Combination of watermarking and joint watermarking-decryption for reliability control and traceability of medical images

In this paper, we propose a novel crypto-watermarking system for the purpose of verifying the reliability of images and tracing them, i.e. identifying the person at the origin of an illegal distribution. This system couples a common watermarking method, based on Quantization Index Modulation (QIM), and a joint watermarking-decryption (JWD) approach. At the emitter side, it allows the insertion of a watermark as a proof of reliability of the image before sending it encrypted; at the reception, another watermark, a proof of traceability, is embedded during the decryption process. The scheme we propose makes interoperate such a combination of watermarking approaches taking into account risks of interferences between embedded watermarks, allowing the access to both reliability and traceability proofs. Experimental results confirm the efficiency of our system, and demonstrate it can be used to identify the physician at the origin of a disclosure even if the image has been modified.

[1]  Christian Roux,et al.  A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.

[2]  Huazhong Shu,et al.  A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization , 2013, IEEE Journal of Biomedical and Health Informatics.

[3]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[4]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[5]  David-Olivier Jaquet-Chiffelle,et al.  Medical record search engines, using pseudonymised patient identity: An alternative to centralised medical records , 2011, Int. J. Medical Informatics.

[6]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.

[7]  C Quantin,et al.  Improving outcomes with interoperable EHRs and secure global health information infrastructure. , 2007, Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual Conference.

[8]  Nora Cuppens-Boulahia,et al.  Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking , 2009, DPM/SETOP.

[9]  Gouenou Coatrieux,et al.  A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images , 2012, Comput. Methods Programs Biomed..

[10]  Yongwha Chung,et al.  Analyzing the Secure and Energy Efficient Transmissions of Compressed Fingerprint Images using Encryption and Watermarking , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[11]  R. Collorec,et al.  Relevance of watermarking in medical imaging , 2000, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS International Conference on Information Technol.

[12]  Tenkasi V. Ramabadran,et al.  Near-lossless compression of medical images through entropy-coded DPCM , 1994, IEEE Trans. Medical Imaging.

[13]  Alessandro Piva,et al.  Secure Client-Side ST-DM Watermark Embedding , 2010, IEEE Transactions on Information Forensics and Security.

[14]  David L. Neuhoff,et al.  Near-lossless compression of medical images , 1995, 1995 International Conference on Acoustics, Speech, and Signal Processing.

[15]  Stefan Katzenbeisser,et al.  Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.