Encryption Based Medical Image Watermarking against Signal Processing Attacks

The protection of data is of at most importance in the medical field to boost the telemedicine applications. There is a need of robust and secure mechanism to transfer the medical images over the Internet. The algorithm proposed in this study is the watermarking technique in the transform domain to ensure secure transfer of medical data. Using DWT transformation and substitution method, we embed the watermark into the cover image and the watermarked image is then encrypted by using the symmetric stream cipher techniques. Performace of the proposed algorithm is analyzed against various signal processing attacks like compression, filtering, noise and histogram equalization and desired outcome is obtained without much degradation in extracted watermark and watermarked image quality.

[1]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[2]  Chin-Ming Hsu,et al.  A data-hiding technique with authentication, integration, and confidentiality for electronic patient records , 2002, IEEE Transactions on Information Technology in Biomedicine.

[3]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[4]  U. Rajendra Acharya,et al.  Reliable and robust transmission and storage of medical images with patient information , 2004, 2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04..

[5]  G. Coatrieux,et al.  A Review of Image Watermarking Applications in Healthcare , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[6]  Wei Liu,et al.  Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[7]  Osman Ratib,et al.  Open-source software in medical imaging: development of OsiriX , 2006, International Journal of Computer Assisted Radiology and Surgery.

[8]  Robert E. Tarjan,et al.  Robustness and Security of Digital Watermarks , 1998, Financial Cryptography.

[9]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[10]  Sotiris Pavlopoulos,et al.  Secure and efficient health data management through multiple watermarking on medical images , 2006, Medical and Biological Engineering and Computing.

[11]  Christian Roux,et al.  A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.

[12]  N. Xuan,et al.  Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[13]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[14]  Mohamed Ali Hajjaji,et al.  Cryptography of medical images based on a combination between chaotic and neural network , 2016, IET Image Process..

[15]  S. Sitharama Iyengar,et al.  Simultaneous storage of patient information with medical images in the frequency domain , 2004, Comput. Methods Programs Biomed..

[16]  H K Huang,et al.  Medical image security in a HIPAA mandated PACS environment. , 2003, Computerized medical imaging and graphics : the official journal of the Computerized Medical Imaging Society.

[17]  Tung-Shou Chen,et al.  A new data hiding method in binary image , 2003, Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings..

[18]  Uma Annamalai MEDICAL IMAGE AUTHENTICATION WITH ENHANCED WATERMARKING TECHHNIQUE THROUGH VISUAL CRYPTOGRAPHY , 2013 .

[19]  P. Mildenberger,et al.  Introduction to the DICOM standard , 2002, European Radiology.

[20]  R. Collorec,et al.  Relevance of watermarking in medical imaging , 2000, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS International Conference on Information Technol.