Secure Sharing of Medical Information in Watermarked Image through Telemedicine using PKI Technique

Security is the fundamental requirement for an information society in the distributed network environment. A watermark is a secret message that is embedded into a cover message. Digital watermarks are used to verify the authenticity of the carrier signal for the identity of the owners. In order to provide data integrity, confidentiality and authentication various techniques are available like cryptography, steganography and watermarking. To protect the patient information in telemedicine, watermarking is mainly used. Patient information is embedded within the cover medical image. Digital Imaging & Communications in Medicine is an universal standard of communication for secured medical images. In the proposed technique, to provide authentication the hash value will be generated using SHA and the Huffman compression algorithm(R-S vector) will be used to shrink the size of an image. With the patient information the medical image is protected through Public key cryptography in a secure manner. Compared to the previous system, the proposed technique is more efficient. The original image is completely restored without any loss at the receiver side. The patient information is hidden (protected) from the hackers during transmission. General Terms Medical Image Security.

[1]  H. K. Huang,et al.  Authenticity and integrity of digital mammography images , 2001, IEEE Transactions on Medical Imaging.

[2]  Mohamed M. Abd-Eldayem A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine , 2013 .

[3]  N. Memon,et al.  Adaptive data hiding scheme for medical images using integer wavelet transform , 2009, 2009 International Conference on Emerging Technologies.

[4]  Binh Pham,et al.  Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images. , 2005 .

[5]  Bernd Girod,et al.  Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.

[6]  R. Latif,et al.  Secure transmission of medical images by watermarking technique , 2012, 2012 IEEE International Conference on Complex Systems (ICCS).

[7]  Chin-Ming Hsu,et al.  A data-hiding technique with authentication, integration, and confidentiality for electronic patient records , 2002, IEEE Transactions on Information Technology in Biomedicine.

[8]  Qiong Zhang,et al.  A Kind of Verifiable Visual Cryptography Scheme , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.

[9]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[10]  Paulo S. L. M. Barreto,et al.  Providing Integrity and Authenticity in DICOM Images: A Novel Approach , 2009, IEEE Transactions on Information Technology in Biomedicine.

[11]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[12]  Gouenou Coatrieux,et al.  A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images , 2012, Comput. Methods Programs Biomed..

[13]  G. Coatrieux,et al.  A Review of Image Watermarking Applications in Healthcare , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[14]  Chin-Ming Hsu,et al.  A secure data hiding technique with heterogeneous data-combining capability for electronic patient records , 2000, Proceedings of the 22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (Cat. No.00CH37143).

[15]  J.M. Zain,et al.  Reversible watermarking for authentication of DICOM images , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[16]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[17]  Nisar Ahmed Memon,et al.  Watermarking of Medical Images for Content Authentication and Copyright Protection , 2010 .

[18]  A. Kannammal,et al.  Authentication of DICOM medical images using independent component analysis (ICA) , 2012, Int. J. Medical Eng. Informatics.

[19]  Dariusz Bogumil,et al.  An asymmetric image watermarking scheme resistant against geometrical distortions , 2006, Signal Process. Image Commun..

[20]  Imants D. Svalbe,et al.  Key independent watermark detection , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.