Open Access Open Access  Restricted Access Subscription Access

Enhancing Security in Medical Image Informatics using Geometrical Attacks


Affiliations
1 DMI College of Engineering, Chennai 600 123, India
 

The objective of this study is to provide security to medical images by embedding medical data (electronic patient record; EPR) along with the images to reduce the bandwidth during communication. Reversible watermarking and digital signature, will provide high security. This application is mainly used in telesurgery. Only the authorized medical experts can explore a patient’s image because of the use of the authentication Kerberos. The proposed study is mainly to restrict unauthorized access to patients’ data. Hence medical image authentication may be achieved without biometric recognition such as finger prints, eye stamps, etc. Since the EPR itself contains a patient’s entire history, after the extraction process medical experts can identify the patient and also the disease information. In future we can embed the EPR inside the medical image after encryption to enhance security. To improve the authentication, medical expert biometric information can be embedded inside the image in the future. Experiments were conducted using more than 500 (512 × 512) image archives in various modalities from the National Institutes of Health, USA, and Aycan sample digital images downloaded from the internet. Almost all images with greater than 15,000 bits showed 60.4–78.9 dB PSNR value with less alteration in the restored image because of compression, not of watermarking, and the average (number of pixels change rate) was 98.9%.

Keywords

Reversible Watermarking, Digital Signature, Medical Image Compression, Security Enhancement.
User
Notifications
Font Size

  • Komatsu, N. and Tominaga, H., A proposal on digital watermark in document image communication and its application to realizing a signature. Trans. Inst. Electron. Inf. Commun. Eng., 1990, 73(5), 22–33.
  • Lehmann, T. et al., Content based image retrieval in medical applications. Methods Inf. Med., 2004, 43(4), 354–361.
  • Osbarne, D., Rogers, D., Muzumdar, J., Coutts, R. and Abbott, D., An overview of wavelets for image processing for wireless applications. In Proceedings of SPIE Smart Structures Devices and Systems, University of Melbourne, Australia, 2009, vol. 4935, pp. 427–435.
  • Pan, W., Coatrieux, G., Cuppens Boulahia, N., Cuppens, F. and Roux, Ch., Medical image integrity control combining digital signature and lossless watermarking. Lecture Notes Comput. Sci., 2009, 5939, 153–162.
  • Umamageswari, A. and Suresh, G. R., Security in medical image communication with Arnold’s cat map method and reversible watermarking. In Proceedings of IEEE International Conference on Circuits Power and Computing Technologies, Noorul Islam University, Nagercoil, 21–22 March 2013, pp. 1116–1121.
  • Micheal, W. Marcellin, Micheal, J., Garmish, Ali Bilginand Martin Bolick, P., An overview of JPEG2000. In Proceedings of IEEE Data Compression Conference, Snowbird, UT, USA, 2009, pp. 523–541.
  • Miaou, S.-G., Ke, F.-S. and Chen, S.-C., A lossless compression method for medical image sequences using JPEG-LS and interframe coding. IEEE Trans. Inf. Technol. Biomed., 2005, 13(2), 236–251.
  • Padmaja, G. M. and Nirupama, P., Analysis of various image compression techniques. ARPN J. Sci. Technol., 2009, 2(4), 371–376.
  • Feng, J.-B., Lin, I.-C., Tsai, C.-S. and Chu, Y.-P., Reversible watermarking: current status and key issues. Int. J. Network Security, 2006, 2(3), 161–170.
  • Lin, C. Y. and Chang, C. F., A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol., 2004, 11(2), 153–168.
  • Moniruzzaman, M., Hawlader, M. A. K. and Hossain, M. F., An image fragile watermarking scheme based on chaotic system for image tamper detection. In IEEE International Conference on Informatics, Electronics and Vision, Kitakyushu, Fukuoka, Japan, 2014, pp. 1–6.
  • Shih, F. Y. and Wu, Y. T., Robust watermarking and compression for medical images based on genetic algorithms. J. Inf. Sci., 2005, 175(3), 200–216.
  • Coatrieux, G., Sankur, B. and Maitre, H., Strict integrity control of biomedical images. In Proceedings of Electronic Imaging, Security and Watermarking of Multimedia Contents, SPIE, USA, 2001, pp. 229–240.
  • Wakatani, A., Digital watermarking for ROI medical images by using compressed signature image. In 35th Annual Hawaii International Conference on System Sciences, Computer Society Washington, DC, USA, 2002, pp. 2043–2048.
  • Gilbert, H. and Schuh, H. H., Security analysis of SHA-256 and Sisters, Selected Areas in Cryptography, 2003, pp. 175–193.
  • Rivest, R., Shamir, A. and Adleman, A., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM Trans., 1978, 21(2), 120–126.
  • Zain, J. M., Baldwin, M. P. and Clarke, M., Reversible watermarking for the authentication of DICOM images. In Proceedings of 26th IEEE Engineering in Medicine and Biology Society, EMBS Annual International Conference, San Fransico, USA, 2004, pp. 3237–3240.
  • Zain, J. M., Fauzi, A. R. M. and Aziz. A. A., Clinical assessment of watermarked medical images. J. Comput. Sci., 2009, 5(11), 857–863.
  • Kundu, M. K. and Das, S., Lossless ROI medical image watermarking technique with enhanced security and high payload embedding. In Proceedings of the 20th International Conference on Pattern Recognition, 2010, pp. 1457–1460.
  • Memon, N. A., Gilani, S. A. M. and Ali, A., Watermarking of chest CT scan medical images for content authentication. In Proceedings of the International Conference on Information and Communication Technologies, Karachi, Pakistan, 2009, pp. 175–180.
  • Li-Qun, K., Yuan, Z. and Xie, H., A medical image authentication system based on reversible digital watermarking. In Proceedings of the International Conference on Information Science and Engineering, Qatar University, Doha, Qatar, 2004, pp. 1047–1050.
  • Badran. E. F., Sharkas, M. A. and Attallah. O. A., Multiple watermark embedding scheme in wavelet spatial domains based on ROI of medical images. In National Radio Science Conference, New Cairo, Egypt, 17–19 March 2009, pp. 1–8.
  • Nambakhsh, M. S., Ahmadian, A., Ghavami, M., Dilmaghani, R. S. and Karimi Fard, S., A novel blind watermarking of ECG signals on medical images using EZW algorithm. In Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS, New York City, USA, 2006, pp. 3274–3277.
  • Zhang, C., Wang, J. and Wang, X., Digital image watermarking with double encryption by Arnold transform and logistic. In Fourth International Conference on Networked Computing and Advanced Information Management, Seoul, South Korea, 2008, pp. 329–334.
  • Stallings, W., Cryptography and Network Security, 2010.
  • Guo, X. and Zhuang, T., A lossless watermarking scheme for enhancing security of medical data in PACS, medical imaging PACS and integrated medical information systems design and evaluation. The International Society for Optical Engineering, San Diego, CA, USA, 2003, pp. 350–359.
  • Tian, J., Reversible data embedding using a difference of expansion. IEEE Trans. Circuits Syst. Video Technol., 2008, 13(8), 890– 896.
  • Coatrieux, G., le Guillou, C., Cauvin, J. and Roux, Ch., Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans. Inf. Technol. Biomed., 2009, 13(2), 158–165.
  • Kaur, S., Kaur, S. and Singh, B., Data hiding technique for secure transmission of medical images. Int. J. Innov. Res. Adv. Eng., 2014, 1(8), 157–162.
  • Sharma, A., Singh, A. K. and Ghrera, S. P., Secure hybrid robust watermarking technique for medical images. Proc. Comput. Sci., 2015, 70(1), 778–784.
  • Bhardwaj, R. and Khanna, D., Enhancing the security of image steganography through image encryption. In Proceedings of the Annual IEEE India Conference, Delhi, 2015, pp. 1–4.

Abstract Views: 355

PDF Views: 111




  • Enhancing Security in Medical Image Informatics using Geometrical Attacks

Abstract Views: 355  |  PDF Views: 111

Authors

A. Umamageswari
DMI College of Engineering, Chennai 600 123, India
M. A. Leo Vijilious
DMI College of Engineering, Chennai 600 123, India

Abstract


The objective of this study is to provide security to medical images by embedding medical data (electronic patient record; EPR) along with the images to reduce the bandwidth during communication. Reversible watermarking and digital signature, will provide high security. This application is mainly used in telesurgery. Only the authorized medical experts can explore a patient’s image because of the use of the authentication Kerberos. The proposed study is mainly to restrict unauthorized access to patients’ data. Hence medical image authentication may be achieved without biometric recognition such as finger prints, eye stamps, etc. Since the EPR itself contains a patient’s entire history, after the extraction process medical experts can identify the patient and also the disease information. In future we can embed the EPR inside the medical image after encryption to enhance security. To improve the authentication, medical expert biometric information can be embedded inside the image in the future. Experiments were conducted using more than 500 (512 × 512) image archives in various modalities from the National Institutes of Health, USA, and Aycan sample digital images downloaded from the internet. Almost all images with greater than 15,000 bits showed 60.4–78.9 dB PSNR value with less alteration in the restored image because of compression, not of watermarking, and the average (number of pixels change rate) was 98.9%.

Keywords


Reversible Watermarking, Digital Signature, Medical Image Compression, Security Enhancement.

References





DOI: https://doi.org/10.18520/cs%2Fv117%2Fi3%2F412-421