Hamming Code Strategy for Medical Image Sharing

In medical practice, the scanned image of the patient between the patient and the doctor is confidential. If info is stored on a single server and the server is successfully attacked, it is possible to expose confidential information. Password encryption and data authentication are commonly used to...

Full description

Bibliographic Details
Main Authors: Li Li, Ching-Chun Chang, Junlan Bai, Hai-Duong Le, Chi-Cheng Chen, Teen-Hang Meen
Format: Article
Language:English
Published: MDPI AG 2020-01-01
Series:Applied System Innovation
Subjects:
Online Access:https://www.mdpi.com/2571-5577/3/1/8
Description
Summary:In medical practice, the scanned image of the patient between the patient and the doctor is confidential. If info is stored on a single server and the server is successfully attacked, it is possible to expose confidential information. Password encryption and data authentication are commonly used to protect patient data, however, encryption and data authentication are computationally expensive and take time to execute on a mobile device. In addition, it is not easy for the patient details related to medical images to leak if the hacked image are not visual.Therefore, in this paper, we propose a way to make medical images remain untouched in this sense. We use our method to quickly create two shadows from two medical images and store them on two servers. Revealing a shadow image does nothing to compromise the confidentiality of a patient’s health. This method is based on Hamming code. With low computational cost, the proposed scheme is suitable for tablet, pamphlets and other mobile devices.
ISSN:2571-5577