Secure Sharing of Medical Images using Watermarking Technique (original) (raw)
Related papers
A Secure Medical Image Watermarking Technique for E-Healthcare Applications
2019
The rapid rise in the exchange of the medical information for remote/continuous diagnosis via internet using different software’s and digital gadgets has ensured better health monitoring. This exchange, however, has given rise to many security issues which may occur due to noise in communication channels, mishandling of devices or unauthorized tempering. Thus, there is need of ensuring privacy, data integrity and copyright protection in order to provide better technological efficiency. For securing medical content digital watermarking techniques have proved to provide better solutions. In this chapter an efficient watermarking technique is proposed for exchanging patient information in an e-healthcare system. A robust watermarking technique using Singular Value Decomposition (SVD) for embedding the secret logo in the transform domain coefficients is presented. The hybrid combination of Discrete Cosine Transform (DCT) and SVD ensures very high robustness of the watermark and hence is...
Egyptian Informatics Journal, 2013
Nowadays; modern Hospital Data Management Systems (HDMSs) are applied in a computer network; in addition medicinal equipments produce medical images in a digital form. HDMS must store and exchange these images in a secured environment to provide image integrity and patient privacy. The reversible watermarking techniques can be used to provide the integrity and the privacy. In this paper, a security technique based on watermarking and encryption is proposed to be used for Digital Imaging and Communications in Medicine (DICOM). It provides patient authentication, information confidentiality and integrity based on reversible watermark. To achieve integrity service at the sender side; a hash value based on encrypted MD5 is determined from the image. And to satisfy the reversible feature; R-S-Vector is determined from the image and is compressed based on a Huffman compression algorithm. After that to provide confidentiality and authentication services: the compressed R-S-Vector, the hash value and patient ID are concatenated to form a watermark then this watermark is encrypted using AES encryption technique, finally the watermark is embedded inside the medical image. Experimental results prove that the proposed technique can provide patient authentication services, image integrity service and information confidentiality service with excellent efficiency. Concluded results for all tested DICOM medical images and natural images show the following: BER equals 0, both of SNR and PSNR are consistent and have large values, and MSE has low value; the average values of SNR, PSNR and MSE are 52 dB, 57 dB and 0.12 respectively. Therefore, watermarked images have high imperceptibility, invisibility and transparency. In addition, the watermark extracted from the image at the
New Watermarking/Encryption Method for Medical Images Full Protection in m-Health
International Journal of Electrical and Computer Engineering (IJECE), 2017
In this paper, we present a new method for medical images security dedicated to m-Health based on a combination between a novel semi reversible watermarking approach robust to JPEG compression, a new proposed fragile watermarking and a new proposed encryption algorithm. The purpose of the combination of these three proposed algorithms (encryption, robust and fragile watermarking) is to ensure the full protection of medical image, its information and its report in terms of confidentiality and reliability (authentication and integrity). A hardware implementation to evaluate our system is done using the Texas instrument C6416 DSK card by converting m-files to C/C++ using MATLAB coder. Our m-health security system is then run on the android platform. Experimental results show that the proposed algorithm can achieve high security with good performance.
Review of Image Watermarking Technique for Medical Images
— in this article, we focus on the complementary role of watermarking with respect to medical information security (integrity, authenticity …) and management. We review sample cases where watermarking has been deployed. We conclude that watermarking has found a niche role in healthcare systems, as an instrument for protection of medical information, for secure sharing and handling of medical images. The concern of medical experts on the preservation of documents diagnostic integrity remains paramount. Medical image watermarking is an appropriate method used for enhancing security and authentication of medical data, which is crucial and used for further diagnosis and reference. This paper discusses the available medical image watermarking methods for protecting and authenticating medical data. The paper focuses on algorithms for application of watermarking technique on Region of Non Interest (RONI) of the medical image preserving Region of Interest (ROI).
A Methodological Evaluation of Crypto-Watermarking System for Medical Images
Cloud Computing Systems and Applications in Healthcare
Health care institution demands exchange of medical images of number of patients to sought opinions from different experts. In order to reduce storage and for secure transmission of the medical images, Crypto-Watermarking techniques are adopted. The system is considered to be combinations of encryption technique with watermarking or steganography means adopted for safe transfer of medical images along with embedding of optional medical information. The Digital Watermarking is the process of embedding data to multimedia content. This can be done in spatial as well as frequency domain of the cover image to be transmitted. The robustness against attacks is ensured while embedding the encrypted data into transform domain, the encrypted data can be any secret key for the content recovery or patient record or the image itself. This chapter presents basic aspects of crypto-watermarking technique, as an application. It gives a detailed assessment on different approaches of crypto-watermarki...
New Watermarking/Encryption Method for Medical Imaging FULL Protection in m-Health
International Journal of Electrical and Computer Engineering (IJECE), 2017
In this paper, we present a new method for medical images security dedicated to m-Health based on a combination between a novel semi reversible watermarking approach robust to JPEG compression, a new proposed fragile watermarking and a new proposed encryption algorithm. The purpose of the combination of these three proposed algorithms (encryption, robust and fragile watermarking) is to ensure the full protection of medical image, its information and its report in terms of confidentiality and reliability (authentication and integrity). A hardware implementation to evaluate our system is done using the Texas instrument C6416 DSK card by converting m-files to C/C++ using MATLAB coder. Our m-health security system is then run on the android platform. Experimental results show that the proposed algorithm can achieve high security with good performance.
Secure Sharing of Medical Information in Watermarked Image through Telemedicine using PKI Technique
International Journal of Computer Applications, 2014
Security is the fundamental requirement for an information society in the distributed network environment. A watermark is a secret message that is embedded into a cover message. Digital watermarks are used to verify the authenticity of the carrier signal for the identity of the owners. In order to provide data integrity, confidentiality and authentication various techniques are available like cryptography, steganography and watermarking. To protect the patient information in telemedicine, watermarking is mainly used. Patient information is embedded within the cover medical image. Digital Imaging & Communications in Medicine is an universal standard of communication for secured medical images. In the proposed technique, to provide authentication the hash value will be generated using SHA and the Huffman compression algorithm(R-S vector) will be used to shrink the size of an image. With the patient information the medical image is protected through Public key cryptography in a secure manner. Compared to the previous system, the proposed technique is more efficient. The original image is completely restored without any loss at the receiver side. The patient information is hidden (protected) from the hackers during transmission.
International Journal of Image, Graphics and Signal Processing, 2014
In this paper a new type of information hiding skill in biomedical images is proposed through a combination of cryptography and digital watermarking to achieve the enhancement in confidential and authenticated data storage and secured transmission. Here patient's name and doctor's name are considered as patient's information which is encrypted using cryptography and embedded in the scan image of that patient through watermarking. RSA algorithm is used for encryption and higher order bit LSB replacement technique is used for embedding the information. The private keys are also embedded in the cover image to have better security and accurate recovery of the hidden information. The outcome of the proposed methodology shows that the hidden information doesn't affect the cover image and it can be recovered efficiently even from several noisy images. The strength of the proposed embedding scheme is also supported by several image quality matrices.
Advanced watermarking technique to improve medical images' security
TELKOMNIKA Telecommunication Computing Electronics and Control, 2019
Advances in imaging technology have made medical images become one of the important sources for information in supporting accurate diagnoses and treatment decisions by doctors for their patients. However, the vulnerability of medical images' security is high. The images can be easily 'attacked', which altered their information that can lead to incorrect diagnoses or treatment. In order to make the images less vulnerable from outside attacks, this study proposes to secure them by advancing the watermarking using dual-layer fragile technique. It is expected that this dual-layer fragile watermarking will guarantee the integrity, authenticity, and confidentiality of patient's and any other important information and also the pixel data of the medical images. The work in this study implements two LSBs of image where the role of the first LSB is as a tamper detector, and the second LSB is used to store patient's and any other important information. Medical images of four deadliest diseases in Indonesia were used to test the proposed watermarking technique. Results from the conducted tests show that the proposed technique able to generate a watermarked image that has no noticeable changes compared to its original image, with PSNR value more than 44 dB and SSIM value of almost 1, where the tamper detector can correctly detect and localize any tampering on the watermarked image. Furthermore, the proposed technique has shown to have a higher level of security on medical images, compared to DICOM standard and standard watermarking method.
Combining Cryptography and Digital Watermarking for Secured Transmission of Medical Images
Telemedicine has increased the number of ways in which healthcare can be delivered across places and countries instead of requiring the provider and the recipient to be present in the same place. One application of telemedicine is the exchange of medical images between remotely located healthcare entities. However, a maj or obstacle telemedicine faces is providing confidentiality, integrity, and authenticity to transmitted medical images. In this paper, we propose a hybrid algorithm which combines encryption and digital watermarking techniques in order to provide the required authenticity and integrity services. A cryptographic watermark and the patient's data are hidden in the cover image before being transmitted over vulnerable public networks. On the receiver's side, the watermarked image is handled by the extraction procedure in order to extract the cryptographic watermarks and the embedded medical data. The proposed algorithm was tested and evaluated using medical images of two different modalities. The experimental results demonstrate the effectiveness of the proposed algorithm.