Lossless watermarking scheme for enhancing security of medical data in PACS

We propose a lossless watermarking scheme, in a sense that the original image can be exactly recovered from the watermarked one, with the purpose of verifying the integrity and authenticity of medical images in PACS. Our embedding method includes imposing invertible modulations that induce low distortion level, as well as losslessly compressing the status of the original image and carrying such information in the watermarked image. Digital signature of the whole image is embedded for verifying the integrity of the image. An identifier also presented in electronic patient record (EPR) is embedded for verifying the authenticity by simultaneously processing of the watermarked image and the EPR. Combining with fingerprint system, patient’s fingerprint information is further embedded into several image slices and then extracted for verifying the authenticity. No visual quality degradation is detected in the watermarked image.

[1]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[2]  Chin-Ming Hsu,et al.  A data-hiding technique with authentication, integration, and confidentiality for electronic patient records , 2002, IEEE Transactions on Information Technology in Biomedicine.

[3]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[4]  Abraham Lempel,et al.  Compression of two-dimensional data , 1986, IEEE Trans. Inf. Theory.

[5]  U. Rajendra Acharya,et al.  Compact storage of medical images with patient information , 2001, IEEE Transactions on Information Technology in Biomedicine.

[6]  Sei-ichiro Kamata,et al.  A New Algorithm for , 1999 .

[7]  Jessica J. Fridrich,et al.  Distortion-Free Data Embedding for Images , 2001, Information Hiding.

[8]  H. K. Huang,et al.  Authenticity and integrity of digital mammography images , 2001, IEEE Transactions on Medical Imaging.

[9]  H. K. Huang,et al.  Radiologic image compression-a review , 1995, Proc. IEEE.

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Ian H. Witten,et al.  Arithmetic coding for data compression , 1987, CACM.

[12]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[13]  Bülent Sankur,et al.  Strict integrity control of biomedical images , 2001, IS&T/SPIE Electronic Imaging.

[14]  Tiange Zhuang,et al.  Several strategies of implementing PACS in developing countries like China , 1998, Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Vol.20 Biomedical Engineering Towards the Year 2000 and Beyond (Cat. No.98CH36286).