ABSTRACT
The use of telecommunications and information technologies in the medicine sector were evolved breathtakingly last years. This involves the developpement of the applications bound to the telemedicine. Seen the importance of this discipline in the improvement of the care quality, the reduction of treatment costs, and in the universalization of the medical practices and knowledges, the optimization of medical related applications remains a necessity. In this meaning, we propose in this work an efficient scheme for the transmission and the storage of medical images. This scheme is applied to the on line medical folder sector that is, currently, one of the most potential sector in telemedecine. A new approach concerning the integration of the partial encryption in compression algorithms based on the RLE encoding technique, will be presented and developed.
|
REFERENCES
[1] M. K. Abdmouleh, H. Amri, A. Khalfallah, and M. S. Bouhlel. An efficient crypto-compression scheme for medical images by selective encryption using DCT. International Journal of Advanced Intelligence Paradigms, page Inpress, 2016.
[2] M. K. Abdmouleh, A. Masmoudi, and M. S. Bouhlel. A new method which combines arithmetic coding with rle for lossless image compression. Journal of Software Engineering and Applications, 5(1):41–44, January 2012.
[3] M. S. Bouhlel, F. Kammoun, and E. Garcia. An efficient DCT-based crypto-compression scheme for a secure and authentic medical image transmission. Journal of Testing and Evaluation for Applied Sciences and Engineering, 34(6):459–463, 2006.
[4] N. Bourbakis and C. Alexopoulos. Picture data encryption using scan patterns. Pattern Recognition, 25(6):567–581, 1992.
[5] H. K-C. Chang and J-L. Liu. A linear quadtree compression scheme for image encryption. Signal Processing: Image Communication, 10(4):279–290, 1997.
[6] H. Cheng and Xiaobo Li. Partial encryption of compressed images and videos. Trans. Sig. Proc., 48(8):2439–2451, August 2000.
[7] D. Coppersmith. The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev., 38(3):243–250, May 1994.
[8] L. Dubois, W. Puech, and J. Blanc-Talon. Smart selective encryption of H.264/AVC videos using confidentiality metrics. Annales des Telecommunications, 69(11–12):569–583, 2014. Insecure Channel Personal medical data Personal medical data Encryption Key A secret key K chosen Decryption Key The same key K that the patient must have Emergency Compressed and encrypted data Partial Encryption and Compression Online medical file Partial Decryption and Decompression Insecure Channel Figure 4: Principle of key management
[9] L. Dubois, Z. Shahid, and W. Puech. Chapter 6: Selective Encryption of Images and Videos: From JPEG to H.265/HEVC through JPEG2000 and H.264/AVC. In Progress in Data Encryption Research., pages 137–177. Nova Publishers., 2014.
[10] B.S. Kaliski Jr. and M.J.B. Robshaw. Multiple encryption: weighing up security and performance. Dr. Dobb’s Journal, pages 123–127, 1996.
[11] Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, and R. L. Rivest. Handbook of applied cryptography, 1997.
[12] L. Pu, M. W. Marcellin, A. Bilgin, and A. Ashok. Compression based on a joint taskspecific information metric. In Data Compression Conference, pages 467–467, April 2015.
|