Share Email Print

Proceedings Paper

Privacy enhanced group communication in clinical environment
Author(s): Mingyan Li; Sreeram Narayanan; Radha Poovendran
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Privacy protection of medical records has always been an important issue and is mandated by the recent Health Insurance Portability and Accountability Act (HIPAA) standards. In this paper, we propose security architectures for a tele-referring system that allows electronic group communication among professionals for better quality treatments, while protecting patient privacy against unauthorized access. Although DICOM defines the much-needed guidelines for confidentiality of medical data during transmission, there is no provision in the existing medical security systems to guarantee patient privacy once the data has been received. In our design, we address this issue by enabling tracing back to the recipient whose received data is disclosed to outsiders, using watermarking technique. We present security architecture design of a tele-referring system using a distributed approach and a centralized web-based approach. The resulting tele-referring system (i) provides confidentiality during the transmission and ensures integrity and authenticity of the received data, (ii) allows tracing of the recipient who has either distributed the data to outsiders or whose system has been compromised, (iii) provides proof of receipt or origin, and (iv) can be easy to use and low-cost to employ in clinical environment.

Paper Details

Date Published: 15 April 2005
PDF: 9 pages
Proc. SPIE 5748, Medical Imaging 2005: PACS and Imaging Informatics, (15 April 2005); doi: 10.1117/12.595934
Show Author Affiliations
Mingyan Li, Univ. of Washington (United States)
Sreeram Narayanan, Univ. of Washington (United States)
Radha Poovendran, Univ. of Washington (United States)

Published in SPIE Proceedings Vol. 5748:
Medical Imaging 2005: PACS and Imaging Informatics
Osman M. Ratib; Steven C. Horii, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?