Reversible Copyright Protection for DNA Microarray Images

The ability of the DNA microarray images of being used in several application domains, such as computer science, medical sciences, biololgy, toxicology, chemistry, ecology, environmental studies and statistics has enabled the collaboration among scientists belonging to different research fields. For this reason, the use/management of such images may be sometimes controlled by ethical or proprietary rules. In this paper, we address the problem of DNA microarray images protection by means of visible watermarking techniques, where the visible watermark serves as a tag or ownership identifier, but can be completely removed to resume the original DNA microarray image. In particular, to the best of our knowledge, we introduce the first reversible visible watermarking scheme explicitly addressed for such type of images. The proposed scheme ensures copyright protection, besides enabling the binding of that image with other information related to it. The visible watermark is securely embedded based on a user-key-controlled embedding mechanism. We remark that by using our scheme it is possible to store only the watermarked copy of a DNA microarray image, without the original one, and then to restore exactly the original image. Finally, we have implemented a working prototype of the scheme we proposed and its validity has been proven through testing.

[1]  Christodoulos Chamzas,et al.  Technical features of the JBIG standard for progressive bi-level image compression , 1992, Signal Process. Image Commun..

[2]  Long-Wen Chang,et al.  A High Secure Reversible Visible Watermarking Scheme , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[3]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[4]  Bruno Carpentieri,et al.  Copyright Protection for Images on Mobile Devices , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[5]  Roberto Caldelli,et al.  Reversible Watermarking Techniques: An Overview and a Classification , 2010, EURASIP J. Inf. Secur..

[6]  Faouzi Kossentini,et al.  The emerging JBIG2 standard , 1998, IEEE Trans. Circuits Syst. Video Technol..

[7]  S. Dudoit,et al.  Microarray expression profiling identifies genes with altered expression in HDL-deficient mice. , 2000, Genome research.

[8]  Alfredo De Santis,et al.  Cloud-based adaptive compression and secure management services for 3D healthcare data , 2015, Future Gener. Comput. Syst..

[9]  Zidong Wang,et al.  Microarray Image Analysis: An Algorithmic Approach , 2010 .

[10]  Alfredo De Santis,et al.  On the Protection of fMRI Images in Multi-domain Environments , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[11]  Alessandro Armando,et al.  Breaking and fixing the Android Launching Flow , 2013, Comput. Secur..

[12]  Ross Anderson,et al.  Serpent: A Proposal for the Advanced Encryption Standard , 1998 .

[13]  Bruno Carpentieri,et al.  A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.

[14]  Alessio Merlo,et al.  A survey on energy-aware security mechanisms , 2015, Pervasive Mob. Comput..

[15]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[16]  Bruno Carpentieri,et al.  The AVQ Algorithm: Watermarking and Compression Performances , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.

[17]  Alfredo De Santis,et al.  Protection of Microscopy Images through Digital Watermarking Techniques , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.