CN113160944B - Medical image sharing method based on blockchain - Google Patents
Medical image sharing method based on blockchain Download PDFInfo
- Publication number
- CN113160944B CN113160944B CN202110147997.3A CN202110147997A CN113160944B CN 113160944 B CN113160944 B CN 113160944B CN 202110147997 A CN202110147997 A CN 202110147997A CN 113160944 B CN113160944 B CN 113160944B
- Authority
- CN
- China
- Prior art keywords
- image
- medical image
- shadow
- secret
- calculating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000012216 screening Methods 0.000 claims abstract description 5
- 238000004364 calculation method Methods 0.000 claims description 10
- 238000012545 processing Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 abstract description 4
- 238000011084 recovery Methods 0.000 description 6
- 230000000007 visual effect Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 238000003745 diagnosis Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 230000036541 health Effects 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 238000005481 NMR spectroscopy Methods 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000013474 audit trail Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 201000010099 disease Diseases 0.000 description 1
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000003709 image segmentation Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 238000002604 ultrasonography Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H30/00—ICT specially adapted for the handling or processing of medical images
- G16H30/20—ICT specially adapted for the handling or processing of medical images for handling medical images, e.g. DICOM, HL7 or PACS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Abstract
The invention provides a medical image sharing method based on a blockchain, which comprises the steps of acquiring an initial medical image and generating a binary authentication graph; calculating a first shadow image of the initial medical image by using a polynomial-based secret image sharing algorithm, and calculating a second shadow image of the binary authentication graph by using a random grid-based visualized secret sharing algorithm; calculating an exclusive OR result of four positions after each pixel in a first shadow image of the initial medical image, screening out a target shadow image meeting the condition through a preset condition, wherein the target shadow image is a shadow image meeting the authentication condition; and executing a secret image restoration algorithm in the blockchain intelligent contract, and restoring by utilizing the target shadow image to obtain a binary authentication graph and an initial medical image which meet the preset identification degree. The invention can safely and quickly realize the sharing of medical images, and the safety of image transmission is high.
Description
Technical Field
The invention relates to the technical field of image processing, in particular to a medical image sharing method based on a block chain.
Background
With the development of science and technology and the increasing health demands of people, medical construction of China gradually develops towards digitization, standardization and intellectualization. Among them, medical images obtained by CT, X-ray, ultrasound, nuclear magnetic resonance, and other imaging techniques have a significant role in assisting diagnosis. Thus, medical images are shared with other medical research institutions, which is of great interest for research and diagnosis of diseases.
Early medical images are required to be recorded by a patient and sent to another medical institution in person so as to complete sharing of the medical images of the patient, and the mode has the problems of high cost, low efficiency and the like. To address the shortcomings of physical media transmission, some research institutions have developed an image sharing network that captures collected medical images through a third party and centralizes authorized parties. However, whether the third party is truly trusted cannot be ascertained. The blockchain has the characteristics of safety, reliability, tamper-proof data uplink and traceability, and the trusted third party is replaced by the blockchain, so that the trust safety of the third party is eliminated. Thus, some researchers propose a method of transmitting medical images using a blockchain technique, in which a set of entity signature information authorized by a patient is stored, and when one entity needs to obtain a certain medical image of the patient, it is first required to obtain a private key corresponding to a public key that the patient previously granted access to sign a transaction as an authentication credential, and then obtain the medical image of the patient from a data source. In addition, the blockchain is used for carrying out audit trail on medical/health data transmission so as to carry out future examination, the method applies the zero trust principle to ensure the safety of medical data during transmission, a sender stores shared medical data on the blockchain by utilizing the cryptography principle, and a receiver can obtain the shared data after logging and verification by utilizing a private key of the sender. The above blockchain-based medical image sharing schemes have a drawback in that they require the key to be kept. If the key is lost, the required medical image cannot be shared. Therefore, in order to solve the problem that the key loss cannot be recovered, a secret sharing technique is proposed.
For example, some scholars propose a (k, n) secret sharing method, where secret data is hidden into the constant term of a (k-1) th order polynomial, and n shadows (also called shared shares) are generated. The (k, n) threshold property in secret sharing indicates that the secret can be recovered from any k shares, while any (k-1) or less shares cannot obtain any information about the original secret. The method is further improved by changing text data into image data, and realizing sharing of digital secret images, in the method, all coefficients of the (k, n) Secret Image Sharing (SIS) scheme, the (k-1) degree polynomial are embedded into secret pixels, and n shadow images (shadow for short) are generated. Likewise, a minimum of k shadow images are required to recover the original secret image, otherwise no information about the secret image can be obtained. In order to recover the secret image faster and reduce the computational complexity, visual Secret Sharing (VSS) has been developed, and the VSS proposal makes the recovery of the secret image feature visual to human eyes. The specific process is that the secret image is divided into n shadow images, the n shadow images are printed on a transparent film, and the original secret image can be recovered through simple stacking operation of at least k transparent films printed with the shadow images without calculation. But this method is only applied to binary images. With the development of secret image sharing, there are also many better image sharing schemes in recent years. For example, some scholars propose a secret image sharing scheme based on generation of a countermeasure network (GAN), in which an original sub-image is generated using image segmentation and DNA encoding, and then training is learned by using GAN, and a secret sub-image is generated through its generation network, in this way, sharing of the secret image is safer, and the reconstruction effect of the secret image is better. However, this solution does not enable authentication of the participants. Other scholars propose a secret sharing method based on Visual Cryptography (VC) and participant passwords, which realizes sharing and management of patient medical images. The authentication of the scheme needs hash calculation, so that the scheme has a certain calculation amount. While others have proposed an authenticatable secret image sharing scheme that is suitable for both cases of dealer participation and non-participation, which enables a secret image to be recovered with high quality by improving a polynomial-based secret image sharing algorithm.
However, the existing algorithm is either too large in calculation amount, unfavorable for image sharing, or insufficient in safety and reliability, so that the medical image sharing cannot meet the requirement of safety.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a safe and reliable medical image sharing method based on a blockchain, which aims to solve the problems of insufficient safety or overlarge calculated amount of the existing medical image sharing method.
In order to achieve the above purpose, the present invention is realized by the following technical scheme: a blockchain-based medical image sharing method, comprising: acquiring an initial medical image and generating a binary authentication chart; calculating a first shadow image of the initial medical image by using a polynomial-based secret image sharing algorithm, and calculating a second shadow image of the binary authentication graph by using a random grid-based visualized secret sharing algorithm; calculating an exclusive OR result of four positions after each pixel in a first shadow image of the initial medical image, screening out a target shadow image meeting the condition through a preset condition, wherein the target shadow image is a shadow image meeting the authentication condition; and executing a secret image restoration algorithm in the blockchain intelligent contract, and restoring by utilizing the target shadow image to obtain a binary authentication graph and an initial medical image which meet the preset identification degree.
Preferably, acquiring the initial medical image includes: and carrying out gray scale processing on the color medical image, wherein the initial medical image is a gray scale image of the color medical image.
Preferably, the binary authentication map is an authentication map generated using preset privacy information of the patient.
Preferably, the preset privacy information includes at least one of: name, gender, identification number, social security number, or medical number.
Preferably, calculating the first shadow image of the initial medical image using a polynomial-based secret image sharing algorithm includes: for each pixel point SI (h, w) of the initial medical image SI, calculating a pixel value S of the first shadow image by using a polynomial-based secret image sharing algorithm 1 I 1 (h,w)=h(1),S 1 I 2 (h,w)=h(2),…,S 1 I n (h,w)=h(n)The method comprises the steps of carrying out a first treatment on the surface of the Wherein, h (1), h (2) and h (n) are all k-1 degree polynomials.
Preferably, calculating the first shadow image of the initial medical image using a polynomial-based secret image sharing algorithm includes: the size of the initial medical image is H1×W1, an initial threshold value (k, n) is set, a preset prime number P is selected, each pixel point of the initial medical image is marked as (H, W) ∈ { (H, W) |1 is not less than H and not more than H1, and 1 is not less than W is not less than W1}; for each pixel s=si (h, w), if s≡p, s=p-1 is set, and a k-1 th order polynomial is constructed: h (m) = (b) 0 +b 1 m+···b k-1 m k-1 ) mod P, where b 0 =s,b i Is a random number, i=1, 2, …, k-1; calculating n secret values, namely: s is(s) 1 =h(1),...,s i =h(i),...,s n =h (n), where i is the identity representing the i-th participant; will calculate s 1 ,s 2 ,…,s n Sequentially assigned to S 1 I 1 (h,w),S 1 I 2 (h,w),…,S 1 I n (h, w); finally, n first shadow images SI are output 1 ,SI 2 ,…,SI n 。
Preferably, prime number P has a value of 257.
Preferably, the preset conditions include: simultaneously satisfying the following two conditions: s is S 1 I i (h,w)<P-1,i=1、2…n;XOR4LBs(S 1 I i (h,w))=I i (h, w), wherein XOR4LB is an exclusive OR of the four least significant bits.
Preferably, calculating the second shadow image of the binary authentication map using a random mesh based visualized secret sharing algorithm includes: the size of the binary authentication graph is H2 xW 2, each pixel point (H, W) E { (H, W) 1 is more than or equal to H2,1 is more than or equal to W is less than or equal to W2, and a 0-1 inversion function is utilized to randomly generate a random grid as a shadow image I 1 The method comprises the steps of carrying out a first treatment on the surface of the Shadow image I is calculated using the following formula 2 :
Encrypting I (h, w) into two temporary bits, denoted d respectively 1 And d 2 Calculate d 3 =d 1 ,d 4 =d 2 ,…d n ,d n+1 Wherein, if (n+1 mod 2) =0, d n+1 =d 2 Otherwise d n+1 =d 1 The method comprises the steps of carrying out a first treatment on the surface of the Random permutation d 1 ,d 2 ,…,d n+1 And assign it to I 1 (h,w),I 2 (h,w),…,I n+1 (h, w); finally output n+1 second shadow images I 1 ,I 2 ,…,I n+1 。
Compared with the prior art, the invention has the beneficial effects that:
because the blockchain has the characteristics of decentralization, distrust, tamper resistance, tracing and the like, the invention can avoid the reliability problem of a third party by applying the blockchain to medical image sharing, and in addition, in the blockchain medical image sharing, the problem of key loss can be solved by utilizing secret image sharing based on a polynomial. In addition, the shadow image can be authenticated by combining a visual secret sharing technology, the authenticity of the shadow image is distinguished, the intelligent contract is an automatically executed program, and an authentication recovery image with higher recognition degree and a medical image with lossless recovery can be obtained by using the intelligent contract to call a recovery algorithm. Therefore, the method of the invention provides a new idea for sharing medical images. By adopting the method, effective content protection and safe sharing can be carried out on the medical image.
The invention can obtain good effects of gray medical image sharing and authentication, and has the advantages of lossless recovery, no pixel expansion and simple authentication.
Drawings
FIG. 1 is a flow chart of an embodiment of a blockchain-based medical image sharing method of the present invention;
FIG. 2 is an original image and a shadow image of an initial medical image and a binary authentication map in an embodiment of a blockchain-based medical image sharing method of the present invention;
FIG. 3 is a restoration graph of an initial medical image and a binary authentication graph without false shadow image participation in an embodiment of a blockchain-based medical image sharing method of the present invention;
FIG. 4 is a restoration graph of an initial medical image and a binary authentication graph without false shadow image participation in an embodiment of a blockchain-based medical image sharing method of the present invention;
FIG. 5 is a histogram of a target shadow image obtained in an embodiment of a blockchain-based medical image sharing method of the invention;
FIG. 6 is a bar graph and graph comparing PSNR and entropy with other methods of the prior art for a blockchain-based medical image sharing method embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention relates to a medical image sharing method based on a block chain, which is realized by the following steps with reference to fig. 1: first, step S1 is executed to acquire an initial medical image and a binary authentication map. In this embodiment, the initial medical image is a gray scale image, but since the medical image is usually a color image, the color medical image needs to be converted into the gray scale image, and the converted gray scale image is the initial medical image. In fig. 2, fig. 2 (a) is an initial medical image.
The binary authentication chart is generated by using some private information of the patient, such as name, gender, identity card number, social security card number, medical number and the like, and in fig. 2, fig. 2 (b) is a binary authentication chart, which is a black-and-white image.
Then, step S2 is performed to calculate a first shadow image of the initial medical image, specifically, using a polynomial-based secret image sharing algorithm. For example, for each pixel point SI of the initial medical image SIh, w), calculating to obtain pixel value S of the shadow image by using a polynomial-based secret image sharing algorithm 1 I 1 (h,w)=h(1),S 1 I 2 (h,w)=h(2),…,S 1 I n (h, w) =h (n), and the calculation for each pixel is repeated, thereby obtaining a shadow image of the medical image.
Specifically, the following steps are performed:
in step S11, assuming that the initial medical image has a size h1×w1, an initial threshold (k, n) is set, and a preset prime number P is selected, in this embodiment, the value of the preset prime number P is 257. Each pixel point of the initial medical image is marked as (H, W) ∈ { (H, W) 1.ltoreq.h.ltoreq.H2 }. In this embodiment, each pixel point of the initial medical image SI may be represented as SI (h, w).
Step S12, for each pixel point s=si (h, w) of the initial medical image, if S is greater than or equal to P, setting s=p-1, and constructing a k-1 degree polynomial: h (m) = (b) 0 +b 1 m+···b k-1 m k-1 ) mod p, where b0=s, bi is a random number, i=1, 2, …, k-1, mod is a modulo operation, i.e. computation (b 0 +b 1 m+···b k-1 m k-1 ) The remainder obtained after dividing by P.
Then, step S13 is performed to calculate n secret values, where the n secret values are respectively: s is(s) 1 =h(1),...,s i =h(i),...,s n =h (n), where i is the identity representing the i-th participant.
Next, step S14 is executed to calculate S obtained in step S13 1 ,s 2 ,…,s n Sequentially assigned to S 1 I 1 (h,w),S 1 I 2 (h,w),…,S 1 I n (h,w)。
Finally, repeatedly executing the steps S12 to S14 until all pixels of the initial medical image are calculated, and finally outputting n first shadow images SI 1 ,SI 2 ,…,SI n 。
After the step S2 is completed, step S3 is executed to calculate a second shadow image of the binary authentication map. In particular, the present embodiment employs a random mesh based visualized secretThe sharing algorithm calculates a second shadow image of the binary authentication map. For each pixel point I (h, w) of the binary authentication graph I, calculating to obtain a pixel value I of the second shadow image by using a (2, n+1) random grid-based visualized secret sharing algorithm 1 (h,w),I 2 (h,w),…,I n+1 (h, w) repeating the calculation of each pixel, thereby obtaining a second shadow image of the authentication map.
Specifically, the following steps are performed:
step S21 is first performed: obtaining a binary authentication graph with the size of H2XW2, wherein each pixel point of the binary authentication graph is expressed as (H, W) ∈ { (H, W) } 1.ltoreq.h2, 1.ltoreq.w.ltoreq.W2, and a 0-1 inversion function is utilized to randomly generate a random grid serving as a shadow image I 1 。
Then, step S22 is performed to calculate the shadow image I using the following formula 2 :
Next, step S23 is executed, I (h, w) is encrypted into two temporary bits, denoted as d, by step S21, step S22 1 And d 2 Then calculate d 3 =d 1 ,d 4 =d 2 ,…d n ,d n+1 Wherein if (n+1 mod 2) =0, d n+1 =d 2 Otherwise d n+1 =d 1 Where mod is the remainder operation.
Then, step S24 is performed to randomly replace d 1 ,d 2 ,…,d n+1 And assign it to I 1 (h,w),I 2 (h,w),…,I n+1 (h,w)。
Finally, executing step S24, repeatedly executing step S22 to step S24, and finally outputting n+1 second shadow images I 1 ,I 2 ,…,I n+1 Wherein image I n+1 Is an authentication shadow image belonging to the distributor.
After executing step S3, executing step S4, and screening out the target shadow image satisfying the preset condition. Specifically, the exclusive or result of the last four bits of each pixel in the first shadow image of the initial medical image is calculated, and a target shadow image meeting the condition is screened out through a preset condition, wherein the target shadow image is a shadow image meeting the authentication condition.
For example, the first shadow image obtained by the initial medical image and the second shadow image obtained by the binary authentication image calculation are subjected to the filtering operation under the preset conditions, that is, the following two conditions need to be satisfied at the same time: (1) S is S 1 I i (h,w)<P-1;(2)XOR4LBs(S 1 I i (h,w))=I i (h, w); wherein XOR4LB is an exclusive or calculation of the four least significant bits. Only if the two conditions are satisfied at the same time, the target shadow image SI which is considered to satisfy the authentication condition 1 ,SI 2 ,…,SI n D, where D is I n+1 。
Then, step S5 and step S6 are executed, and a secret image restoration algorithm is executed in the blockchain intelligent contract, and a binary authentication image and an initial medical image which meet a preset identification degree are restored by using the target shadow image, wherein the secret image restoration algorithm is a reverse algorithm of the algorithm for calculating the first shadow image and the second shadow image.
The method of the invention is applied to carry out experimental analysis on the real medical data set, specifically, the (k, n) threshold value selected by experiments is k=2 and n=3, as shown in (c) to (f) of fig. 2, wherein (c) to (e) are respectively three first shadow images of an initial medical image, and (f) is a second shadow image of a binary authentication image belonging to a distributor. When no false shadow image participates, as shown in fig. 3 (a) and (b), the medical images restored from the two shadow images and the medical images restored from the three shadow images are respectively obtained, and fig. 3 (c) and (d) are respectively obtained from two binary authentication images. The false shadow image referred to herein is randomly generated by malicious nodes, and the experiment distinguishes that all participants are real and that there are unreal two cases, the false shadow image participates in the calculation of the authentication shadow image and the recovery of the initial medical image.
In the case where a false shadow image is involved, as shown in fig. 4 (a) to (d), an authentication restoration map in which a false shadow image is involved in restoration, an authentication restoration map in which no false shadow image is involved in restoration, a medical image in which a false shadow image is involved in restoration, and a medical image in which no false shadow image is involved in restoration are respectively included.
As can be seen from fig. 3 and 4, in the case of the participation of the false shadow image, the generated shadow image does not satisfy the condition screening, so that the generated shadow image is authenticated as false, and the original medical image cannot be restored.
Fig. 5 (a) and (b) are histograms of two shadow images of an initial medical image, respectively, and fig. 6 (a) and (b) are PSNR contrast maps of different methods and information entropy contrast maps of different methods, respectively. As can be seen from fig. 5 and 6, the PSNR of the medical restoration map obtained by the method of the present invention is inf, i.e., the method of the present invention can restore the original medical image without loss through analysis of the peak signal-to-noise ratio (PSNR), information entropy, pixel spread and histogram of the image; the information entropy value of the shadow image is close to 8, and the pixels in the histogram are uniformly distributed, which indicates that the confidentiality of the shadow image is good. As can be obtained from experimental analysis, the method of the present invention can be effectively applied to content protection and secure sharing of medical images.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (6)
1. A blockchain-based medical image sharing method, comprising:
acquiring an initial medical image and generating a binary authentication chart;
calculating a first shadow image of the initial medical image by using a polynomial-based secret image sharing algorithm, and calculating a second shadow image of the binary authentication image by using a random grid-based visualized secret sharing algorithm;
calculating an exclusive OR result of four positions after each pixel in a first shadow image of the initial medical image, and screening out a target shadow image meeting the condition through a preset condition, wherein the target shadow image is a shadow image meeting the authentication condition;
executing a secret image restoration algorithm in the blockchain intelligent contract, and restoring by utilizing the target shadow image to obtain a binary authentication image and an initial medical image which meet preset identification degree;
wherein calculating the first shadow image of the initial medical image using a polynomial-based secret image sharing algorithm comprises: for each pixel point SI (h, w) of the initial medical image SI, calculating a pixel value S of the first shadow image by using a polynomial-based secret image sharing algorithm 1 I 1 (h,w)=h(1),S 1 I 2 (h,w)=h(2),…,S 1 I n (h, w) =h (n), h (1), h (2), h (n) are all k-1 degree polynomials;
calculating a first shadow image of the initial medical image using a polynomial-based secret image sharing algorithm includes: the size of the initial medical image is H1 xW 1, an initial threshold value (k, n) is set, a preset prime number P is selected, each pixel point of the initial medical image is marked as (H, W) ∈ { (H, W) |1 is not less than H and not more than H1, and 1 is not less than W and not more than W1}; for each pixel s=si (h, w), if s≡p, s=p-1 is set, and a k-1 th order polynomial is constructed: h (m) = (b) 0 +b 1 m+…b k-1 m k-1 ) mod P, where b 0 =s,b i Is a random number, i=1, 2, …, k-1, a step of; calculating n secret values, namely: s is(s) 1 =h(1),...,s i =h(i),...,s n =h (n), where i is the identity representing the i-th participant; will calculate s 1 ,s 2 ,…,s n Sequentially assigned to S 1 I 1 (h,w),S 1 I 2 (h,w),…,S 1 I n (h, w); finally, n first shadow images SI are output 1 ,SI 2 ,…,SI n ;
Calculating the second shadow image of the binary authentication map using a random mesh based visualized secret sharing algorithm includes:
for each pixel point I (h, w) of the binary authentication graph I, calculating to obtain a pixel value I of the second shadow image by using a (2, n+1) random grid-based visualized secret sharing algorithm 1 (h,w),I 2 (h,w),…,I n+1 (h, w) repeating the calculation of each pixel, thereby obtaining a second shadow image of the authentication image;
wherein the size of the binary authentication graph is H2XW2, each pixel point (H, W) E { (H, W) |1 is not less than H2,1 is not less than W is not more than W2}, and a 0-1 inversion function is utilized to randomly generate a random grid as a shadow image I 1 ;
Shadow image I is calculated using the following formula 2 :
Encrypting I (h, w) into two temporary bits, denoted d respectively 1 And d 2 Calculate d 3 =d 1 ,d 4 =d 2 ,…d n ,d n+1 Wherein if (n+1 mod 2) =0, d n+1 =d 2 Otherwise d n+1 =d 1 ;
Random permutation d 1 ,d 2 ,…,d n+1 And assign it to I 1 (h,w),I 2 (h,w),…,I n+1 (h,w);
Finally output n+1 second shadow images I 1 ,I 2 ,…,I n+1 。
2. The blockchain-based medical image sharing method of claim 1, wherein:
acquiring the initial medical image includes: and carrying out gray scale processing on the color medical image, wherein the initial medical image is a gray scale image of the color medical image.
3. The blockchain-based medical image sharing method of claim 2, wherein:
the binary authentication map is an authentication map generated using preset privacy information of a patient.
4. A blockchain-based medical image sharing method as in claim 3, wherein:
the preset privacy information includes at least one of the following: name, gender, identification number, social security number, or medical number.
5. The blockchain-based medical image sharing method of claim 1, wherein:
the prime number P takes a value of 257.
6. The blockchain-based medical image sharing method of claim 1, wherein:
the preset conditions include: simultaneously satisfying the following two conditions:
S 1 I i (h,w)<P-1,i=1、2…n;
XOR4LBs(S 1 I i (h,w))=I i (h,w),
where XOR4LB is an exclusive or of the four least significant bits.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110147997.3A CN113160944B (en) | 2021-02-03 | 2021-02-03 | Medical image sharing method based on blockchain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110147997.3A CN113160944B (en) | 2021-02-03 | 2021-02-03 | Medical image sharing method based on blockchain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113160944A CN113160944A (en) | 2021-07-23 |
CN113160944B true CN113160944B (en) | 2023-11-14 |
Family
ID=76882709
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110147997.3A Active CN113160944B (en) | 2021-02-03 | 2021-02-03 | Medical image sharing method based on blockchain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113160944B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113327105B (en) * | 2021-08-03 | 2021-10-19 | 杭州志卓科技股份有限公司 | B2B online payment transaction method based on digital image processing |
CN114996766A (en) * | 2022-08-01 | 2022-09-02 | 江西财经大学 | Image sharing method and system based on two-dimension code social network and storage medium |
CN117332395B (en) * | 2023-11-23 | 2024-03-08 | 江西财经大学 | Data management method and system for data sharing |
CN117478303B (en) * | 2023-12-28 | 2024-03-01 | 湖南天河国云科技有限公司 | Block chain hidden communication method, system and computer equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101268500B1 (en) * | 2012-03-30 | 2013-06-04 | 이화여자대학교 산학협력단 | Method and system for secret key sharing based on key binding by using confidence intervals |
CN103226802A (en) * | 2013-03-26 | 2013-07-31 | 中南大学 | Chaotic-encryption-based medical image share method |
CN104992403A (en) * | 2015-07-07 | 2015-10-21 | 方玉明 | Hybrid operator image redirection method based on visual similarity measurement |
CN109558701A (en) * | 2018-11-14 | 2019-04-02 | 成都理工大学 | A kind of method of medical CT images secret sharing |
CN111832052A (en) * | 2020-07-13 | 2020-10-27 | 江西财经大学 | Non-peer image encryption method based on significance detection |
-
2021
- 2021-02-03 CN CN202110147997.3A patent/CN113160944B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101268500B1 (en) * | 2012-03-30 | 2013-06-04 | 이화여자대학교 산학협력단 | Method and system for secret key sharing based on key binding by using confidence intervals |
CN103226802A (en) * | 2013-03-26 | 2013-07-31 | 中南大学 | Chaotic-encryption-based medical image share method |
CN104992403A (en) * | 2015-07-07 | 2015-10-21 | 方玉明 | Hybrid operator image redirection method based on visual similarity measurement |
CN109558701A (en) * | 2018-11-14 | 2019-04-02 | 成都理工大学 | A kind of method of medical CT images secret sharing |
CN111832052A (en) * | 2020-07-13 | 2020-10-27 | 江西财经大学 | Non-peer image encryption method based on significance detection |
Non-Patent Citations (4)
Title |
---|
A robust and secure image sharing scheme with personal identity information embedded;Ping Wang等;COMPUTERS & SECURITY;第85卷;第107-121页 * |
Visual Quality Assessment for Perceptually Encrypted Light Field Images;Wenying Wen等;IEEE;第1-13页 * |
具有核心参与者的图像秘密共享方法研究;刘祖权;中国优秀硕士学位论文全文数据库 信息科技辑(第01期);全文 * |
结合区块链的可认证医疗图像共享方案;温文媖等;小型微型计算机系统;第43卷(第11期);第2354-2359页 * |
Also Published As
Publication number | Publication date |
---|---|
CN113160944A (en) | 2021-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113160944B (en) | Medical image sharing method based on blockchain | |
Shankar et al. | RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique | |
Aparna et al. | Biometric‐based efficient medical image watermarking in E‐healthcare application | |
Pareek et al. | Medical image protection using genetic algorithm operations | |
Bouslimi et al. | A crypto-watermarking system for ensuring reliability control and traceability of medical images | |
Pavithra et al. | A survey on the techniques of medical image encryption | |
JP2009519490A (en) | Secure threshold decryption protocol calculation | |
Al-Haj et al. | Combining cryptography and digital watermarking for secured transmission of medical images | |
Hua et al. | Reversible data hiding in encrypted images using cipher-feedback secret sharing | |
Selva Mary et al. | Secure grayscale image communication using significant visual cryptography scheme in real time applications | |
Priyadharshini et al. | Securing medical images using encryption and LSB steganography | |
Hashim et al. | Based on IoT healthcare application for medical data authentication: Towards a new secure framework using steganography | |
CN106941402B (en) | Homomorphic ciphertext domain reversible hiding method | |
Bhardwaj | An enhanced reversible patient data hiding algorithm for e-healthcare | |
Wen et al. | APCAS: Autonomous privacy control and authentication sharing in social networks | |
Nadhan et al. | Enhancing healthcare security in the digital era: Safeguarding medical images with lightweight cryptographic techniques in IoT healthcare applications | |
CN112330551A (en) | Remote sensing image outsourcing noise reduction method based on secret sharing | |
CN112491840B (en) | Information modification method, device, computer equipment and storage medium | |
Soreng et al. | Verifiable varying sized (m, n, n) multi-image secret sharing with combiner verification and cheater identification | |
Vignesh et al. | An improved method for sharing medical images for privacy preserving machine learning using multiparty computation and steganography | |
Jana et al. | Cheating prevention in Visual Cryptography using steganographic scheme | |
Wang et al. | Blockchain private key storage algorithm based on image information hiding | |
Behravan et al. | Introducing a new method of image reconstruction against crop attack using sudoku watermarking algorithm | |
CN114979402B (en) | Shared image storage method based on matrix coding embedding | |
Shanmugam et al. | Security‐based teleradiology in DICOM used two‐level DWT based optimization watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |