Back to Search Start Over

Hamming Code Strategy for Medical Image Sharing

Authors :
Li Li
Ching-Chun Chang
Junlan Bai
Hai-Duong Le
Chi-Cheng Chen
Teen-Hang Meen
Source :
Applied System Innovation, Vol 3, Iss 1, p 8 (2020)
Publication Year :
2020
Publisher :
MDPI AG, 2020.

Abstract

In medical practice, the scanned image of the patient between the patient and the doctor is confidential. If info is stored on a single server and the server is successfully attacked, it is possible to expose confidential information. Password encryption and data authentication are commonly used to protect patient data, however, encryption and data authentication are computationally expensive and take time to execute on a mobile device. In addition, it is not easy for the patient details related to medical images to leak if the hacked image are not visual.Therefore, in this paper, we propose a way to make medical images remain untouched in this sense. We use our method to quickly create two shadows from two medical images and store them on two servers. Revealing a shadow image does nothing to compromise the confidentiality of a patient’s health. This method is based on Hamming code. With low computational cost, the proposed scheme is suitable for tablet, pamphlets and other mobile devices.

Details

Language :
English
ISSN :
25715577
Volume :
3
Issue :
1
Database :
Directory of Open Access Journals
Journal :
Applied System Innovation
Publication Type :
Academic Journal
Accession number :
edsdoj.2940940010794e19b3ef15e3d7ad9bff
Document Type :
article
Full Text :
https://doi.org/10.3390/asi3010008