Biomedical data security

Biomedical data security

E-health applications are arriving on mobile platforms and biomedical material is constantly stored in biomedical databases and transferred through the internet and hospital networks.  Thus, securing and authenticating data is becoming more and more important. Digital watermarking and cryptographic approaches offer solutions for data management of biometric and medical data, also in mobile environment.

Unlike regular data, biomedical material should remain unmodified because even non perceptible modifications can affect the analyses and cause errors in diagnoses. This is why we pursue the development of reversible data hiding methods.

Remote health monitoring applies sensors with limited computational capacity.  The confidentiality and integrity of medical data is crucial for the safe operation of such systems. These properties can be guaranteed with the correct application of cryptography. For example, cryptographic hash functions can be used to ensure the integrity of biomedical data. However, constrained devices require light weight cryptographic primitives and protocols. In addition, the applied security mechanisms need to be convenient to the user. Biometric authentication is a convenient alternative to cryptographic keys in many situations. We have also proven that the robustness of biometric identity determination can be improved by  integration  with digital watermarking.

Multimodal data such as EEG-MREG are very commonly used in analyses. By applying data hiding techniques the different modalities are combined into a single package improving data management and assuring inseparability of content. At the same time, authenticity and reliability requirements are also met as hidden data reveals authenticity by Identifying source and revealing originality. Determining originality is an important issue considering medical data. In our latest work we have been developing methods to watermark hyperspectral medical images. The aim is to provide methods to embed high amount of data, and to verity that the images have not been tampered.

Last updated: 21.11.2016