Skip to main content
Log in

Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture

  • Patient Facing Systems
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient’s and the doctor’s end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Yoon, J., and Park, S., Interoperability enhancement for cable host navigation. IEEE Trans. Consum. Electron. 56(2):554–559, 2010.

    Article  MathSciNet  Google Scholar 

  2. Singh, G., Secure video conferencing for web based security surveillance system, Master Thesis. Indian Institute of Technology Kanpur, India, 2006.

  3. Hine, N., and Arnott, J. L., A multimedia social interaction service for inclusive community living: initial user trials. Univ. Access Inf. Soc. 2:8–17, 2002.

    Article  Google Scholar 

  4. Savolainen, L., Hanson, E., Magnusson, L., and Gustavsson, T., An Internet-based videoconferencing system for supporting frail elderly people and their carers. J. Telemed. Telecare 14(2):79–82, 2008.

    Article  Google Scholar 

  5. Weatherburn, G., Dowie, R., Mistry, H., and Young, T., An assessment of parental satisfaction with mode of delivery of specialist advice for paediatric cardiology: Face-to-face versus videoconference. J. Telemed. Telecare 12(5):57–59, 2006.

    Article  Google Scholar 

  6. Tsai, H. H., Tsai, Y. F., Wang, H. H., Chang, Y. C., and Chu, H. H., Videoconference program enhances social support, loneliness, and depressive status of elderly nursing home residents. Aging Ment. Health 14(8):947–954, 2010.

    Article  Google Scholar 

  7. Tsai, H. H., and Tsai, Y. F., Changes in depressive symptoms, social support, and loneliness over 1 year after a minimum 3-month videoconference program for older nursing home residents. J. Med. Internet Res. 13(4):e93, 2011.

    Article  Google Scholar 

  8. LeRouge, C., Garfield, M. J., Hevner, A. R., Quality attributes in telemedicine video conferencing. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences. Hawaii: January 7–10. Washington, DC: IEEE, 2002.

  9. Östlund, M., Dahlbäck, N., and Petersson, G. I., 3D visualization as a communicative aid in pharmaceutical advice-giving over distance. J. Med. Internet Res. 13(3):e50, 2011.

    Article  Google Scholar 

  10. Changlai, D., Hao, Y., Chuang, L., and Yada, H., VCNF: A secure video conferencing system based on P2P technology. In: Proceeding of 10th IEEE International Conference on High Performance Computing and Communications (HPCC 2008), pp. 463–469, 2008.

  11. Mat Kiah, M. L., A key management framework for secure group communication in wireless mobile environments, Phd Thesis, University of London, 2007.

  12. Hao, Y., Chuang, L., Qian, Z., Chen, Z. J., and Wu, D. P., TrustStream: A secure and scalable architecture for large-scale Internet media streaming. IEEE Trans. Circ. Syst. Video Technol. 18(12):1692–1702, 2008.

    Article  Google Scholar 

  13. McCanne, S., and Jacobson, V., VIC: A flexible framework for packet video. In Proceeding of ACM Mulimedia, pp. 1–12, San Franscisco, CA, USA, 1995.

  14. Chen, X., Shiguo, L., Lifeng, W., Shilong, M., Weifeng, L., and Ke, X., A speed-adaptive media encryption scheme for real-time recording and playback system. EURASIP J. Wirel. Commun. Netw. 2010, Article ID 371513, 9 pages, 2010.

  15. Hao, Y., Chuang, L., Feng, Q., Jiangchuan, L., Geyongn, M., and Bo, L., CASM: A content-aware protocol for secure video multicast. IEEE Trans. Multimed. 8(3):270–277, 2006.

    Google Scholar 

  16. Zahlmann, G., et al., Establishment and use of a teleconsultation network in ophthalmology. In Engineering in Medicine and Biology Society, 1997. Proceedings of the 19th Annual International Conference of the IEEE. 1997. IEEE.

  17. Weiner, M., et al., Secure Internet video conferencing for assessing acute medical problems in a nursing facility. In: Proceedings of the AMIA Symposium. 2001. American Medical Informatics Association.

  18. Wei, Z., et al., A secure and synthesis tele-ophthalmology system. Telemed. e-Health 14(8):833–845, 2008.

    Article  Google Scholar 

  19. Yu, S., et al., A tele-ophthalmology system based on secure video-conferencing and white-board. In: e-health Networking, Applications and Services, 2008. HealthCom 2008. 10th International Conference on. 2008. IEEE.

  20. Maglogiannis, I., et al., Enabling location privacy and medical data encryption in patient telemonitoring systems. Inf. Technol. Biomed. IEEE Trans. 13(6):946–954, 2009.

    Article  Google Scholar 

  21. Feng, L., Experimental evaluation of query processing on encrypted Telemedicine data. In: Computer-Based Medical Systems (CBMS), 2010 I.E. 23rd International Symposium on 2010. IEEE.

  22. Poon, C. C., Zhang, Y.-T., and Bao, S.-D., A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. Commun. Mag. IEEE 44(4):73–81, 2006.

    Article  Google Scholar 

  23. LeRouge, C., Garfield, M. J., and Hevner, A. R., Quality attributes in telemedicine video conferencing. In: System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on. 2002. IEEE.

  24. Al-bakri, S. H., and Mat Kiah, M. L., A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael. Sci. Res. Essays 5(22):3455–3466, 2010.

    Google Scholar 

  25. Al-Bakri, S. H., Kiah, M. L. M., Zaidan, A., Zaidan, B., and Alam, G. M., Securing peer-to-peer mobile communications using public key cryptography: New security strategy. Int. J. Phys. Sci. 6(4):930–938, 2011.

    Google Scholar 

  26. Alanizi, H. O., Mat Kiah, M. L., Zaidan, A. A., Zaidan, B. B., and Alam, G. M., Secure topology for electronic medical record transmissions. Int. J. Pharmacol. 6(6):954–958, 2010.

    Article  Google Scholar 

  27. Zaidan, B. B., Zaidan, A. A., and Mat Kiah, M. L., Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol. 7(3):382–387, 2011.

    Article  Google Scholar 

  28. He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.

    Article  Google Scholar 

  29. Nabi, M. S. A., Mat Kiah, M. L., Zaidan, B. B., Zaidan, A. A., and Alam, G. M., Suitability of using SOAP protocol to secure electronicmedical record databases transmission. Int. J. Pharmacol. 6(6):959–964, 2010.

    Article  Google Scholar 

  30. Kiah, M. L., Nabi, M. S., Zaidan, B. B., and Zaidan, A. A., An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1. J. Med. Syst. 37(5):1–18, 2013.

    Article  Google Scholar 

  31. Hamdan, O., Alanazi, H. A., Jalab, G. M., Alam, B. B., and Zaidan, A. A., Securing electronic medical records transmissionsover unsecured communications: An overview for bettermedical governance. J. Med. Plant Res. 4(19):2059–2074, 2010.

    Google Scholar 

  32. Li, Y.-C., Hung, M.-C., Hsiao, S.-J., Tsai, K.-D., and Chang, M.-M., An assessment of patient safety in acupuncture process under EMR support. J. Med. Syst. 35(6):1447–1453, 2011. 1,789 KB.

    Article  Google Scholar 

  33. Jimale, M. A., Securing mobile communications using public key infrastructure for multimedia messaging service (MMS). Master Thesis, University Malaya, Malaysia, 2009.

  34. Mengual, L., Bobadilla, J., Caballero, R., and Hernandez, G., Design and testing of two secure video conferencing applications based on JMF (Java Media Framework) and VIC (Video Conferencing Tool). In: Proceeding of International Conference on Digital Telecommunications (ICDT 2006), pp. 56–56, Cote d’Azur, 2006.

  35. Almasalha, F., Agarwal, N., and Khokhar, A., Secure multimedia transmission over RTP. In: Proceeding of 10th IEEE InternationalSymposium Multimedia (ISM 008), pp. 404–411, 2008.

  36. Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.

    Article  Google Scholar 

  37. Lee, T.-F., and Liu, C.-M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):9985, 2013.

    Article  Google Scholar 

  38. Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.

    Article  Google Scholar 

  39. Wu, Z. Y., Lee, Y.-C., Lai, F., Lee, H.-C., and Chung, Y.-F., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.

    Article  Google Scholar 

  40. Das, A. K., and Goswami, A., A secure and efficient uniqueness and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(3):1–16, 2013.

    Article  Google Scholar 

  41. Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(4):1–17, 2013.

    Google Scholar 

  42. Yan, X., Li, W., Li, P., Wang, J., Hao, X., and Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):1–6, 2013.

    MATH  Google Scholar 

  43. Stallings, W., Cryptography and network security principles and practices, 4th Edition. Prentice Hall, 2011.

  44. Fraser, B., Site security handbook, 1997.

  45. Daghighi, B., Key management for secure group communication in a wireless environment. Master Thesis, University Of Malaya, 2010.

  46. Oracle.com. JMF 2.0 Documentation Download [cited 2010 06-11-2010]; Available from: http://www.oracle.com/technetwork/java/javase/specdownload-136569.html, 2010.

  47. Liu, Z., Li, X., and Dong, Z. Enhancing security of frequency domain video encryption. In: Proceedings of the 12th annual ACM international conference on Multimedia ACM, pp. 304–307, 2004.

  48. Sun, S. W., Chen, J. R., Lu, C. S., Chang, P. C., and Fan, K. C., Motion-embedded residual error for packet loss recovery of video transmission and encryption. SPIE-IS&T/ Vol. 6077 60771B-2, 2006.

  49. BouncyCastle. LightCrypto. 2011 [cited 2011]; Available from: http://www.bouncycastle.org/resources.html, 2011.

  50. visualvm.java.net. VisualVM. 2011 [cited 2011]; Available from: http://visualvm.java.net/, 2011.

  51. Shiwen, M., Bushmitch, D., Narayanan, S., and Panwar, S. S., Mrtp: A multiflow real-time transport protocol for ad hoc networks. IEEE Trans. Multimed. 8(2):356–369, 2006.

    Article  Google Scholar 

  52. Mauve, M., Hilt, V., Kuhmunch, C., and Effelsberg, W., Rtp/i-toward a common application level protocol for distributed interactive media. IEEE Trans. Multimed. 3(1):152–161, 2001.

    Article  Google Scholar 

  53. Taleb, T., Kashibuchi, K., Leonardi, A., Palazzo, S., Hashimoto, K., Kato, N., and Nemoto, Y., A cross-layer approach for an efficient delivery of tcp/rtp-based multimedia applications in heterogeneous wireless networks. IEEE Trans. Veh. Technol. 57(6):3801–3814, 2008.

    Article  Google Scholar 

  54. Guoping, T., and Thorsten, H., Optimization of an rtp level hybrid error correction scheme for dvb services over wireless home networks under strict delay constraints. IEEE Trans. Broadcast. 53(1):297–307, 2007.

    Article  Google Scholar 

  55. Kim, M., Hongil, J., Kim, Y., Park, J., and Park, Y., Design and implementation of mobile trusted module for trusted mobile computing. IEEE Trans. Consum. Electron. 56(1):134–140, 2010.

    Article  Google Scholar 

  56. Adena Health System Uses LifeSize High Definition Video to Bring Remote Specialists to Infant Patients (media release), LifeSize.com website, December 8, 2008.

Download references

Acknowledgments

This research was funded by the High Impact Research unit of the University of Malaya (Grant No. UM.C/HIR/MOHE/FCSIT/12).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. A. Zaidan.

Additional information

This article is part of the Topical Collection on Patient Facing Systems

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mat Kiah, M.L., Al-Bakri, S.H., Zaidan, A.A. et al. Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture. J Med Syst 38, 133 (2014). https://doi.org/10.1007/s10916-014-0133-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-014-0133-y

Keywords

Navigation