Skip to main content
Log in

An improved ROI-based reversible data hiding scheme completely separable applied to encrypted medical images

  • Original Paper
  • Published:
Health and Technology Aims and scope Submit manuscript

Abstract

To protect the privacy of medical images, as well as the patient personal information associated with it, this paper proposes a reversible data hiding scheme for encrypted medical images; whose reversibility is completely separable by allowing additional data extraction and restoration of the region of interest both from the plaintext and the cipher domain of medical images. To this purpose, the pixels in the image are reordered according to the region of interest selected by the content owner and encrypted with a block cipher in counter mode; to subsequently embed additional data into the encrypted image, such as the patient’s personal information and clinical diagnosis, via less significant bit substitution. Finally, according to the proper key, a legitimate receiver can perform the following tasks: a) Obtain a high visual quality approximate image with respect to the original version by directly decrypting the cryptogram with the encryption key, b) With the data hiding key, the embedded data can be extracted free of any error, either from the encrypted image or its approximate version respectively, and c) In case of having both keys, the embedded data can be extracted and the recovered image with the region of interest fully restored can be obtained without loss of information. The proposed method is suitable for applications where the information security and the management of medical images need to be ensured in terms of reliability, integrity, and confidentiality. Comparison performance with the state of the art is performed, in terms of imperceptibility, capacity and steganalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Coatrieux G, Maitre H, Sankur B, et al. Relevance of watermarking in medical imaging. Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. 2000;250–5. https://doi.org/10.1109/ITAB.2000.892396.

  2. Coatrieux G, Quantin C, Montagner J, Fassa M, Allaert FA, Roux C. Watermarking medical images with anonymous patient identification to verify authenticity. Stud Health Technol Inform. 2008;136:667–72 (PMID: 18487808).

    Google Scholar 

  3. U.S. Department of Health and Human Services. Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Health Information, https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf2021. Accessed 28 March 2021.

  4. Shi Y, Li X, Zhang X, Wu H, Ma B. Reversible data hiding: Advances in the past two decades. IEEE Access. 2016;4:3210–37. https://doi.org/10.1109/ACCESS.2016.2573308.

  5. Mirsky Y, Mahler T, Shelef I, Elovici YCT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning, Cornell University. 2019. https://arxiv.org/abs/1901.03597.

  6. Zhang X. Reversible Data Hiding in Encrypted Image. IEEE Signal Process Lett. 2011;18(4):255–8. https://doi.org/10.1109/LSP.2011.2114651.

    Article  Google Scholar 

  7. Hong W, Chen T, Wu H. An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. 2012;19:199–202. https://doi.org/10.1109/LSP.2012.2187334.

    Article  Google Scholar 

  8. Zhang X. Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security. 2012;7:826–32. https://doi.org/10.1109/tifs.2011.2176120.

  9. Yu M, Liu Y, Sun H, et al. Adaptive and separable multiary reversible data hiding in encryption domain. J Image Video Proc. 2020;2020:16. https://doi.org/10.1186/s13640-020-00502-w.

    Article  Google Scholar 

  10. Min Long Yu, Zhao XZ, Peng F. A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering. Signal Process. 2020;176:107703. https://doi.org/10.1016/j.sigpro.2020.107703.

    Article  Google Scholar 

  11. Liu L, Wang A, Chang C. Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction. IEEE Access. 2020;8:29639–47. https://doi.org/10.1109/ACCESS.2020.2972736.

    Article  Google Scholar 

  12. Zhou N, Zhang M, Wang H, Ke Y, Di F. Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU. IEEE Access. 2020;8:81412–24. https://doi.org/10.1109/ACCESS.2020.2990903.

    Article  Google Scholar 

  13. Chen K, Chang CC. Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map. Multimed Tools Appl. 2019;78:31441–65. https://doi.org/10.1007/s11042-019-07946-x.

    Article  Google Scholar 

  14. Bao F, Deng R-H, Ooi B-C, Yang Y. Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Trans Inf Technol Biomed. 2005;9(4):554–63. https://doi.org/10.1109/TITB.2005.855556.

    Article  Google Scholar 

  15. Coatrieux G, Le Guillou C, Cauvin J-M, Roux C. Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed. 2009;13(2):158–65. https://doi.org/10.1109/TITB.2008.2007199.

    Article  Google Scholar 

  16. Wu H-T, Huang J, Shi Y-Q. A reversible data hiding method with contrast enhancement for medical images. J Vis Commun Image Represent. 2015;31:146–53. https://doi.org/10.1016/j.jvcir.2015.06.010.

    Article  Google Scholar 

  17. Zain JM, Clarke M. Reversible Region of Non-Interest (RONI) Watermarking for Authentication of DICOM Images, IJCSNS International Journal of Computer Science and Network Security. 2007;7(9):19–28. https://arxiv.org/ftp/arxiv/papers/1101/1101.1603.pdf

  18. Kundu MK, Das S. Lossless ROI medical image watermarking technique with enhanced security and high payload embedding. Proc. of 2010 Int. Conf. on Pattern Recognition. IEEE Computer Society. 2010;1457–60. https://doi.org/10.1109/ICPR.2010.360

  19. Tan CK, Ng JC, Xu X, et al. Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability. J Digit Imaging. 2011;24:528–40. https://doi.org/10.1007/s10278-010-9295-4.

    Article  Google Scholar 

  20. Coatrieux G, Puentes J, Roux C, Lamard M, Daccache W. A low distorsion and reversible watermark: application to angiographic images of the retina. Conf Proc IEEE Eng Med Biol Soc. 2005;2005:2224–7. https://doi.org/10.1109/IEMBS.2005.1616905 (PMID: 17282674).

    Article  Google Scholar 

  21. Liu YL, Qu XX, Xin GJ. ROI-based reversible data hiding scheme for medical images with tamper detection. IEICE Trans. Inf Syst. 2015;E98-D(4):769–74. https://doi.org/10.1587/transinf.2014ICP0001

  22. Lavanya A, Natarajan V. Watermarking patient data in encrypted medical images. Sadhana-Acad. Proc Eng Sci. 2012;37:723–9. https://www.ias.ac.in/public/Volumes/sadh/037/06/0723-0729.pdf

  23. Liu, Yuling, Xinxin Qu, Guojiang Xin. A ROI-based reversible data hiding scheme in encrypted medical images. J. Visual Communication and Image Representation. 2016;39:51–7. https://doi.org/10.1016/j.jvcir.2016.05.008

  24. Schneier B. Applied Cryptography. 2nd ed. New York: Wiley; 1996.

    MATH  Google Scholar 

  25. C.Paar and J. Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag Berlin Heidelberg. 2010; https://doi.org/10.1007/978-3-642-04101-3.

  26. Z. Yin, H. Wang, H. Zhao, B. Luo, and X. Zhang. Complete separable reversible data hiding in encrypted image. Proc. 1st Int. Conf. Cloud Comput. Secur.; 2015. pp. 101–10.

  27. Digital Imaging and Communications in Medicine. Current Edition. 2021. https://www.dicomstandard.org/current/ Accessed 1 January 2021.

  28. Zhou J, Sun W, Dong L, Liu X, Au OC, Tang YY. Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation. IEEE Trans Circuits Syst Video Technol. 2016;26(3):441–52. https://doi.org/10.1109/TCSVT.2015.2416591.

    Article  Google Scholar 

  29. Fridrich J, Goljan M, Du R. Lossless Data Embedding—New Paradigm in Digital Watermarking. EURASIP J Adv Signal Process. 2002;2002:986842. https://doi.org/10.1155/S1110865702000537.

    Article  MATH  Google Scholar 

  30. Jessica Fridrich, Miroslav Goljan, Rui Du. "Invertible authentication", Proc. SPIE 4314, Security and Watermarking of Multimedia Contents III, (1 August 2001); https://doi.org/10.1117/12.435400

  31. Celik MU, Sharma G, Tekalp AM. Lossless generalized-LSB data embedding. IEEE Trans Image Process. 2005;14(2):253–66. https://doi.org/10.1109/TIP.2004.840686.

    Article  Google Scholar 

  32. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process. 2004;13(4):600–12. https://doi.org/10.1109/TIP.2003.819861.

    Article  Google Scholar 

  33. Sheikh HR, Bovik AC. Image information and visual quality. IEEE Trans Image Process. 2006;15(2):430–44. https://doi.org/10.1109/TIP.2005.859378.

    Article  Google Scholar 

  34. Westfeld A., Pfitzmann A. Attacks on Steganographic Systems. In: Pfitzmann A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science. 2000;1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_5

Download references

Acknowledgments

Authors thank the Instituto Politecnico Nacional (IPN) as well as the Consejo Nacional de Ciencia y Tecnologia de Mexico (CONACYT) by the support provided during the realization of this research.

Funding

This research was supported by Instituto Politecnico Nacional (IPN) as well as the Consejo Nacional de Ciencia y Tecnologia (CONACYT) of Mexico.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manuel Cedillo-Hernandez.

Ethics declarations

Informed consent

All patients data in DICOM images used in this research was anonymized considering the DICOM standard in https://www.dicomstandard.org/using/security. In this way, none patients data appears in all content of the paper.

Research involving human participants and/or animals

This research not involving human participants and/or animals.

Conflicts of interest

The authors declare that they have no potential conflicts of interest that could have appeared to influence the work reported in this paper.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mata-Mendoza, D., Nuñez-Ramirez, D., Cedillo-Hernandez, M. et al. An improved ROI-based reversible data hiding scheme completely separable applied to encrypted medical images. Health Technol. 11, 835–850 (2021). https://doi.org/10.1007/s12553-021-00562-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12553-021-00562-6

Keywords

Navigation