Home About Login Current Archives Announcements Editorial Board
Submit Now For Authors Call for Submissions Statistics Contact
Home > Archives > Volume 16, No 2 (2018) > Article

DOI: 10.14704/nq.2018.16.2.1174

An Image Sharing-based Solution for Secure Inpatient Medication Administration

Wen-Cheng Wang, Yen-Wu Ti, Shang-Kuan Chen


Patients face risks of health damage from medication error. To prevent such errors, hospitals need a secure medication administration system. Using threshold sharing technology, a secure medication administration method is proposed here. When a patient visits the doctor and the doctor prescribes n medications, a photo of the patient is encoded into n portions. Then the prescription and these n portions are stored in the hospital information system. Any portion provides the smallest quantity of information needed to reveal the smallest part of the original photo. As more portions are received, more of the photo is revealed. Once all n portions have been received, the original photo is revealed with very little distortion, meaning that the method is highly fault-tolerant. Before dispensing medications, the dispensers at the medication counter should scan the tags of all drug packages. If the dispensers at the medication counter have the correct n medications, the computer receives the n portions, and the photos of the patients are displayed on the screen. Then the dispensers at the medication counter know that there are no drugs missing or wrong, and also which drugs belong to which patient.


Medical Security, Medication Administration, Image Sharing

Full Text



Alexa M, Behr J, Cohen-Or D, Fleishman S, Levin D, Silva CT. Computing and rendering point set surfaces. IEEE Transactions on Visualization and Computer Graphics 2003;9(1):3-15.

Bates DW, Gawande AA. Improving safety with information technology. New England Journal of Medicine 2003;348(25):2526-34.

Benedens O. Geometry-Based Watermarking of three-dimension Models. IEEE Computer Graphics and Applications 1999; 19: 46−55.

Blakley GR. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference 1979; 4 (48): 313-17.

Chen SK, Hsu CJ, Ti YW. Hierarchical Three-Dimension Mesh Model Sharing. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on 2011: 77-80.

Institute of Medicine of the National Academies, Preventing medication errors: Quality chasm series. The National Academies Press, Washington, 2007.

Kalaiah A, Varshney A. Modeling and rendering of points with local geometry. IEEE Transactions on Visualization and Computer Graphics 2003;9(1):30-42.

Kobbelt L, Botsch M. A survey of point-based techniques in computer graphics. Computers & Graphics 2004;28(6): 801-14.

Lin HY, Liao HY, Lu CS, Lin JC. Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Transactions on Multimedia 2005;7(6):997-1006.

Park SB, Lee SU. Multiscale representation and compression of 3-D point data. IEEE Transactions on Multimedia 2009;11(1):177-83.

Pauly M, Keiser R, Kobbelt LP, Gross M. Shape modeling with point-sampled geometry. ACM Transactions on Graphics (TOG) 2003;22(3):641-50.

Schneider PJ, Pedersen CA, Montanya KR, Curran CR, Harpe SE, Bohenek W, Perratto B, Swaim TJ, Wellman KE. Improving the safety of medication administration using an interactive CD-ROM program. American Journal of Health-System Pharmacy 2006;63(1):59−64.

Shamir A. How to share a secret. Communications of the ACM 1979;22(11):612-13.

Thien CC, Lin JC. Secret image sharing. Computers & Graphics 2002;26(5):765-70.

Wang CM, Wang PC. Steganography on point-sampled geometry. Computers & Graphics 2006;30(2):244-54.

What is a Medication Error? National Coordinating Council for Medication Error Reporting and Prevention. http://www.nccmerp.org/about-medication-errors.

Yen YC, Lo NW, Wu TC. Two RFID-based solutions for secure inpatient medication administration. Journal of Medical Systems 2012;36(5):2769-78.

Yeo BL, Yeung MM. Watermarking 3D objects for verification. IEEE Computer Graphics and Applications 1999; 19(1):36-45.