Novel Scheme for Compressed Image Authentication Using LSB Watermarking and EMRC6 Encryption

In the current era, transmission and storing of medical data in the digital form is of great concern and thus the requirement for content authentication has aroused. As a solution to these, digital watermarking techniques and encryption schemes have been used to secure medical data like medical images. In this paper a combination of two algorithms to provide image authentication for medical images in the compressed format is proposed. In the proposed method, the watermark image is encrypted using the Enhanced modified RC6 block cipher (EMRC6) algorithm and the encrypted watermark image is watermarked using the simple Least significant Bit (LSB) watermarking technique. The watermarked output image shows no visual imparity and the watermark which has been extracted has no visual difference. The test results show that the watermarked image has high quality and the watermark is very secure. Also the PSNR value of proposed method is 44.966 on an average and 43.0633 for the existing system where LSB technique is integrated with MRC6 for security of watermark. Hence the work is aimed to increase the embedding volume and make the watermark more secure which is the basic requirement of medical image security.

[1]  Puneet Kr Sharma,et al.  ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM , 2012 .

[2]  Kukoo Anna Mathew Watermarking of JPEG2000 Compressed Images with Improved Encryption , 2013 .

[3]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[4]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[5]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[6]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[7]  N.A. El-Fishawy,et al.  A modification of RC6/sup tm/ block cipher algorithm for data security (MRC6) , 2004, International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04..

[8]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[9]  K GayathriI.,et al.  Digital Watermarking Using RC5 Encryption On JPEG2000 Images , 2013 .

[10]  Atsuko Miyaji,et al.  Evaluation of the Security of RC6 against the χ2-Attack*A preliminary version was presented at ACISP'05. , 2007 .

[11]  Ingemar J. Cox,et al.  Watermarking Is Not Cryptography , 2006, IWDW.

[12]  Antoine Joux,et al.  A Statistical Attack on RC6 , 2000, FSE.

[13]  Christian Roux,et al.  A joint watermarking/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[14]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[15]  Ming-Shi Wang,et al.  A majority-voting based watermarking scheme for color image tamper detection and recovery , 2007, Comput. Stand. Interfaces.

[16]  Michele Larobina,et al.  Medical Image File Formats , 2014, Journal of Digital Imaging.

[17]  Hongjun Wu,et al.  Efficient and secure encryption schemes for JPEG2000 , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[18]  Joos Vandewalle,et al.  Linear Cryptanalysis of RC5 and RC6 , 1999, FSE.

[19]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.

[20]  S. El-Rabaie,et al.  Homomorphic image encryption , 2009, J. Electronic Imaging.

[21]  A.H.M. Ragab,et al.  Enhancements and implementation of RC6/sup TM/ block cipher for data security , 2001, Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology. TENCON 2001 (Cat. No.01CH37239).

[22]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[23]  Arun Patro,et al.  Design and Implementation of Enhanced version of MRC6 algorithm for data security , 2015 .

[24]  Safya Belghith,et al.  Watermarking and encryption scheme to secure multimedia information , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[25]  Bernd Girod,et al.  Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[26]  Mohan S. Kankanhalli,et al.  Compressed-encrypted domain JPEG2000 image watermarking , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[27]  Atsuko Miyaji,et al.  PAPER Special Section on Cryptography and Information Security Evaluation of the Security of RC6 against the χ 2 -Attack ∗∗ , 2007 .

[28]  Abdullah Bamatraf,et al.  Digital watermarking algorithm using LSB , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.

[29]  Majid Rabbani,et al.  An overview of the JPEG 2000 still image compression standard , 2002, Signal Process. Image Commun..