A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security Issues of Teleradiology

Teleradiology allows transmission of medical images for clinical data interpretation to provide improved e-health care access, delivery, and standards. The remote transmission raises various ethical and legal issues like image retention, fraud, privacy, malpractice liability, etc. A joint FED watermarking system means a joint fingerprint/encryption/dual watermarking system is proposed for addressing these issues. The system combines a region based substitution dual watermarking algorithm using spatial fusion, stream cipher algorithm using symmetric key, and fingerprint verification algorithm using invariants. This paper aims to give access to the outcomes of medical images with confidentiality, availability, integrity, and its origin. The watermarking, encryption, and fingerprint enrollment are conducted jointly in protection stage such that the extraction, decryption, and verification can be applied independently. The dual watermarking system, introducing two different embedding schemes, one used for patient data and other for fingerprint features, reduces the difficulty in maintenance of multiple documents like authentication data, personnel and diagnosis data, and medical images. The spatial fusion algorithm, which determines the region of embedding using threshold from the image to embed the encrypted patient data, follows the exact rules of fusion resulting in better quality than other fusion techniques. The four step stream cipher algorithm using symmetric key for encrypting the patient data with fingerprint verification system using algebraic invariants improves the robustness of the medical information. The experiment result of proposed scheme is evaluated for security and quality analysis in DICOM medical images resulted well in terms of attacks, quality index, and imperceptibility.

[1]  Colin Boyd,et al.  A Review of Medical Image Watermarking Requirements for Teleradiology , 2013, Journal of Digital Imaging.

[2]  Sharath Pankanti,et al.  Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..

[3]  Gonzalo Pajares Martinsanz,et al.  A wavelet-based image fusion tutorial , 2004 .

[4]  P. Viswanathan,et al.  FUSION OF CRYPTOGRAPHIC WATERMARKING MEDICAL IMAGE SYSTEM WITH REVERSIBLE PROPERTY , 2011 .

[5]  David Bull,et al.  Image fusion metric based on mutual information and Tsallis entropy , 2006 .

[6]  Alireza Khotanzad,et al.  Invariant Image Recognition by Zernike Moments , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[7]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[8]  Tony M Damico A Brief History of Cryptography , 2009 .

[9]  P. Venkata Krishna,et al.  Multimodal Biometric Invariant Moment Fusion Authentication System , 2010, BAIP.

[10]  Roland T. Chin,et al.  On Image Analysis by the Methods of Moments , 1988, IEEE Trans. Pattern Anal. Mach. Intell..

[11]  Christian Roux,et al.  A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.

[12]  Pauli Kuosmanen,et al.  Wavelet domain features for fingerprint recognition , 2001 .

[13]  Ahmad-Reza Sadeghi,et al.  Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages , 2006, ACISP.

[14]  Edward H. Adelson,et al.  The Laplacian Pyramid as a Compact Image Code , 1983, IEEE Trans. Commun..

[15]  David P. Jablon Strong password-only authenticated key exchange , 1996, CCRV.

[16]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[17]  P. Venkata Krishna,et al.  Fusion of Cryptographic Watermarking Medical Image System with Reversible Property , 2011 .

[18]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.

[19]  Weidong Zhao,et al.  Security Theory and Attack Analysis for Text Watermarking , 2009, 2009 International Conference on E-Business and Information System Security.

[20]  Saleh A Al-Damegh Emerging issues in medical imaging. , 2005, Indian journal of medical ethics.

[21]  Hua Zhang,et al.  A new watermarking approach based on probabilistic neural network in wavelet domain , 2008, Soft Comput..

[22]  Thumrongrat Amornraksa,et al.  Fingerprint recognition using DCT features , 2006 .

[23]  P. Venkata Krishna,et al.  Text Fusion Watermarking in Medical Image with Semi-reversible for Secure Transfer and Authentication , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[24]  G. Qu,et al.  Information measure for performance of image fusion , 2002 .

[25]  P. Viswanathan,et al.  Medical Image Spatial Fusion Watermarking System , 2013 .

[26]  F. Prior,et al.  Potential impact of HITECH security regulations on medical imaging , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[27]  P. Viswanathan,et al.  Fingerprint enhancement and compression method using Morlet wavelet , 2010 .

[28]  Zhou Wang,et al.  Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .

[29]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[30]  Pekka Ruotsalainen,et al.  Privacy and security in teleradiology. , 2010, European journal of radiology.

[31]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[32]  Sen Wang,et al.  Fingerprint enhancement in the singular point area , 2004, IEEE Signal Processing Letters.

[33]  Shiguo Lian,et al.  Joint Fingerprint Embedding and Decryption for Video Distribution , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[34]  Zhuowen Tu,et al.  Image Parsing: Unifying Segmentation, Detection, and Recognition , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.

[35]  Ilya Mironov,et al.  (Not So) Random Shuffles of RC4 , 2002, IACR Cryptol. ePrint Arch..

[36]  Ira S. Moskowitz,et al.  Correlation-based watermarking method for image authentication applications , 2004 .