to address the efficiency problem encountered by many existing permutation-substitution type image ciphers.
Proceedings ArticleDOI

Digital watermarking for ROI medical images by using compressed signature image

TL;DR: A digital watermarking method which avoids the distortion of the image data in ROI by embedding signature information into other area than theROI by dividing the contour of the ROI into several regions and embedding the signature information in the regions respectively.
Journal ArticleDOI

A Review of Medical Image Watermarking Requirements for Teleradiology

TL;DR: The security requirements of medical images as well as expected threats in teleradiology are reviewed and justification for watermarking over conventional security measures is made in terms of their various objectives, properties, and requirements.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Related Papers (5)