Font Size: a A A

Research And Implementation Of Dicom Security On Transmission Policy

Posted on:2013-03-07Degree:MasterType:Thesis
Country:ChinaCandidate:S H LiFull Text:PDF
GTID:2234330395973294Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Information technology is applied extensively in the medical field. In the medical information management, with HIS (hospital information system) and PACS (Picture Archiving and Communication Systems), the medical image information sharing can be realized in different departments and offices of the same hospital as well as among domestic medical institutions.At the same time, along with the popularization and promotion of telemedicine, medical information exchange between hospitals will become more and more important. However, Differences in species and types among medical equipments make direct transfer of information between devices difficulty. The DICOM interface standard is s made for the unhindered image exchange between different medical equipment.And if we use the existing network for information transfer, due to the risk of information security in the Internet itself, we have to face some more challenges of the implementation of the standard. Nowadays, people have intensified their emphasis on the privacy of medical information. Meanwhile, to ensure the legal use of medical information, Part15of the DICOM standard pointed out the summary of security, explaining the specific security strategies in detail.This article based on the DICOM standard, from the perspective of network transmission, study specific measures to ensure the safety of the DICOM files. After DICOM document generation, use the international generic TLS protocol to establish a secure channel, implementing secure transmission of medical image information based on the DICOM communication model. Use asymmetric encryption methods to establish a secure TLS channel, with implementation of3DES encryption and communication identity verification, and use the signature of the Hash algorithm to ensure data integrity.In this paper, the main content as follows:(1) From the perspectives of information security risks, medical information security and information system security architecture, it studies DICOM security summary.(2) It studies cryptography technologies:symmetric encryption system and asymmetric encryption system as well as the algorithm realization used in the encryption certification process.(3) In accordance with the implementation requirements of the DICOM standard transmission security summary, it used open source of DICOM standard development library that implements the security requirements in the transmission of medical equipment.Above all, through analyzing the security of medical information system, the article researched the transmission of the security summary of the DICOM Standard based on which expounded the solutions and methods of implementation..
Keywords/Search Tags:Hospital Information System, PACS, DICOM, RSA, DCMTK, TLS
PDF Full Text Request
Related items