A teleassistance protocol based on joint watermarking-encryption evidence for identification of liabilities in case of litigation

被引:7
作者
Bouslimi, D. [1 ,2 ]
Coatrieux, G. [1 ,2 ]
Quantin, C. [3 ]
Allaert, F. -A. [4 ]
Cozic, M. [5 ]
Roux, C. [6 ]
机构
[1] Telecom Bretagne, Dept Image & Traitement Informat, F-29238 Brest, France
[2] INSERM U1101, Lab Traitement Informat Med, F-29238 Brest, France
[3] Univ Bourgogne, CHRU Dijon, Serv Biostat & Informat Med, Unite INSERM 866, Dijon, France
[4] Hlth Claim Med Chair ESC, Dijon, France
[5] MEDECOM, F-29470 Plougastel Daoulas, France
[6] Inst Mines TELECOM, Mines St Etienne, F-42023 St Etienne, France
关键词
D O I
10.1016/j.irbm.2015.07.005
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Objectives: Teleassistance is defined as the help provided through a telemedicine network by a practitioner to another one faced with a difficult situation. Beyond securing communication, another main issue is to provide evidence that some data have been exchanged in order to determine the liabilities of each practitioner involved in a telemedicine session in case of litigation. Material and methods: The purpose of this work is the definition of a teleassistance protocol that allows achieving these goals. To do so, we first identify needs in terms of security and evidence considering the example of the French legislation and then propose a secure teleassistance protocol that takes advantage of the Joint Watermarking-Encryption (JWE) approach. The originality of this approach is that it offers watermarking functionalities in both encrypted and decrypted domains and is compliant with the DICOM standard. Results: We describe the functioning of the proposed teleassistance protocol. This protocol is able to secure exchanged data and bring evidence that an exchange took place and that data have been communicated. The security analysis of our protocol shows that it is resistant to non-repudiation issues and collusion attacks. Conclusion: The use of joint watermarking encryption allows i) ensuring confidentiality of exchanged data while giving access to proofs of their integrity and of their origins even though data are encrypted; and ii) identifying which data were involved in a telemedicine session by means of secure links established between them. The proposed protocol is compliant with the DICOM standard. (C) 2015 AGBM. Published by Elsevier Masson SAS. All rights reserved.
引用
收藏
页码:279 / 286
页数:8
相关论文
共 26 条
  • [1] Simultaneous storage of patient information with medical images in the frequency domain
    Acharya, R
    Niranjan, UC
    Iyengar, SS
    Kannathal, N
    Min, LC
    [J]. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2004, 76 (01) : 13 - 19
  • [2] Allaert F A, 1996, J Telemed Telecare, V2 Suppl 1, P27, DOI 10.1258/1357633961929781
  • [3] Anderson R, 1997, LECT NOTES COMPUT SC, V1267, P107
  • [4] [Anonymous], J GEST EC MED
  • [5] [Anonymous], P 5 INT C INF COMM S
  • [6] [Anonymous], P 37 ANN HAW INT C S
  • [7] Bianchi Tiziano, 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), P3987, DOI 10.1109/ICASSP.2014.6854350
  • [8] Bouslimi D, 2011, IEEE ENG MED BIO, P8066, DOI 10.1109/IEMBS.2011.6091989
  • [9] A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images
    Bouslimi, Dalel
    Coatrieux, Gouenou
    Cozic, Michel
    Roux, Christian
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (05): : 891 - 899
  • [10] A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images
    Bouslimi, Dalel
    Coatrieux, Gouenou
    Roux, Christian
    [J]. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2012, 106 (01) : 47 - 54