Skip to main content

Part of the book series: SpringerBriefs in Applied Sciences and Technology ((BRIEFSAPPLSCIENCES))

  • 426 Accesses

Abstract

This chapter presents the basic background of a medical imaging and its types. The requirements of security of medical images along with various types of data hiding techniques and the motivation are given in this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Bibliography

  1. Strzelecki M (2013) Medical imaging. Biomedical Engineering, Institute of Electronics, Technical University of Lodz, Poland

    Google Scholar 

  2. Thanki R, Borra S, Dey N, Ashour A (2018) Medical imaging and its objective quality assessment: an introduction. In: Classification in BioApps. Springer, Cham, pp 3–32

    Chapter  Google Scholar 

  3. Rao K, Rao V (2006) Medical image processing. In: Proceedings of workshop on medical image processing and applications

    Google Scholar 

  4. American Hospital Association (2015) The promise of telehealth for hospitals, health systems, and their communities, Trend Watch. American Hospital Association, Chicago, IL

    Google Scholar 

  5. Yassin N (2015) Digital watermarking for telemedicine applications: a review. Int J Comput Appl 129(17):30–37

    Google Scholar 

  6. ISO (2016). ISO 27799:2016, Health informatics – information security management in health using ISO/IEC 27002 (Online). Available: https://www.iso.org/standard/62777.html

  7. US Government (1996) The health insurance portability and accountability act (HIPAA) (Online). Available: https://www.hhs.gov/hipaa/index.html

  8. US Government (2010) Code of Federal Regulations – Title 45, subtitle A – Department of Health and Human Services, part 164 – Security and Privacy (Online). Available: https://www.gpo.gov/fdsys/pkg/CFR-2010-title45-vol1/pdf/CFR-2010-title45-vol1.pdf

  9. DICOM (2009). DICOM, part 15: security and system management profiles, PS 3.15 – 2009 (Online). Available: ftp://medical.nema.org/medical/dicom/2009/

  10. Ruotsalainen P (2010) Privacy and security in teleradiology. Eur J Radiol 73:31–35

    Article  Google Scholar 

  11. Baur H, Engelmann U, Saurbier F, Schroter A, Baur U, Menizer H (1997) How to deal with security issues in teleradiology. Comput Methods Prog Biomed 53:1–8

    Article  Google Scholar 

  12. Epstein M, Pasieka M, Lord W, Wong S, Mankovich N (1998) Security for the digital information age of medicine: issues, applications and implementation. J Digit Imaging 11:33–44

    Article  Google Scholar 

  13. Dey N, Ashour A, Chakraborty S, Banerjee S, Gospodinova E, Gospodinov M, Hassanien AE (2017) Watermarking in biomedical signal processing. In: Intelligent techniques in signal processing for multimedia security. Springer International Publishing, Cham, pp 345–369

    Chapter  Google Scholar 

  14. Nyeem H, Boles W, Boyd C (2013) A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326–343

    Article  Google Scholar 

  15. Paar C, Pelzl J (2010) Hash functions: understanding cryptography. Springer, Berlin Heidelberg, pp 293–317

    MATH  Google Scholar 

  16. Voloshynovskiy S, Koval O, Beekhof F, Pun T (2009) Conception and limits of robust perceptual hashing: towards side information assisted hash functions. In: Media forensics and security

    Google Scholar 

  17. Goldwasser S, Bellare M (2008) Lecture notes on cryptography (Online). Available: http://cseweb.ucsd.edu/~mihir/papers/gb.html

  18. Xiaoyun D, Xuejia L, Hongbo Y (2004) Collisions for hash functions MD4, MD5, HAVAL-128, and RIPEMD

    Google Scholar 

  19. Preneel B (2003) Analysis and design of cryptographic hash functions. Ph.D. thesis (Online). Available: http://homes.esat.kuleuven.be/~preneel/phd_preneel_feb1993.pdf

  20. Kalker T (2001) Issues with digital watermarking and perceptual hashing. Proc SPIE 4518:189

    Article  Google Scholar 

  21. Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R (2000) Relevance of watermarking in medical imaging. In: Proceedings of information technology applications in biomedicine, pp. 250–255

    Google Scholar 

  22. Zhou XQ, Huang HK, Lou SL (2000) Secure method for sectional image archiving and transmission. In: Medical imaging 2000: PACS design and evaluation: engineering and clinical issues, pp. 390–399

    Google Scholar 

  23. Thanki R, Borra S, Borisagar KR (2018) A hybrid watermarking technique for copyright protection of medical signals in teleradiology, Handbook of research on information security in biomedical signal. IGI Global, pp 320–349

    Google Scholar 

  24. Liew S, Zain J (2010) Experiment of tamper detection and recovery watermarking in PACS. Second international conference on computer research and development, pp. 387–390

    Google Scholar 

  25. Que D, Wen X, Chen B (2009) PACS model based on digital watermarking and its Core algorithms. In: MIPPR 2009 – medical imaging, parallel processing of images, and optimization techniques: 6th international symposium on multispectral image processing and pattern recognition

    Google Scholar 

  26. Borra S, Lakshmi HR, Dey N, Ashour AS, Shid F (2017) Digital image watermarking tools: state-of-the-art. In: Information technology and intelligent transportation systems: proceedings of the 2nd international conference on information technology and intelligent transportation systems, Xi’an, China, vol 296, p 450

    Google Scholar 

  27. Thanki RM, Kothari AM (2016) Digital watermarking: technical art of hiding. Intelligent analysis of multimedia information, p 431

    Google Scholar 

  28. Borra S, Swamy GN (2013) Sensitive digital image watermarking for copyright protection. Int J Netw Secur 15(2):113–121

    Google Scholar 

  29. Borra S, Swamy GN (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci 9(3):312–317

    Google Scholar 

  30. Borra S, Swamy GN (2011) A spatial domain public image watermarking. Int J Secur Its Appl 5(1):1–12

    Google Scholar 

  31. Borra S, Swamy G, Rao KS (2010) A multiple watermarking technique for images based on visual cryptography. Comput Appl 1:77–81

    Google Scholar 

  32. Borra S, Swamy G, Rao KS, Kumar AR (2009) A watermarking technique based on visual cryptography. J Inf Assur Secur 4(6):470–473

    Google Scholar 

  33. Lakshmi HR, Borra S (2016) Asynchronous implementation of reversible image watermarking using mousetrap pipelining. In: Advance computing (IACC), 2016 I.E. 6th international conference on, IEEE, pp 529–533

    Google Scholar 

  34. Borra S, Lakshmi HR (2015) Visual cryptography based lossless watermarking for sensitive images. In: International conference on swarm, evolutionary, and memetic computing. Springer, Cham, pp 39–39

    Google Scholar 

  35. Gavini NS, Borra S (2014) Lossless watermarking technique for copyright protection of high resolution images. In: Region 10 symposium, 2014 IEEE. IEEE, pp 73–78

    Google Scholar 

  36. Borra S, Swamy GN (2012) A semi-blind image watermarking based on discrete wavelet transform and secret sharing. In: Communication, information & computing technology (ICCICT), 2012, International conference on. IEEE, pp 1–5

    Google Scholar 

  37. Borra S, Swamy G, Reddy KRL (2012) A novel copyright protection scheme based on visual secret sharing. In: Computing communication & networking technologies (ICCCNT), 2012 3rd international conference on. IEEE, pp 1–5

    Google Scholar 

  38. Borra S, Swamy GN (2012) Digital image ownership verification based on spatial correlation of colors. In: IET conference on image processing, UK, pp. 1–5

    Google Scholar 

  39. Chao H, Hsu C, Miaou S (2002) A data hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6:46–53

    Article  Google Scholar 

  40. Fallahpour M, Megias D, Ghanbari M (2009) High capacity, reversible data hiding in medical images. In: 16th IEEE international conference on image processing (ICIP), pp. 4241–4244

    Google Scholar 

  41. Das S, Kundu M (2012) Effective management of medical information through a novel blind watermarking technique. J Med Syst 36(5):3339–3351

    Article  Google Scholar 

  42. Cheung S, Chiu D, Ho C (2008) The use of digital watermarking for intelligence multimedia document distribution. J Theoret Appl Electron Commer Res 3:103–118

    Article  Google Scholar 

  43. Zhou W, Rockwood T, Sagetong P (2002) Non-repudiation oblivious watermarking scheme for secure digital video distribution. In: IEEE workshop on multimedia signal processing, pp. 343–346

    Google Scholar 

  44. Fan Z, Hongbin Z (2004) Digital watermarking capacity and reliability. In: Proceedings of IEEE international conference on e-commerce technology, pp. 295–298

    Google Scholar 

  45. Yu N, Cao l FW, Li X (2003) Practical analysis of watermarking capacity. Int Conf Commun Technol 2:1872–1877

    Google Scholar 

  46. Wang Z, Bovik A (2004) Universal image quality index. J IEEE Signal Process Lett 9(3):84–88

    Google Scholar 

  47. Chakraborty S, Chatterjee S, Dey N, Ashour AS, Hassanien AE (2017) Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking. In: Intelligent techniques in signal processing for multimedia security. Springer International Publishing, Cham, pp 133–149

    Chapter  Google Scholar 

  48. Parah SA, Sheikh JA, Dey N, Bhat GM (2017) Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption. J Glob Inf Manag (JGIM) 25(4):80–102

    Article  Google Scholar 

  49. Roy S, Pal A (2017) A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling. Multimed Tools Appl 76(3):3577–3616

    Article  Google Scholar 

  50. Thakkar F, Srivastava V (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools Appl., Springer 76(3):3669–3697

    Article  Google Scholar 

  51. Nagpal S, Bhushan S, Mahajan M (2016) An enhanced digital image watermarking scheme for medical images using neural network, DWT, and RSA. Int J Mod Edu Comput Sci 8(4):46–56

    Article  Google Scholar 

  52. Kishore P, Rao M, Prasad C, Kumar D (2016) Medical image watermarking: run through review. ARPN J Eng Appl Sci 11(5):2882–2899

    Google Scholar 

  53. Mahmood A (2015) Adaptive approaches for medical imaging security. Ph.D. thesis, University of Guelph, Canada

    Google Scholar 

  54. Singh A (2015) Some new techniques of improved wavelet domain watermarking for medical images. Ph.D. Thesis, NIT Kurukshetra

    Google Scholar 

  55. Venkatram N, Reddy L, Kishore P (2014, August) Blind medical image watermarking with LWT-SVD for telemedicine applications. WSEAS Trans Signal Process 10:288–300

    Google Scholar 

  56. Pal A, Dey N, Samanta S, Das A, Chaudhuri S (2013) A hybrid reversible watermarking technique for color biomedical images. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp. 1–6

    Google Scholar 

  57. Dey N, Biswas D, Roy A, Das A, Chaudhuri S (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th international conference on intelligent systems design and applications (ISDA), pp. 680–685

    Google Scholar 

  58. Dey N, Das P, Roy A, Das A, Chaudhuri S (2012) DWT-DCT-SVD based intravascular ultrasound video watermarking. In: 2012 world congress on information and communication technologies (WICT), pp. 224–229

    Google Scholar 

  59. Rathi S, Inamdar V (2012) Medical images authentication through watermarking preserving ROI. Health Inf An Int J 1(1):27–42

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive license to Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Thanki, R., Borra, S. (2019). Introduction. In: Medical Imaging and its Security in Telemedicine Applications. SpringerBriefs in Applied Sciences and Technology. Springer, Cham. https://doi.org/10.1007/978-3-319-93311-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93311-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93310-8

  • Online ISBN: 978-3-319-93311-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics