Crypto-watermarking scheme for tamper detection of medical images

ABSTRACT Medical images of patients are often exchanged among specialist physicians, radiologists, hospital authorities and patients for remote monitoring and assessment as part of telemedicine. With the revolutions in the technology, the threat models and attackers are evolving on a daily basis and hence there is a constant need for the development of novel schemes that can protect personal information. In this paper, a non-blind fragile watermarking is developed to invisibly hide and integrate patient’s unique information such as biometrics in their radiological images for secure authentication, integrity verification and tamper detection purposes. The concept of compressive sensing theory is employed with discrete cosine transform to improve confidentiality. The performance of the proposed scheme is tested and evaluated on three types of medical images: X-ray, computed tomography and magnetic resonance imaging. The proposed scheme presents a means of verifying data integrity when medical images are subjected to attacks. The experimental results showed that the scheme invisibly hides high payloads of patient’s unique identities, apart from providing better tamper detection. The simulation results show that the proposed scheme provides high imperceptibility up to 92 dB and high payload capacity of up to 1 bpp.

[1]  Rohit M. Thanki,et al.  A Hybrid Watermarking Technique for Copyright Protection of Medical Signals in Teleradiology , 2018 .

[2]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[3]  Ting Luo,et al.  Stereo Matching Based Stereo Image Watermarking for Tamper Detection and Recovery , 2014, Int. J. Comput. Intell. Syst..

[4]  Osamah M. Al-Qershi,et al.  Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images , 2011, Journal of Digital Imaging.

[5]  Shilpa P. Metkar,et al.  Digital image security improvement by integrating watermarking and encryption technique , 2013, 2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC).

[6]  G. Sharma,et al.  On the security and robustness of encryption via compressed sensing , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[7]  Javaid A. Sheikh,et al.  Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication , 2020, Future Gener. Comput. Syst..

[8]  Christian Roux,et al.  A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.

[9]  Amit Kumar Singh,et al.  Multiple Watermarking on Medical Images Using Selective Discrete Wavelet Transform Coefficients , 2015 .

[10]  Pekka Ruotsalainen,et al.  Privacy and security in teleradiology. , 2010, European journal of radiology.

[11]  M. Karthikeyan,et al.  Protection of bio medical iris image using watermarking and cryptography with WPT , 2019, Measurement.

[12]  Rohit M. Thanki,et al.  A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory , 2017 .

[13]  Mei Yu,et al.  Sparse recovery based reversible data hiding method using the human visual system , 2017, Multimedia Tools and Applications.

[14]  Nouna Kettaneh,et al.  Statistical Modeling by Wavelets , 1999, Technometrics.

[15]  Jianping Li,et al.  Context-based watermarking cum chaotic encryption for medical images in telemedicine applications , 2018, Multimedia Tools and Applications.

[16]  Nilanjan Dey,et al.  Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing , 2019, Smart Health.

[17]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[18]  Lamri Laouamer,et al.  Efficient and robust encryption and watermarking technique based on a new chaotic map approach , 2017, Multimedia Tools and Applications.

[19]  Y. Rachlin,et al.  The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[20]  Joel A. Tropp,et al.  Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.

[21]  Nilanjan Dey,et al.  Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method , 2012, SIN '12.

[22]  Ruey-Feng Chang,et al.  Tamper Detection and Restoring System for Medical Images Using Wavelet-based Reversible Data Embedding , 2008, Journal of Digital Imaging.

[23]  Amit Kumar Singh,et al.  Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications , 2018, Multimedia Tools and Applications.

[24]  Gouenou Coatrieux,et al.  A crypto-watermarking system for ensuring reliability control and traceability of medical images , 2016, Signal Process. Image Commun..

[25]  Fatma Taher,et al.  Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions , 2017, 2017 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS).

[26]  Khan Muhammad,et al.  Realization of an Adaptive Data Hiding System for Electronic Patient Record, Embedding in Medical Images , 2018, Security in Smart Cities: Models, Applications, and Challenges.

[27]  Nisreen I. Yassin Digital Watermarking for Telemedicine Applications: A Review , 2015 .

[28]  Ashutosh Kumar Singh,et al.  Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image , 2019, Multimedia Tools and Applications.

[29]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[30]  Nilanjan Dey,et al.  Digital Image Watermarking: Theoretical and Computational Advances , 2018 .

[31]  S. Frick,et al.  Compressed Sensing , 2014, Computer Vision, A Reference Guide.

[32]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[33]  Mei Yu,et al.  Asymmetric self-recovery oriented stereo image watermarking method for three dimensional video system , 2015, Multimedia Systems.

[34]  Xinpeng Zhang,et al.  Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..

[35]  E. R. Davies,et al.  A skimming technique for fast accurate edge detection , 1992, Signal Process..

[36]  Sriram Vishwanath,et al.  Secrecy using compressive sensing , 2011, 2011 IEEE Information Theory Workshop.

[37]  S. A. Hossein,et al.  Security analysis of the joint encryption and compressed sensing , 2012, 2012 20th Telecommunications Forum (TELFOR).

[38]  Jasni Mohamad Zain,et al.  Tamper Localization and Lossless Recovery Watermarking Scheme with ROI Segmentation and Multilevel Authentication , 2012, Journal of Digital Imaging.

[39]  Xiao Zhou,et al.  Fragile Watermarking for Image Authentication Using the Characteristic of SVD , 2017, Algorithms.

[40]  Anirban Sengupta,et al.  Everything You Want to Know About Watermarking: From Paper Marks to Hardware Protection: From paper marks to hardware protection. , 2017, IEEE Consumer Electronics Magazine.

[41]  Amit Mehto,et al.  Adaptive Lossless Medical Image Watermarking Algorithm Based on DCT & DWT , 2016 .

[42]  Rohit M. Thanki,et al.  A RONI Based Visible Watermarking Approach for Medical Image Authentication , 2017, Journal of Medical Systems.

[43]  Tian-ge Zhuang,et al.  A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data , 2009, Journal of Digital Imaging.

[44]  Jiantao Zhou,et al.  A Review of Compressive Sensing in Information Security Field , 2016, IEEE Access.

[45]  Saraju P. Mohanty,et al.  Everything You Wanted to Know about Smart Health Care: Evaluating the Different Technologies and Components of the Internet of Things for Better Health , 2018, IEEE Consumer Electronics Magazine.

[46]  Ali Al-Haj,et al.  Crypto-Watermarking of Transmitted Medical Images , 2017, Journal of Digital Imaging.

[47]  Gheith A. Abandah,et al.  Combining cryptography and digital watermarking for secured transmission of medical images , 2016, 2016 2nd International Conference on Information Management (ICIM).