Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking

  • Wei Pan
  • Gouenou Coatrieux
  • Nora Cuppens-Boulahia
  • Frederic Cuppens
  • Christian Roux
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5939)


Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their confidentiality, integrity and traceability in an autonomous way. In this context, watermarking has been recently proposed as a complementary mechanism for medical data protection. In this paper, we focus on the verification of medical image integrity through the combination of digital signatures with such a technology, and especially with Reversible Watermarking (RW). RW schemes have been proposed for images of sensitive content for which any modification may affect their interpretation. Whence, we compare several recent RW schemes and discuss their potential use in the framework of an integrity control process in application to different sets of medical images issued from three distinct modalities: Magnetic Resonance Images, Positron Emission Tomography and Ultrasound Imaging. Experimental results with respect to two aspects including data hiding capacity and image quality preservation, show different limitations which depend on the watermark approach but also on image modality specificities.


Ultrasound Image Image Watermark Integrity Control Watermark Signal Reversible Data Hiding 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Coatrieux, G., Maître, H., Sankur, B., Rolland, Y., Collorec, R.: Relevance of Watermarking in Medical Imaging. In: Proc. of IEEE EMBS Int. Conf. ITAB, Arlington, USA, pp. 250–255 (2000)Google Scholar
  2. 2.
    Zhou, X.Q., Huang, H.K., Lou, S.L.: Authenticity and integrity of digital mammography images. IEEE Trans. on Medical Imaging 20(8), 784–791 (2001)CrossRefGoogle Scholar
  3. 3.
    Chao, H.M., Hsu, C.M., Miaou, S.G.: A Data-Hidding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records. IEEE Trans. on Information Technology in Biomedicine 6(1), 46–53 (2002)CrossRefGoogle Scholar
  4. 4.
    Coatrieux, G., Lecornu, L., Sankur, B., Roux, C.: A Review of Image Watermarking Applications in Healthcare. In: Proc. of the IEEE EMBC Conf., New York, USA, pp. 4691–4694 (2006)Google Scholar
  5. 5.
    Piva, A., Barni, M., Bartolini, F., Capellini, V.: Exploiting the cross-correlation of RGB channels for robust watermarking of color images. In: Proc. of IEEE Int. Conf. on ICIP, vol. I, pp. 306–310 (1999)Google Scholar
  6. 6.
    Gilbert, H., Handschuh, H.: Security Analysis of SHA-256 and Sisters. In: Selected Areas in Cryptography, pp. 175–193 (2003)Google Scholar
  7. 7.
    Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US Patent application, Docket No.:77102/E-D (1999)Google Scholar
  9. 9.
    Coatrieux, G., Lamard, M., Daccache, W., Puentes, J., Roux, C.: A low distortion and reversible watermark application to angiographic images of the retina. In: Proc. of the IEEE EMBC Conf., Shanghai, China, pp. 2224–2227 (2005)Google Scholar
  10. 10.
    Ni, Z., Shi, Y., Ansari, N., Wei, S.: Reversible data hiding. In: Proc. IEEE Int. Symp. Circuits and Systems, May 2003, vol. 2, pp. 912–915 (2003)Google Scholar
  11. 11.
    Xuan, G., Yao, Q., Yang, C., Gao, J., Chai, P., Shi, Y.Q., Ni, Z.: Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 323–332. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  12. 12.
    Leest, A., Veen, M., Bruekers, F.: Reversible watermarking for images. In: Proc. of Int Conf. SPIE, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA (January 2004)Google Scholar
  13. 13.
    Fridrich, J., Goljan, J., Du, R.: Invertible authentication. In: Proc. of Int. Conf. SPIE, Security and Watermarking of Multimedia Content, San Jose, CA, January 2001, pp. 197–208 (2001)Google Scholar
  14. 14.
    Xuan, G., Chen, J., Zhu, J., Shi, Y.Q., Ni, Z., Su, W.: Lossless data hiding based on integer wavelet transform. In: Proc. MMSP, St. Thomas, Virgin Islands, pp. 312–315 (2002)Google Scholar
  15. 15.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proc. IEEE ICIP, vol. 2, pp. 157–160 (2002)Google Scholar
  16. 16.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. on Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  17. 17.
    Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. on Image Processing 13(8), 1147–1156 (2004)CrossRefMathSciNetGoogle Scholar
  18. 18.
    Lee, S., Yoo, C.D., Kalker, T.: Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform Information Forensics and Security. IEEE Trans. Info. Forensics and Security 2(3), 321–330 (2007)CrossRefGoogle Scholar
  19. 19.
    Xuan, G.R., Shi, Y.Q., Yang, C.Y., Zheng, Y.Z., Zou, D.K., Chai, P.Q.: Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique. In: Proc. of Int. Conf. Multimedia and Expo., pp. 1520–1523 (2005)Google Scholar
  20. 20.
    Thodi, D.M., Rodriquez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. Image Processing 16(3), 721–730 (2007)CrossRefGoogle Scholar
  21. 21.
    Wu, X.: Lossless compression of continuous-tone images via context selection, quantization, and modeling. IEEE Trans. on Image Proc. 6(5), 656–664 (1997)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Wei Pan
    • 1
    • 3
  • Gouenou Coatrieux
    • 1
    • 3
  • Nora Cuppens-Boulahia
    • 2
    • 3
  • Frederic Cuppens
    • 2
    • 3
  • Christian Roux
    • 1
    • 3
  1. 1.Institut Telecom; Telecom Bretagne; Unite INSERM 650 LaTIM, Technopôle Brest-Iroise, CS 83818Brest Cedex 3France
  2. 2.Institut Telecom; Telecom Bretagne; LUSSI DepartmentCesson Sévigné CedexFrance
  3. 3.Université Européenne de BretagneFrance

Personalised recommendations