Skip to main content
Top
Published in: Journal of Digital Imaging 3/2011

01-06-2011

Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability

Authors: Chun Kiat Tan, Jason Changwei Ng, Xiaotian Xu, Chueh Loo Poh, Yong Liang Guan, Kenneth Sheah

Published in: Journal of Imaging Informatics in Medicine | Issue 3/2011

Login to get access

Abstract

Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent patient information are transmitted across public networks, such as the Internet. Health mandates such as the Health Insurance Portability and Accountability Act require healthcare providers to adhere to security measures in order to protect sensitive patient information. This paper presents a fully reversible, dual-layer watermarking scheme with tamper detection capability for medical images. The scheme utilizes concepts of public-key cryptography and reversible data-hiding technique. The scheme was tested using medical images in DICOM format. The results show that the scheme is able to ensure image authenticity and integrity, and to locate tampered regions in the images.
Literature
2.
go back to reference Digital Imaging and Communications in Medicine (DICOM), part 15: security profiles ed., National Electrical Manufacturers Association (NEMA), 2001, pS 3.15–2001 Digital Imaging and Communications in Medicine (DICOM), part 15: security profiles ed., National Electrical Manufacturers Association (NEMA), 2001, pS 3.15–2001
3.
go back to reference Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. Proc IEEE EMBS Information Technology Applications in Biomedicine. Arlington, VA 2000, pp 250–255 Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. Proc IEEE EMBS Information Technology Applications in Biomedicine. Arlington, VA 2000, pp 250–255
4.
go back to reference Zain JM, Fauzi AM, Aziz AA: Clinical evaluation of watermarked medical images. Proc EMBS 28th Annual International Conference of the IEEE 5459–5462, New York, USA, August 30–Sept. 3, 2006 Zain JM, Fauzi AM, Aziz AA: Clinical evaluation of watermarked medical images. Proc EMBS 28th Annual International Conference of the IEEE 5459–5462, New York, USA, August 30–Sept. 3, 2006
5.
go back to reference Wang XY, Feng DG, Lai XJ, Yu HB: Collisions for hash functions MD4, MD5 HAVAL-128 and RIPEMD. Rump session of Crypto’04 and IACR Eprint archive, 2004 Wang XY, Feng DG, Lai XJ, Yu HB: Collisions for hash functions MD4, MD5 HAVAL-128 and RIPEMD. Rump session of Crypto’04 and IACR Eprint archive, 2004
6.
go back to reference Kaminsky D: MD5 to be considered harmful someday CryptologyePrint Archive, 2004 Kaminsky D: MD5 to be considered harmful someday CryptologyePrint Archive, 2004
7.
go back to reference Coatrieux G, Lamard M, Daccache W, Puentes W, Roux C: A low distortion and reversible watermark: application to angiographic images of the retina. Proc IEEE-EMBS Eng in Med Biol Soc 2224–2227, 2005 Coatrieux G, Lamard M, Daccache W, Puentes W, Roux C: A low distortion and reversible watermark: application to angiographic images of the retina. Proc IEEE-EMBS Eng in Med Biol Soc 2224–2227, 2005
8.
go back to reference Miller ML, Cox IJ, Linnartz JPMG, and Kalker T: A review of watermarking principles and practices. Digital Signal Processing for Multimedia Systems, IEEE 461–485, 1999 Miller ML, Cox IJ, Linnartz JPMG, and Kalker T: A review of watermarking principles and practices. Digital Signal Processing for Multimedia Systems, IEEE 461–485, 1999
9.
go back to reference Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imag 20(8):784–791, 2001CrossRef Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imag 20(8):784–791, 2001CrossRef
10.
go back to reference Macq B and Dewey F: Trusted headers for medical images. DFG VIII-DII Watermarking Workshop, Erlangen, Germany, 1999 Macq B and Dewey F: Trusted headers for medical images. DFG VIII-DII Watermarking Workshop, Erlangen, Germany, 1999
11.
go back to reference Guo X, Zhuang TG: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 2008 Guo X, Zhuang TG: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 2008
12.
go back to reference Guo X, Zhuang TG: A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64, 2009PubMedCrossRef Guo X, Zhuang TG: A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64, 2009PubMedCrossRef
13.
go back to reference Wu JHK, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon WK, Chen DR: Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76, 2008PubMedCrossRef Wu JHK, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon WK, Chen DR: Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76, 2008PubMedCrossRef
14.
go back to reference Vleeschouwer CD, Delaigle J-F, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. Multimedia, IEEE Transactions on 5(1):97–105, 2003 Vleeschouwer CD, Delaigle J-F, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. Multimedia, IEEE Transactions on 5(1):97–105, 2003
15.
go back to reference Fridrich J, Goljan M, Du R: Lossless data embedding—new paradigm in digital watermarking. EURASIP J Applied Signal Processing 2002(2):185–196, 2002CrossRef Fridrich J, Goljan M, Du R: Lossless data embedding—new paradigm in digital watermarking. EURASIP J Applied Signal Processing 2002(2):185–196, 2002CrossRef
16.
go back to reference Diffie W, Hellman M: New directions in cryptography. IEEE Trans Inf Theory 22:644–654, 1976CrossRef Diffie W, Hellman M: New directions in cryptography. IEEE Trans Inf Theory 22:644–654, 1976CrossRef
17.
go back to reference Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120–126, 1978CrossRef Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120–126, 1978CrossRef
21.
go back to reference Cao F, Huang HK, Zhou XQ: Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196, 2003PubMedCrossRef Cao F, Huang HK, Zhou XQ: Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196, 2003PubMedCrossRef
Metadata
Title
Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability
Authors
Chun Kiat Tan
Jason Changwei Ng
Xiaotian Xu
Chueh Loo Poh
Yong Liang Guan
Kenneth Sheah
Publication date
01-06-2011
Publisher
Springer-Verlag
Published in
Journal of Imaging Informatics in Medicine / Issue 3/2011
Print ISSN: 2948-2925
Electronic ISSN: 2948-2933
DOI
https://doi.org/10.1007/s10278-010-9295-4

Other articles of this Issue 3/2011

Journal of Digital Imaging 3/2011 Go to the issue