Two level security for medical images using watermarking/encryption algorithms

In this article, an attempt is made to provide two level securities for medical images using watermarking and encryption. Watermarking provides security and encryption, authenticates medical image and provides integrity. Watermarking is performed by using a new nontensor product wavelet filter banks, which have the ability to reveal singularities in different directions. Natural image is taken as the original image and the medical image is taken as a watermark image. The medical image is embedded into the LH sub band of the natural image. The encryption is performed by RSA, AES, and RC4 algorithms. A qualitative comparative analysis of the proposed algorithm is done for different encryption methods. The proposed algorithm has the ability to withstand different attacks like noise, rotation, contrast, and brightness attacks. Performance analysis is made by calculating PSNR, SSIM, NC, and CV.

[1]  Vasif V. Nabiyev,et al.  Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..

[2]  Samia Boucherkha,et al.  A Lossless Watermarking Based Authentication System For Medical Images , 2007, International Conference on Computational Intelligence.

[3]  R. Umarani,et al.  A Survey on Various Most Common Encryption Techniques , 2012 .

[4]  Habib Zaidi,et al.  A contextual based double watermarking of PET images by patient ID and ECG signal , 2011, Comput. Methods Programs Biomed..

[5]  Binh Pham,et al.  Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images. , 2005 .

[6]  H K Huang,et al.  Medical image security in a HIPAA mandated PACS environment. , 2003, Computerized medical imaging and graphics : the official journal of the Computerized Medical Imaging Society.

[7]  A. Sudy,et al.  TAMIL NADU, INDIA , 2013 .

[8]  Andreas Uhl,et al.  Survey of wavelet-domain watermarking algorithms , 2001, IS&T/SPIE Electronic Imaging.

[9]  Li Sukang,et al.  A Digital Watermarking Algorithm Based On DCT and DWT , 2009 .

[10]  William Puech,et al.  A new crypto-watermarking method for medical images safe transfer , 2004, 2004 12th European Signal Processing Conference.

[11]  Paulo S. L. M. Barreto,et al.  Providing Integrity and Authenticity in DICOM Images: A Novel Approach , 2009, IEEE Transactions on Information Technology in Biomedicine.

[12]  Rajendra Acharya U,et al.  Simultaneous storage of medical images in the spatial and frequency domain: A comparative study , 2004, Biomedical engineering online.

[13]  Deepa Kundur,et al.  Diversity and attack characterization for improved robust watermarking , 2001, IEEE Trans. Signal Process..

[14]  Xinge You,et al.  A Blind Watermarking Scheme Using New Nontensor Product Wavelet Filter Banks , 2010, IEEE Transactions on Image Processing.

[15]  Alessandro Neri,et al.  A wavelet based method for high frequency subbands watermark embedding , 2000 .

[16]  J. P. Raina,et al.  Comparative Analysis of AES and RC4 Algorithms for Better Utilization , 2011 .

[17]  Pingzhi Fan,et al.  An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.

[18]  A. Kannammal,et al.  DICOM Image Authentication and Encryption Based on RSA and AES Algorithms , 2012, ICRA 2012.

[19]  A. Kannammal,et al.  Authentication of DICOM medical images using independent component analysis (ICA) , 2012, Int. J. Medical Eng. Informatics.

[20]  Christian Roux,et al.  A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.

[21]  Dong-Chul Park,et al.  Medical Image Authentication Using Hash Function and Integer Wavelet Transform , 2008, 2008 Congress on Image and Signal Processing.

[22]  A. S. Tolba,et al.  Wavelet Packets-Based Blind Watermarking for Medical Image Management , 2010, The open biomedical engineering journal.

[23]  A. Kannammal,et al.  DICOM medical image watermarking of ECG signals using EZW algorithm , 2013, Int. J. Medical Eng. Informatics.

[24]  A LAVANYA,et al.  Enhancing security of DICOM images during storage and transmission in distributed environment , 2011 .

[25]  Xin Zhou,et al.  Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.