Abstract
To protect the privacy of medical images, as well as the patient personal information associated with it, this paper proposes a reversible data hiding scheme for encrypted medical images; whose reversibility is completely separable by allowing additional data extraction and restoration of the region of interest both from the plaintext and the cipher domain of medical images. To this purpose, the pixels in the image are reordered according to the region of interest selected by the content owner and encrypted with a block cipher in counter mode; to subsequently embed additional data into the encrypted image, such as the patient’s personal information and clinical diagnosis, via less significant bit substitution. Finally, according to the proper key, a legitimate receiver can perform the following tasks: a) Obtain a high visual quality approximate image with respect to the original version by directly decrypting the cryptogram with the encryption key, b) With the data hiding key, the embedded data can be extracted free of any error, either from the encrypted image or its approximate version respectively, and c) In case of having both keys, the embedded data can be extracted and the recovered image with the region of interest fully restored can be obtained without loss of information. The proposed method is suitable for applications where the information security and the management of medical images need to be ensured in terms of reliability, integrity, and confidentiality. Comparison performance with the state of the art is performed, in terms of imperceptibility, capacity and steganalysis.
Similar content being viewed by others
References
Coatrieux G, Maitre H, Sankur B, et al. Relevance of watermarking in medical imaging. Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. 2000;250–5. https://doi.org/10.1109/ITAB.2000.892396.
Coatrieux G, Quantin C, Montagner J, Fassa M, Allaert FA, Roux C. Watermarking medical images with anonymous patient identification to verify authenticity. Stud Health Technol Inform. 2008;136:667–72 (PMID: 18487808).
U.S. Department of Health and Human Services. Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Health Information, https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf2021. Accessed 28 March 2021.
Shi Y, Li X, Zhang X, Wu H, Ma B. Reversible data hiding: Advances in the past two decades. IEEE Access. 2016;4:3210–37. https://doi.org/10.1109/ACCESS.2016.2573308.
Mirsky Y, Mahler T, Shelef I, Elovici YCT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning, Cornell University. 2019. https://arxiv.org/abs/1901.03597.
Zhang X. Reversible Data Hiding in Encrypted Image. IEEE Signal Process Lett. 2011;18(4):255–8. https://doi.org/10.1109/LSP.2011.2114651.
Hong W, Chen T, Wu H. An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. 2012;19:199–202. https://doi.org/10.1109/LSP.2012.2187334.
Zhang X. Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security. 2012;7:826–32. https://doi.org/10.1109/tifs.2011.2176120.
Yu M, Liu Y, Sun H, et al. Adaptive and separable multiary reversible data hiding in encryption domain. J Image Video Proc. 2020;2020:16. https://doi.org/10.1186/s13640-020-00502-w.
Min Long Yu, Zhao XZ, Peng F. A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering. Signal Process. 2020;176:107703. https://doi.org/10.1016/j.sigpro.2020.107703.
Liu L, Wang A, Chang C. Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction. IEEE Access. 2020;8:29639–47. https://doi.org/10.1109/ACCESS.2020.2972736.
Zhou N, Zhang M, Wang H, Ke Y, Di F. Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU. IEEE Access. 2020;8:81412–24. https://doi.org/10.1109/ACCESS.2020.2990903.
Chen K, Chang CC. Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map. Multimed Tools Appl. 2019;78:31441–65. https://doi.org/10.1007/s11042-019-07946-x.
Bao F, Deng R-H, Ooi B-C, Yang Y. Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Trans Inf Technol Biomed. 2005;9(4):554–63. https://doi.org/10.1109/TITB.2005.855556.
Coatrieux G, Le Guillou C, Cauvin J-M, Roux C. Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed. 2009;13(2):158–65. https://doi.org/10.1109/TITB.2008.2007199.
Wu H-T, Huang J, Shi Y-Q. A reversible data hiding method with contrast enhancement for medical images. J Vis Commun Image Represent. 2015;31:146–53. https://doi.org/10.1016/j.jvcir.2015.06.010.
Zain JM, Clarke M. Reversible Region of Non-Interest (RONI) Watermarking for Authentication of DICOM Images, IJCSNS International Journal of Computer Science and Network Security. 2007;7(9):19–28. https://arxiv.org/ftp/arxiv/papers/1101/1101.1603.pdf
Kundu MK, Das S. Lossless ROI medical image watermarking technique with enhanced security and high payload embedding. Proc. of 2010 Int. Conf. on Pattern Recognition. IEEE Computer Society. 2010;1457–60. https://doi.org/10.1109/ICPR.2010.360
Tan CK, Ng JC, Xu X, et al. Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability. J Digit Imaging. 2011;24:528–40. https://doi.org/10.1007/s10278-010-9295-4.
Coatrieux G, Puentes J, Roux C, Lamard M, Daccache W. A low distorsion and reversible watermark: application to angiographic images of the retina. Conf Proc IEEE Eng Med Biol Soc. 2005;2005:2224–7. https://doi.org/10.1109/IEMBS.2005.1616905 (PMID: 17282674).
Liu YL, Qu XX, Xin GJ. ROI-based reversible data hiding scheme for medical images with tamper detection. IEICE Trans. Inf Syst. 2015;E98-D(4):769–74. https://doi.org/10.1587/transinf.2014ICP0001
Lavanya A, Natarajan V. Watermarking patient data in encrypted medical images. Sadhana-Acad. Proc Eng Sci. 2012;37:723–9. https://www.ias.ac.in/public/Volumes/sadh/037/06/0723-0729.pdf
Liu, Yuling, Xinxin Qu, Guojiang Xin. A ROI-based reversible data hiding scheme in encrypted medical images. J. Visual Communication and Image Representation. 2016;39:51–7. https://doi.org/10.1016/j.jvcir.2016.05.008
Schneier B. Applied Cryptography. 2nd ed. New York: Wiley; 1996.
C.Paar and J. Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag Berlin Heidelberg. 2010; https://doi.org/10.1007/978-3-642-04101-3.
Z. Yin, H. Wang, H. Zhao, B. Luo, and X. Zhang. Complete separable reversible data hiding in encrypted image. Proc. 1st Int. Conf. Cloud Comput. Secur.; 2015. pp. 101–10.
Digital Imaging and Communications in Medicine. Current Edition. 2021. https://www.dicomstandard.org/current/ Accessed 1 January 2021.
Zhou J, Sun W, Dong L, Liu X, Au OC, Tang YY. Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation. IEEE Trans Circuits Syst Video Technol. 2016;26(3):441–52. https://doi.org/10.1109/TCSVT.2015.2416591.
Fridrich J, Goljan M, Du R. Lossless Data Embedding—New Paradigm in Digital Watermarking. EURASIP J Adv Signal Process. 2002;2002:986842. https://doi.org/10.1155/S1110865702000537.
Jessica Fridrich, Miroslav Goljan, Rui Du. "Invertible authentication", Proc. SPIE 4314, Security and Watermarking of Multimedia Contents III, (1 August 2001); https://doi.org/10.1117/12.435400
Celik MU, Sharma G, Tekalp AM. Lossless generalized-LSB data embedding. IEEE Trans Image Process. 2005;14(2):253–66. https://doi.org/10.1109/TIP.2004.840686.
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process. 2004;13(4):600–12. https://doi.org/10.1109/TIP.2003.819861.
Sheikh HR, Bovik AC. Image information and visual quality. IEEE Trans Image Process. 2006;15(2):430–44. https://doi.org/10.1109/TIP.2005.859378.
Westfeld A., Pfitzmann A. Attacks on Steganographic Systems. In: Pfitzmann A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science. 2000;1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_5
Acknowledgments
Authors thank the Instituto Politecnico Nacional (IPN) as well as the Consejo Nacional de Ciencia y Tecnologia de Mexico (CONACYT) by the support provided during the realization of this research.
Funding
This research was supported by Instituto Politecnico Nacional (IPN) as well as the Consejo Nacional de Ciencia y Tecnologia (CONACYT) of Mexico.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Informed consent
All patients data in DICOM images used in this research was anonymized considering the DICOM standard in https://www.dicomstandard.org/using/security. In this way, none patients data appears in all content of the paper.
Research involving human participants and/or animals
This research not involving human participants and/or animals.
Conflicts of interest
The authors declare that they have no potential conflicts of interest that could have appeared to influence the work reported in this paper.
Rights and permissions
About this article
Cite this article
Mata-Mendoza, D., Nuñez-Ramirez, D., Cedillo-Hernandez, M. et al. An improved ROI-based reversible data hiding scheme completely separable applied to encrypted medical images. Health Technol. 11, 835–850 (2021). https://doi.org/10.1007/s12553-021-00562-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12553-021-00562-6