Patient Information Security

2253 Words10 Pages
The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in insecure risk may lead to irreparable damage. Medical images play a crucial role in such context, given their importance in diagnosis, treatment, and research. Therefore, it is vital to take measures in order to prevent tampering and determine their source. This demands adoption of security mechanisms to assure information integrity, authenticity and confidentiality. Here implementing an algorithm for secured sharing of medical images and data using a crypto based approach with the consideration of the tampering localization to improve…show more content…
Introduction
Health is a one of the most basic needs of men. The right to health and medical care is one of the fundamental human rights. Nowadays, information systems are present in many areas in a healthcare institution. Telemedicine is the use of medical information exchanged from one site to another via electronic communications to improve a patient's clinical health status. It allows users in various locations to view medical images at the same time and improves patient care by allowing radiologist to provide service without having to be at patient location. This requires handling of security issues when dealing with medical information. The necessity of secure diagnosis is vital in the medical world. The transmission of data is a daily routine and is necessary to find a reliable way to transmit them over networks. Therefore, security is increasingly playing a relevant role in the healthcare field in order to provide services like information integrity, authenticity and
…show more content…
In this work Implementing a crypto-based algorithms capable of providing confidentiality and verifying authenticity and integrity of DICOM images with tamper localization scheme. Unlike the DICOM standard and other crypto-based schemes, the proposed algorithms provide confidentiality, authenticity and integrity for both constitutes of the DICOM images: the header data and the pixel data. Strong crypto- graphic functions with externally and internally generated symmetric keys and hash codes are used in the implementation of the algorithms. A major contribution of the algorithm is the strong bond established between the pixel data and header data and also included a tamper localization with the application of reversible watermarking scheme without any division of medical

More about Patient Information Security

Open Document