• 제목/요약/키워드: Medical Integrity verification

검색결과 8건 처리시간 0.024초

Medical Image Verification Watermarking for Healthcare Information Management

  • Choi, Un-Sook;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Multimedia Information System
    • /
    • 제4권4호
    • /
    • pp.205-210
    • /
    • 2017
  • This paper presents a verification watermarking applied to healthcare information management. The proposed method uses the whole region based on the public-key cryptograph, which is transformed by the DWT transform to integrity verification. Furthermore, the public-key cryptograph algorithm is used for the embedded watermark image. We adaptively select the upper bit-plane including the LSB parts of each block when the watermark is inserted.

ROI를 고려한 공개키 암호화 알고리즘 기반 의료영상 디지털 워터마킹 (Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI)

  • 이형교;김희정;성택영;권기룡;이종극
    • 한국멀티미디어학회논문지
    • /
    • 제8권11호
    • /
    • pp.1462-1471
    • /
    • 2005
  • 정보통신 기술 및 컴퓨터의 발달로 의료기기의 디지털화가 가능하게 되어 의료 영상 분야에 다양한 활용이 이루어지고 있다. DICOM표준에 따른 PACS의 구축으로 의료 영상의 저장, 데이터베이스 검색 및 네트워크를 통한 원격 진료가 가능하게 됨으로써 의료 영상에 대한 불법복제, 소유권 및 데이터 인증 문제가 야기되고 있다. 본 논문에서는 무결성 인증을 위하여 공개 키 암호화 알고리즘을 기반한 새로운 의료 영상 디지털 워터마킹 기법을 제안한다. 이는 의료 영상 데이터를 원격으로 전송 후에 발생하는 불법적인 위/변조를 막기 위한 디지털 워터마킹 기법이다. 워터마크는 원 의료 영상을 웨이블릿 변환 후 비트플레인 값을 사용한다. 제안한 방법에서 삽입되는 영역은 ROI(region of interest)를 고려하여 랜덤하게 선택되도록 하고, MD5의 해쉬 함수는-디지털 서명을 생성하기 위하여 비밀 키로 사용한다. 실험 결과 제안한 알고리즘은 영상 처리에서도 워터마크 정보를 검출할 수 있으며 비가시성이 우수하다.

  • PDF

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권1호
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

디지털 영상의 무결성 검증과 변형 검출에 관한 연구 (A Study on Integrity Verification and Tamper Detection of Digital Image)

  • 우찬일;구은희
    • 한국산학기술학회논문지
    • /
    • 제20권10호
    • /
    • pp.203-208
    • /
    • 2019
  • 디지털 워터마킹은 디지털 컨텐츠에 대한 불법적인 복제를 방지하기 위한 저작권 보호 용도로 개발 되었으나, 최근에는 의료 영상과 같은 디지털 컨텐츠에 대하여 무결성을 검증하고 불법적인 조작이나 변형 위치를 감지하기 위한 기술로도 활용하고 있다. 디지털 컨텐츠에 대한 불법적인 복제를 방지하기 위한 저작권 보호 기술에서는 디지털 컨텐츠에 삽입된 워터마크가 왜곡이나 필터링과 같은 다양한 공격에 대하여 강인해야 하는 특성이 있어야 한다. 그러나 디지털 컨텐츠에 대한 조작이나 변형을 감지하기 위한 기술에서는 컨텐츠에 대한 사소한 변형에 대해서도 삽입된 워터마크가 쉽게 제거되어야 하는 특성이 있어야 컨텐츠에 대한 변형 여부를 확인할 수 있다. 따라서 본 논문에서는 디지털 영상에 대한 변형이나 조작 여부를 쉽게 확인하기 위한 워터마킹 기술을 제안한다. 제안 방법에서는 영상에 대한 변형 유, 무를 확인하기 위해 전체 영상을 $16{\times}16$ 블록 단위로 변형 여부를 검사하고 변형이 발생 된 블록에 대해서는 $4{\times}4$ 블록 단위로 검사를 수행하여 변형이 발생 된 위치를 확인한다.

하이퍼레저 패브릭과 비대칭키 암호화 기술을 결합한 건강정보 관리서버 (Hyperledger Fabric and Asymmetric Key Encryption for Health Information Management Server)

  • 한혜경;황희정
    • 한국멀티미디어학회논문지
    • /
    • 제25권7호
    • /
    • pp.922-931
    • /
    • 2022
  • Recently, the need for health information management platforms has been increasing for efficient medical and IT technology research. However, health information is requiring security management by law. When permissioned blockchain technology is used to manage health information, the integrity is provided because only the authenticated users participate in bock generation. However, if the blockchain server is attacked, it is difficult to provide security because user authentication, block generation, and block verification are all performed on the blockchain server. In this paper, therefore, we propose a Health Information Management Server, which uses a permissioned blockchain algorithm and asymmetric cryptography. Health information is managed as a blockchain transaction to maintain the integrity, and the actual data are encrypted with an asymmetric key. Since using a private key kept in the institute local environment, the data confidentiality is maintained, even if the server is attacked. 1,000 transactions were requested, as a result, it was found that the server's average response time was 6,140ms, and the average turnaround time of bock generation was 368ms, which were excellent compared to those of conventional technology. This paper is that a model was proposed to overcome the limitations of permissioned blockchains.

공정안전향상을 위한 Safety Integrity Level의 적용 방향 (Towards the Application of Safety Integrity Level for Improving Process Safety)

  • 권혁면;박희철;천영우;박진형
    • 한국안전학회지
    • /
    • 제27권5호
    • /
    • pp.64-69
    • /
    • 2012
  • The concept of SIL is applied in the most of all standards relating to functional system safety. However there are problems for the people to apply SIL to their plants. as these standards don't include sufficient informations. In this regards, this paper will suggest the direction of SIL application and concept based on IEC 61508 and IEC 61511. A Safety Integrity Level(SIL) is the discrete level(one out of possible fours), corresponding to a range of the probability of an E/E/PE (Electric/Electrical/Programmable Electrical) safety-related system satisfactorily performing the specific safety functions under all the stated conditions within a stated period of time. SIL can be divided into the target SIL(or required SIL) and the result SIL. The target SIL is determined by the risk analysis at the analysis phase of safety lifecycle and the result SIL is calculated during SIL verification at the realization phase of safety lifecycle. The target SIL is determined by the risk analysis like LOPA(Layer Of Protection Analysis), Risk Graph, Risk Matrix and the result SIL is calculated by HFT(Hardware Fault Tolerance), SFF(Safe Failure Fraction) and PFDavg(average Probability of dangerous Failure on Demand). SIL is applied to various areas such as process safety, machinery(road vehicles, railway application, rotating equipment, etc), nuclear sector which functional safety is applied. The functional safety is the part of the overall safety relating to the EUC and the EUC control system that depends on the correct functioning of the E/E/PE safety-related systems and other risk reduction measures. SIL is applied only to the functional safety of SIS(Safety Instrumented System) in safety. EUC is the abbreviation of Equipment Under Control and is the equipment, machinery, apparatus or plant used for manufacturing, process, transportation, medical or other activities.

Verification of Extended Source-To-Imager Distance (SID) Correction for Portal Dosimetry

  • Son, Jaeman;Kim, Jung-in;Park, Jong Min;Choi, Chang Heon
    • 한국의학물리학회지:의학물리
    • /
    • 제29권4호
    • /
    • pp.137-142
    • /
    • 2018
  • This study aimed to evaluate and verify a process for correcting the extended source-to-imager distance (SID) in portal dosimetry (PD). In this study, eight treatment plans (four volumetric modulated arc therapy and four intensity-modulated radiation therapy plans) at different treatment sites and beam energies were selected for measurement. A Varian PD system with portal dose image prediction (PDIP) was used for the measurement and verification. To verify the integrity of the plan, independent measurements were performed with the MapCHECK device. The predicted and measured fluence were evaluated using the gamma passing rate. The output ratio was defined as the ratio of the absolute dose of the reference SID (100 cm) to that of each SID (120 cm or 140 cm). The measured fluence for each SID was absolutely and relatively compared. The average SID output ratios were 0.687 and 0.518 for 120 SID and 140 SID, respectively; the ratio showed less than 1% agreement with the calculation obtained by using the inverse square law. The resolution of the acquired EPIDs were 0.336, 0.280, and 0.240 for 100, 120, and 140 SID, respectively. The gamma passing rates with PD and MapCHECK exceeded 98% for all treatment plans and SIDs. When autoalignment was performed in PD, the X-offset showed no change, and the Y-offset decreased with increasing SID. The PD-generated PDIP can be used for extended SID without additional correction.

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 1993년도 Fifth International Fuzzy Systems Association World Congress 93
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF