Hierarchical access control and content protection in medical image archives, based on inverse pyramid decomposition

In the paper is presented one new approach for management of medical databases with multi-layer access, based on the Inverse Pyramid Decomposition. This decomposition offers the ability for the development of interactive tools for multi-layer transfer of the processed visual information with consecutively quality improvement, selection of regions of interest, which to be directly accessed and represented with highest quality, and reliable content protection ensured by resistant and fragile watermarks embedding. The use of the Inverse Pyramid Decomposition permits insertion of multiple watermarks in the same file. The resistant watermarks are used to prove the documents authenticity, while the fragile watermarks hide preset Regions of Interest in the medical images which should be revealed by authorized users only, and prove any kind of editing of the protected visual content. The basic part of the database information which is at the low access level, could be used for various applications: disease history and treatment, statistics information, etc., and could support patients diagnostics, cure and telemedicine. The information, saved in the high access level(s) is accessible for authorized users only.

[1]  M. Milanova,et al.  New Method for Lossless Compression of Medical Records , 2008, 2008 IEEE International Symposium on Signal Processing and Information Technology.

[2]  A. Kak,et al.  Automated storage and retrieval of thin-section CT images to assist diagnosis: system description and preliminary assessment. , 2003, Radiology.

[3]  H K Huang,et al.  Some historical remarks on picture archiving and communication systems. , 2003, Computerized medical imaging and graphics : the official journal of the Computerized Medical Imaging Society.

[4]  良治 祐延,et al.  DICOM Digital Imaging and Communications in Medicine, ダイコム , 2003 .

[5]  Roumen Kountchev,et al.  Fragile and resistant image watermarking based on inverse difference pyramid decomposition , 2010 .

[6]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[7]  Roumen Kountchev,et al.  Image Representation with Reduced Spectrum Pyramid , 2008, New Directions in Intelligent Interactive Multimedia.

[8]  Alan C. Bovik,et al.  The Essential Guide to Image Processing , 2009, J. Electronic Imaging.

[9]  Anastasios Tefas,et al.  Image Watermarking: Techniques and Applications , 2009 .

[10]  R. Kountchev,et al.  RSTC-invariant object representation with 2D modified Mellin-Fourier transform , 2010 .

[11]  Michael W. Marcellin,et al.  JPEG2000 - image compression fundamentals, standards and practice , 2013, The Kluwer international series in engineering and computer science.