Security In Telemedicine: Issues In Watermarking Medical Images

This paper opens a discussion about securing telemedicine by looking at attacks to the security by viewing the function of the computer system as provision of information. Categories of attacks are discussed and an overview of watermarking is introduced as one of the security tool, using the medical image as the channel for watermarking. The main objectives for medical image watermarking are that the watermarks are imperceptible and act as a mean of authentication and integrity control. The issues in watermarking medical images raised here are complete authentication Vs content authentication, reversible watermarking Vs permanent/irreversible watermarking and the practical issue of compression.

[1]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[2]  Rabab Kreidieh Ward,et al.  Wavelet packets-based digital watermarking for image verification and authentication , 2003, Signal Process..

[3]  Bülent Sankur,et al.  Strict integrity control of biomedical images , 2001, IS&T/SPIE Electronic Imaging.

[4]  Bernd Girod,et al.  Digital Watermarking of Chemical Structure Sets , 2001, Information Hiding.

[5]  U. C. Niranjan,et al.  Watermarking medical images with patient information , 1998, Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Vol.20 Biomedical Engineering Towards the Year 2000 and Beyond (Cat. No.98CH36286).

[6]  Bernd Girod,et al.  Digital watermarking of text, image, and video documents , 1998, Comput. Graph..

[7]  Sotiris Pavlopoulos,et al.  A medical image watermarking scheme based on wavelet transform , 2003, Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (IEEE Cat. No.03CH37439).

[8]  Christoph Busch,et al.  Towards Blind Detection of Robust Watermarks in Polygonal Models , 2000, Comput. Graph. Forum.

[9]  Mauro Barni,et al.  Text based geometric normalization for robust watermarking of digital maps , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[10]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[11]  Ingemar J. Cox,et al.  A Review of of Watermarking Principles and Practices , 1999 .

[12]  Pao-Chi Chang,et al.  Video watermarking synchronization based on profile statistics , 2004, IEEE Aerospace and Electronic Systems Magazine.

[13]  B. Zhu,et al.  Transparent robust authentication and distortion measurement technique for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[14]  H. Okada,et al.  Error Detection by Digital Watermarking for MPEG-4 Video Coding , 2002, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.

[15]  Chin-Ming Hsu,et al.  A secure data hiding technique with heterogeneous data-combining capability for electronic patient records , 2000, Proceedings of the 22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (Cat. No.00CH37143).

[16]  Chin-Chen Chang,et al.  A color image watermarking scheme based on color quantization , 2004, Signal Process..

[17]  Minerva M. Yeung,et al.  Effective and ineffective digital watermarks , 1997, Proceedings of International Conference on Image Processing.

[18]  R. Collorec,et al.  Relevance of watermarking in medical imaging , 2000, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS International Conference on Information Technol.

[19]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[20]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[21]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[22]  L. Kamoun,et al.  A new medical image watermarking scheme for a better telediagnosis , 2002, IEEE International Conference on Systems, Man and Cybernetics.

[23]  Katsuro Inoue,et al.  A practical method for watermarking Java programs , 2000, Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000.

[24]  Ki-Ryong Kwon,et al.  Watermarking for 3D polygonal meshes using normal vector distributions of each patch , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[25]  Xiangyang Xue,et al.  An Audio Watermarking Technique That Is Robust Against Random Cropping , 2003, Computer Music Journal.

[26]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[27]  H K Huang,et al.  Medical image security in a HIPAA mandated PACS environment. , 2003, Computerized medical imaging and graphics : the official journal of the Computerized Medical Imaging Society.

[28]  Hui Fang,et al.  Robust quadri-phase audio watermarking , 2004 .

[29]  Xu-Dong Zhang,et al.  Image watermarking using tree-based spatial-frequency feature of wavelet transform , 2003, J. Vis. Commun. Image Represent..

[30]  Tian-ge Zhuang,et al.  Lossless watermarking scheme for enhancing security of medical data in PACS , 2003, SPIE Medical Imaging.

[31]  Yanjiang Yang,et al.  An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..