A New Joint Watermarking-Encryption-JPEG-LS Compression Method for a Priori & a Posteriori Image Protection

In this paper, we propose the first joint watermarking-encryption-compression scheme for the protection of medical images. Its originality is twofold. In a first time, it allows the access to watermarking-based security services from the encrypted and the compressed bitstreams without having to parse them even partially. It becomes possible to trace images and control their reliability (i.e. integrity and authenticity) from both the encrypted and compressed domains. In a second, it stands on the combination of bit-substitution watermarking, JPEG-LS and the AES block cipher in its CBC mode so as to make our scheme compliant with DICOM. Experiments conducted on different medical images modalities (radiographic and retina images) demonstrate the capability of our system to securely make available a message in both encrypted and compressed domains while minimizing the distortion of the image.

[1]  Qing Chen,et al.  Lossless data embedding with file size preservation , 2004, IS&T/SPIE Electronic Imaging.

[2]  Wei Pan,et al.  Privacy protection and security in eHealth cloud platform for medical image sharing , 2016, 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).

[3]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.

[4]  Walter D. Leon-Salas,et al.  Encoding compressive sensing measurements with Golomb-Rice codes , 2015, 2015 IEEE International Symposium on Circuits and Systems (ISCAS).

[5]  Sheila Frankel,et al.  The AES-CBC Cipher Algorithm and Its Use with IPsec , 2003, RFC.

[6]  Tenkasi V. Ramabadran,et al.  Near-lossless compression of medical images through entropy-coded DPCM , 1994, IEEE Trans. Medical Imaging.

[8]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[9]  Gouenou Coatrieux,et al.  An a Priori and a Posteriori Protection by Means of Data Hiding of Encrypted Images: Application to Ultrasound Images , 2014 .

[10]  B. Suneetha,et al.  Designing an Efficient Image Encryption-then Compression System , 2015 .

[11]  Gouenou Coatrieux,et al.  A crypto-watermarking system for ensuring reliability control and traceability of medical images , 2016, Signal Process. Image Commun..

[12]  R. Collorec,et al.  Relevance of watermarking in medical imaging , 2000, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS International Conference on Information Technol.

[13]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[14]  Gouenou Coatrieux,et al.  Joint watermarking and lossless JPEG-LS compression for medical image security , 2017, ICWIP 2017.

[15]  Nora Cuppens-Boulahia,et al.  Watermarking to Enforce Medical Image Access and Usage Control Policy , 2010, 2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems.

[16]  Mohan S. Kankanhalli,et al.  Compressed-encrypted domain JPEG2000 image watermarking , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[17]  Guillermo Sapiro,et al.  The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS , 2000, IEEE Trans. Image Process..

[18]  Mauro Barni,et al.  Joint near-lossless compression and watermarking of still images for authentication and tamper localization , 2006, Signal Process. Image Commun..

[19]  Xiaoming Chen,et al.  Joint encryption and compression of 3D images based on tensor compressive sensing with non-autonomous 3D chaotic system , 2017, Multimedia Tools and Applications.

[20]  Tiago Marques Godinho,et al.  Web Validation Service for Ensuring Adherence to the DICOM Standard. , 2017, Studies in health technology and informatics.

[21]  Christian Roux,et al.  A teleassistance protocol based on joint watermarking–encryption evidence for identification of liabilities in case of litigation , 2015 .