Skip to main content
Erschienen in: Journal of Digital Imaging 6/2014

01.12.2014

Secured Telemedicine Using Region-Based Watermarking with Tamper Localization

verfasst von: Ali Al-Haj, Alaa’ Amer

Erschienen in: Journal of Imaging Informatics in Medicine | Ausgabe 6/2014

Einloggen, um Zugang zu erhalten

Abstract

Medical images exchanged over public networks require a methodology to provide confidentiality for the image, authenticity of the image ownership and source of origin, and image integrity verification. To provide these three security requirements, we propose in this paper a region-based algorithm based on multiple watermarking in the frequency and spatial domains. Confidentiality and authenticity are provided by embedding robust watermarks in the region-of-non-interest (RONI) of the image using a blind scheme in the discrete wavelet transform and singular value decomposition domain (DWT-SVD). On the other hand, integrity is provided by embedding local fragile watermarks in the region-of-interest (ROI) of the image using a reversible scheme in the spatial domain. The integrity provided by the proposed algorithm is implemented on a block-level of the partitioned-image, thus enabling localized detection of tampered regions. The algorithm was evaluated with respect to imperceptibility, robustness, capacity, and tamper localization capability, using MRI, Ultrasound, and X-ray gray-scale medical images. Performance results demonstrate the effectiveness of the proposed algorithm in providing the required security services for telemedicine applications.
Literatur
1.
Zurück zum Zitat Davie B, Florence V, Friede A, Sheehan J, Sisk J: Bringing health-care applications to the internet. IEEE Internet Comput 5(3):42–46, 2001CrossRef Davie B, Florence V, Friede A, Sheehan J, Sisk J: Bringing health-care applications to the internet. IEEE Internet Comput 5(3):42–46, 2001CrossRef
2.
Zurück zum Zitat McEvoy F, Svalastoga E: Security of patient and study data associated with DICOM images when transferred using compact disc media. J Digit Imaging 22(1):65–70, 2007 McEvoy F, Svalastoga E: Security of patient and study data associated with DICOM images when transferred using compact disc media. J Digit Imaging 22(1):65–70, 2007
3.
Zurück zum Zitat Norcen R, Podesser M, Pommer A, Schmidt HP, Uhl A: Confidential storage and transmission of medical image data. Comput Biol Med 33:277–292, 2003PubMedCrossRef Norcen R, Podesser M, Pommer A, Schmidt HP, Uhl A: Confidential storage and transmission of medical image data. Comput Biol Med 33:277–292, 2003PubMedCrossRef
4.
Zurück zum Zitat Kobayashi L, Furuie S, Barreto P: Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13(4):582–589, 2009PubMedCrossRef Kobayashi L, Furuie S, Barreto P: Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13(4):582–589, 2009PubMedCrossRef
5.
Zurück zum Zitat Rodrigues JM,Puech W, Fiorio C: Lossless crypto-data hiding in medical images without increasing the original image size. In: Proc. 2nd Int. Conf. Adv. Med. Signal Inf. Process., Sep. 2004, pp 358–365 Rodrigues JM,Puech W, Fiorio C: Lossless crypto-data hiding in medical images without increasing the original image size. In: Proc. 2nd Int. Conf. Adv. Med. Signal Inf. Process., Sep. 2004, pp 358–365
6.
Zurück zum Zitat Bernarding J, Thiel A, Grzesik A: A JAVA-based DICOM server with integration of clinical findings and DICOM-conform data encryption. Int J Med Inform 64:429–438, 2001PubMedCrossRef Bernarding J, Thiel A, Grzesik A: A JAVA-based DICOM server with integration of clinical findings and DICOM-conform data encryption. Int J Med Inform 64:429–438, 2001PubMedCrossRef
7.
Zurück zum Zitat Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. In: Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine. Arlington, USA, Nov. 2000, pp 250–255 Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. In: Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine. Arlington, USA, Nov. 2000, pp 250–255
8.
Zurück zum Zitat Stallings W: Cryptography and Network Security—Principles and Practice. Prentice-Hall, Englewood Cliffs, 1999 Stallings W: Cryptography and Network Security—Principles and Practice. Prentice-Hall, Englewood Cliffs, 1999
10.
Zurück zum Zitat Digital Imaging and Communications in Medicine (DICOM): part 15: security profiles ed., National Electrical Manufacturers Association (NEMA), 2001, pS 3.15–2001 Digital Imaging and Communications in Medicine (DICOM): part 15: security profiles ed., National Electrical Manufacturers Association (NEMA), 2001, pS 3.15–2001
11.
Zurück zum Zitat Cox IJ, Miller ML, Bloom JA: Digital Watermarking. Morgan Kaufmann, San Francisco, 2002, pp 26–36 Cox IJ, Miller ML, Bloom JA: Digital Watermarking. Morgan Kaufmann, San Francisco, 2002, pp 26–36
12.
Zurück zum Zitat Hartung F, Kutter M: Multimedia watermarking techniques. In: Proc. IEEE, vol. 87, no. 7, pp 1069–1107, July 2006 Hartung F, Kutter M: Multimedia watermarking techniques. In: Proc. IEEE, vol. 87, no. 7, pp 1069–1107, July 2006
13.
Zurück zum Zitat Coatrieux G, Lecornu L, Sankur B, Roux Ch: A review of image watermarking applications in healthcare. Porc. of IEEE-EMBC Conf., New York, USA, 2006, pp 4691–4694 Coatrieux G, Lecornu L, Sankur B, Roux Ch: A review of image watermarking applications in healthcare. Porc. of IEEE-EMBC Conf., New York, USA, 2006, pp 4691–4694
14.
Zurück zum Zitat Coatrieux G, Quantin C, Montagner J, Fassa M, Allaert FA, Roux Ch: “Watermarking medical images with anonymous patient identification to verify authenticity,” Studies Health Technol. Inf 136:667–672, 2008 Coatrieux G, Quantin C, Montagner J, Fassa M, Allaert FA, Roux Ch: “Watermarking medical images with anonymous patient identification to verify authenticity,” Studies Health Technol. Inf 136:667–672, 2008
15.
Zurück zum Zitat Coatrieux G, Maitre H, Sankur B: Strict integrity control of biomedical images. In: Proc. SPIE Security Watermarking Multimedia Contents III, SPIE 2001, vol. 4314, San Jose, CA January 2001, pp 229–240 Coatrieux G, Maitre H, Sankur B: Strict integrity control of biomedical images. In: Proc. SPIE Security Watermarking Multimedia Contents III, SPIE 2001, vol. 4314, San Jose, CA January 2001, pp 229–240
16.
Zurück zum Zitat Chao H, Hsu C, Miaou S: A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6(1):46–53, 2002PubMedCrossRef Chao H, Hsu C, Miaou S: A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6(1):46–53, 2002PubMedCrossRef
17.
Zurück zum Zitat Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20(8):784–791, 2001PubMedCrossRef Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20(8):784–791, 2001PubMedCrossRef
18.
Zurück zum Zitat De Vleeschouwer C, Delaigle J, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimed 5:97–105, 2003CrossRef De Vleeschouwer C, Delaigle J, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimed 5:97–105, 2003CrossRef
19.
Zurück zum Zitat Tan C, Ng C, Xu X, Poh C, Yong L, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540, 2011PubMedCentralPubMedCrossRef Tan C, Ng C, Xu X, Poh C, Yong L, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540, 2011PubMedCentralPubMedCrossRef
20.
21.
Zurück zum Zitat Alattar A: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13:1147–1156, 2004PubMedCrossRef Alattar A: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13:1147–1156, 2004PubMedCrossRef
22.
Zurück zum Zitat Thodi D, Rodríguez J: Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721–730, 2007PubMedCrossRef Thodi D, Rodríguez J: Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721–730, 2007PubMedCrossRef
23.
Zurück zum Zitat Celik M, Sharma G, Tekalp M, Saber E: Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253–266, 2005PubMedCrossRef Celik M, Sharma G, Tekalp M, Saber E: Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253–266, 2005PubMedCrossRef
24.
Zurück zum Zitat Celik MU M, Sharma G, Tekalp A: Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15:1042–1049, 2006PubMedCrossRef Celik MU M, Sharma G, Tekalp A: Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15:1042–1049, 2006PubMedCrossRef
25.
Zurück zum Zitat Zhou Z, Huang H, Liu B: Digital signature embedding (DSE) for medical image integrity in a data grid off-site backup archive. Proc SPIE 5748:306–317, 2005CrossRef Zhou Z, Huang H, Liu B: Digital signature embedding (DSE) for medical image integrity in a data grid off-site backup archive. Proc SPIE 5748:306–317, 2005CrossRef
26.
Zurück zum Zitat Liew S, Zain J: Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555–566, 2011CrossRef Liew S, Zain J: Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555–566, 2011CrossRef
27.
Zurück zum Zitat Liew S, Way S, Zain J: Tamper localization and lossless recovery watermarking scheme with ROI Segmentation and Multilevel Authentication. J Digit Imaging 24:114–125, 2012 Liew S, Way S, Zain J: Tamper localization and lossless recovery watermarking scheme with ROI Segmentation and Multilevel Authentication. J Digit Imaging 24:114–125, 2012
28.
Zurück zum Zitat Osamah M, Khoo B: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24:114–125, 2011CrossRef Osamah M, Khoo B: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24:114–125, 2011CrossRef
29.
Zurück zum Zitat Guo X, Zhuang T: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620–628, 2009PubMedCentralPubMedCrossRef Guo X, Zhuang T: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620–628, 2009PubMedCentralPubMedCrossRef
Metadaten
Titel
Secured Telemedicine Using Region-Based Watermarking with Tamper Localization
verfasst von
Ali Al-Haj
Alaa’ Amer
Publikationsdatum
01.12.2014
Verlag
Springer US
Erschienen in
Journal of Imaging Informatics in Medicine / Ausgabe 6/2014
Print ISSN: 2948-2925
Elektronische ISSN: 2948-2933
DOI
https://doi.org/10.1007/s10278-014-9709-9

Weitere Artikel der Ausgabe 6/2014

Journal of Digital Imaging 6/2014 Zur Ausgabe

Update Radiologie

Bestellen Sie unseren Fach-Newsletter und bleiben Sie gut informiert.