Skip to main content
Top
Published in: BMC Medical Informatics and Decision Making 14/2020

Open Access 01-12-2020 | Research

A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology

Authors: Jian Li, Zelin Zhang, Shengyu Li, Ryan Benton, Yulong Huang, Mohan Vamsi Kasukurthi, Dongqi Li, Jingwei Lin, Glen M. Borchert, Shaobo Tan, Gang Li, Bin Ma, Meihong Yang, Jingshan Huang

Published in: BMC Medical Informatics and Decision Making | Special Issue 14/2020

Login to get access

Abstract

Background

Medical image data, like most patient information, have a strong requirement for privacy and confidentiality. This makes transmitting medical image data, within an open network, problematic, due to the aforementioned issues, along with the dangers of data/information leakage. Possible solutions in the past have included the utilization of information-hiding and image-encryption technologies; however, these methods can cause difficulties when attempting to recover the original images.

Methods

In this work, we developed an algorithm for protecting medical image key regions. Coefficient of variation is first employed to identify key regions, a.k.a. image lesion areas; then additional areas are processed as blocks and texture complexity is analyzed. Next, our novel reversible data-hiding algorithm embeds lesion area contents into a high-texture area, after which an Arnold transformation is utilized to protect the original lesion information. After this, we use image basic information ciphertext and decryption parameters to generate a quick response (QR) code used in place of original key regions.

Results

The approach presented here allows for the storage (and sending) of medical image data within open network environments, while ensuring only authorized personnel are able to recover sensitive patient information (both image and meta-data) without information loss.

Discussion

Peak signal to noise ratio and the Structural Similarity Index measures show that the algorithm presented in this work can encrypt and restore original images without information loss. Moreover, by adjusting the threshold and the Mean Squared Error, we can control the overall quality of the image: the higher the threshold, the better the quality and vice versa. This allows the encryptor to control the amount of degradation as, at appropriate amounts, degradation aids in the protection of the image.

Conclusions

As shown in the experimental results, the proposed method allows for (a) the safe transmission and storage of medical image data, (b) the full recovery (no information loss) of sensitive regions within the medical image following encryption, and (c) meta-data about the patient and image to be stored within and recovered from the public image.
Literature
1.
go back to reference Satoh H, Niki N, Eguchi K, Ohmatsu H, Kusumoto M, Kaneko M, Moriyama N. Teleradiology network system on cloud using the web medical image conference system with a new information security solution. In: SPIE medical imaging, vol. 8674. Lake Buena Vista (Orlando Area): SPIE; 2013. Satoh H, Niki N, Eguchi K, Ohmatsu H, Kusumoto M, Kaneko M, Moriyama N. Teleradiology network system on cloud using the web medical image conference system with a new information security solution. In: SPIE medical imaging, vol. 8674. Lake Buena Vista (Orlando Area): SPIE; 2013.
2.
go back to reference Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K. Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst. 2018;42(11):208.CrossRef Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K. Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst. 2018;42(11):208.CrossRef
3.
go back to reference Wang C, Wang X, Xia Z, Zhang C. Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci. 2019;470:109–20.CrossRef Wang C, Wang X, Xia Z, Zhang C. Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci. 2019;470:109–20.CrossRef
5.
go back to reference Ma B, Wang X, Li Q, Li B, Li J, Wang C, Shi Y. Adaptive error prediction method based on multiple linear regression for reversible data hiding. J Real-Time Image Proc. 2019;16(4):821–34.CrossRef Ma B, Wang X, Li Q, Li B, Li J, Wang C, Shi Y. Adaptive error prediction method based on multiple linear regression for reversible data hiding. J Real-Time Image Proc. 2019;16(4):821–34.CrossRef
6.
go back to reference Ma B, Li B, Wang X-Y, Wang C-P, Li J, Shi Y-Q. A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images. J Real-Time Image Process. 2019a;16(4):857–69.CrossRef Ma B, Li B, Wang X-Y, Wang C-P, Li J, Shi Y-Q. A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images. J Real-Time Image Process. 2019a;16(4):857–69.CrossRef
7.
go back to reference Ma B, Li B, Wang X-Y, Wang C, Li J, Shi YQ. Code division multiplexing and machine learning based reversible data hiding scheme for medical image. Secur Commun Netw. 2019b;2019:1–9. Ma B, Li B, Wang X-Y, Wang C, Li J, Shi YQ. Code division multiplexing and machine learning based reversible data hiding scheme for medical image. Secur Commun Netw. 2019b;2019:1–9.
8.
go back to reference Shi Y, Li X, Zhang X, Wu H, Ma B. Reversible data hiding: advances in the past two decades. IEEE Access. 2016;4:3210–37.CrossRef Shi Y, Li X, Zhang X, Wu H, Ma B. Reversible data hiding: advances in the past two decades. IEEE Access. 2016;4:3210–37.CrossRef
9.
go back to reference Ma B, Shi YQ. A reversible data hiding scheme based on code division multiplexing. IEEE Trans Inf Forensics Secur. 2016;11(9):1914–27.CrossRef Ma B, Shi YQ. A reversible data hiding scheme based on code division multiplexing. IEEE Trans Inf Forensics Secur. 2016;11(9):1914–27.CrossRef
10.
go back to reference Gurusamy R, Subramaniam V. A machine learning approach for MRI brain tumor classification. Comput Mater Continua. 2017;53:91–109. Gurusamy R, Subramaniam V. A machine learning approach for MRI brain tumor classification. Comput Mater Continua. 2017;53:91–109.
11.
go back to reference Celik MU, Sharma G, Tekalp AM, Saber E. Lossless generalized-lSB data embedding. IEEE Trans Image Process. 2005;14(2):253–66.CrossRef Celik MU, Sharma G, Tekalp AM, Saber E. Lossless generalized-lSB data embedding. IEEE Trans Image Process. 2005;14(2):253–66.CrossRef
12.
go back to reference Jun T. Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol. 2003;13(8):890–6.CrossRef Jun T. Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol. 2003;13(8):890–6.CrossRef
13.
go back to reference Zhicheng N, Yun-Qing S, Ansari N, Wei S. Reversible data hiding. IEEE Trans Circuits Syst Video Technol. 2006;16(3):354–62.CrossRef Zhicheng N, Yun-Qing S, Ansari N, Wei S. Reversible data hiding. IEEE Trans Circuits Syst Video Technol. 2006;16(3):354–62.CrossRef
14.
go back to reference Kumar CV, Natarajan V, Bhogadi D. High capacity reversible data hiding based on histogram shifting for medical images. In: 2013 international conference on communication and signal processing: 3–5 April 2013; Tamilnadu; 2013, p. 730–3. Kumar CV, Natarajan V, Bhogadi D. High capacity reversible data hiding based on histogram shifting for medical images. In: 2013 international conference on communication and signal processing: 3–5 April 2013; Tamilnadu; 2013, p. 730–3.
15.
go back to reference Yang Y, Zhang W, Yu N. Improving visual quality of reversible data hiding in medical image with texture area contrast enhancement. In: 2015 international conference on intelligent information hiding and multimedia signal processing (IIH-MSP): 23–25 Sept 2015; Adelaide; 2015. p. 81–4. Yang Y, Zhang W, Yu N. Improving visual quality of reversible data hiding in medical image with texture area contrast enhancement. In: 2015 international conference on intelligent information hiding and multimedia signal processing (IIH-MSP): 23–25 Sept 2015; Adelaide; 2015. p. 81–4.
16.
go back to reference Wu M, Zhao J, Chen B, Zhang Y, Yu Y, Cheng J. Reversible data hiding based on medical image systems by means of histogram strategy. In: 2018 3rd international conference on information systems engineering (ICISE): 4–6 May 2018; Shanghai; 2018. p. 6–9. Wu M, Zhao J, Chen B, Zhang Y, Yu Y, Cheng J. Reversible data hiding based on medical image systems by means of histogram strategy. In: 2018 3rd international conference on information systems engineering (ICISE): 4–6 May 2018; Shanghai; 2018. p. 6–9.
17.
go back to reference Huang L-C, Tseng L-Y, Hwang M-S. A reversible data hiding method by histogram shifting in high quality medical images. J Syst Softw. 2013;86(3):716–27.CrossRef Huang L-C, Tseng L-Y, Hwang M-S. A reversible data hiding method by histogram shifting in high quality medical images. J Syst Softw. 2013;86(3):716–27.CrossRef
18.
go back to reference Norcen R, Podesser M, Pommer A, Schmidt HP, Uhl A. Confidential storage and transmission of medical image data. Comput Biol Med. 2003;33(3):277–92.CrossRef Norcen R, Podesser M, Pommer A, Schmidt HP, Uhl A. Confidential storage and transmission of medical image data. Comput Biol Med. 2003;33(3):277–92.CrossRef
19.
go back to reference Brahimi Z, Bessalah H, Tarabet A, Kholladi M-K. Selective encryption techniques of JPEG2000 codestream for medical images transmission, vol. 7; 2008. Brahimi Z, Bessalah H, Tarabet A, Kholladi M-K. Selective encryption techniques of JPEG2000 codestream for medical images transmission, vol. 7; 2008.
20.
go back to reference Abdel-Nabi H, Al-Haj A. Medical imaging security using partial encryption and histogram shifting watermarking. In: 2017 8th international conference on information technology (ICIT): 17–18 May 2017; Amman; 2017. p. 802–7. Abdel-Nabi H, Al-Haj A. Medical imaging security using partial encryption and histogram shifting watermarking. In: 2017 8th international conference on information technology (ICIT): 17–18 May 2017; Amman; 2017. p. 802–7.
21.
go back to reference Tiwari S. An introduction to QR code technology. In: 2016 international conference on information technology (ICIT): 22–24 Dec 2016; Bhubaneswar; 2016. p. 39–44. Tiwari S. An introduction to QR code technology. In: 2016 international conference on information technology (ICIT): 22–24 Dec 2016; Bhubaneswar; 2016. p. 39–44.
22.
go back to reference Li J, Zhang Z, Li S, Benton R, Huang Y, Kasukurthi MV, Li D, Lin J, Borchert GM, Tan S et al. Reversible data hiding based key region protection method in medical images. In: 2019 IEEE international conference on bioinformatics and biomedicine (BIBM-19): 2019; San Diego; 2019. p. 1526–30. Li J, Zhang Z, Li S, Benton R, Huang Y, Kasukurthi MV, Li D, Lin J, Borchert GM, Tan S et al. Reversible data hiding based key region protection method in medical images. In: 2019 IEEE international conference on bioinformatics and biomedicine (BIBM-19): 2019; San Diego; 2019. p. 1526–30.
23.
go back to reference Schnev V, Kim HJ, Nam J, Suresh S, Shi YQ. Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol. 2010;5:187–93. Schnev V, Kim HJ, Nam J, Suresh S, Shi YQ. Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol. 2010;5:187–93.
24.
go back to reference Puech W. Image encryption and compression for medical image security. In: International workshops on image processing theory, tools and applications: 23–26 Nov 2008: Sousse; 2008. p. 1–2. Puech W. Image encryption and compression for medical image security. In: International workshops on image processing theory, tools and applications: 23–26 Nov 2008: Sousse; 2008. p. 1–2.
25.
go back to reference Wang XY, Ma B, Li J, Shi Y-Q. Adaptive image reversible data hiding error prediction algorithm based on multiple linear regression. Yingyong Kexue Xuebao/J Appl Sci. 2018;36(2):362–70. Wang XY, Ma B, Li J, Shi Y-Q. Adaptive image reversible data hiding error prediction algorithm based on multiple linear regression. Yingyong Kexue Xuebao/J Appl Sci. 2018;36(2):362–70.
26.
go back to reference Veena VK, Lal GJ, Prabhu SV, Kumar SS, Soman KP. A robust watermarking method based on compressed sensing and Arnold scrambling. In: 2012 international conference on machine vision and image processing (MVIP): 14–15 Dec 2012. p. 105–8. Veena VK, Lal GJ, Prabhu SV, Kumar SS, Soman KP. A robust watermarking method based on compressed sensing and Arnold scrambling. In: 2012 international conference on machine vision and image processing (MVIP): 14–15 Dec 2012. p. 105–8.
27.
go back to reference Feng M-A, Feng B, Shen C. Adaptive image watermarking algorithm based on block DCT transform and Arnold shuffling. J Comput Appl. 2008;28:171–3. Feng M-A, Feng B, Shen C. Adaptive image watermarking algorithm based on block DCT transform and Arnold shuffling. J Comput Appl. 2008;28:171–3.
28.
go back to reference Saha BJ, Pradhan C, Kabi KK, Bisoi AK. Robust watermarking technique using Arnold's transformation and RSA in discrete wavelets. In: 2014 international conference on information systems and computer networks (ISCON): 1–2 Mar 2014; 2014. p. 83–7. Saha BJ, Pradhan C, Kabi KK, Bisoi AK. Robust watermarking technique using Arnold's transformation and RSA in discrete wavelets. In: 2014 international conference on information systems and computer networks (ISCON): 1–2 Mar 2014; 2014. p. 83–7.
29.
go back to reference Arnold VI, Avez A. Ergodic problems of classical mechanics. New York: Benjamin; 1970. Arnold VI, Avez A. Ergodic problems of classical mechanics. New York: Benjamin; 1970.
30.
go back to reference Yue L, Ju Y, Mingjun L. Recognition of QR code with mobile phones. In: 2008 Chinese control and decision conference: 2–4 July 2008; Yantai; 2008. p. 203–6. Yue L, Ju Y, Mingjun L. Recognition of QR code with mobile phones. In: 2008 Chinese control and decision conference: 2–4 July 2008; Yantai; 2008. p. 203–6.
31.
go back to reference Goel A, Chaudhari K. FPGA implementation of a novel technique for selective image encryption. In: 2016 2nd international conference on frontiers of signal processing (ICFSP): 15–17 Oct 2016 2016; 2016. p. 15–9. Goel A, Chaudhari K. FPGA implementation of a novel technique for selective image encryption. In: 2016 2nd international conference on frontiers of signal processing (ICFSP): 15–17 Oct 2016 2016; 2016. p. 15–9.
Metadata
Title
A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology
Authors
Jian Li
Zelin Zhang
Shengyu Li
Ryan Benton
Yulong Huang
Mohan Vamsi Kasukurthi
Dongqi Li
Jingwei Lin
Glen M. Borchert
Shaobo Tan
Gang Li
Bin Ma
Meihong Yang
Jingshan Huang
Publication date
01-12-2020
Publisher
BioMed Central
DOI
https://doi.org/10.1186/s12911-020-01328-2

Other articles of this Special Issue 14/2020

BMC Medical Informatics and Decision Making 14/2020 Go to the issue