Preserving Data Integrity of Encoded Medical Images: The LAR Compression Framework

  • Marie BabelEmail author
  • François Pasteau
  • Clément Strauss
  • Maxime Pelcat
  • Laurent Bédat
  • Médéric Blestel
  • Olivier Déforges
Part of the Intelligent Systems Reference Library book series (ISRL, volume 29)


Through the development of medical imaging systems and their integration into a complete information system, the need for advanced joint coding and network services becomes predominant. PACS (Picture Archiving and Communication System) aims to acquire, store and compress, retrieve, present and distribute medical images. These systems have to be accessible via the Internet or wireless channels. Thus protection processes against transmission errors have to be added to get a powerful joint source-channel coding tool. Moreover, these sensitive data require confidentiality and privacy for archiving and transmission purposes, leading to use cryptography and data embedding solutions.

This chapter introduces data integrity protection and developed dedicated tools of content protection and secure bitstream transmission for medical encoded image purposes. In particular, the LAR image coding method is defined together with advanced securization services.


Long Term Evolution Universal Mobile Telecommunication System Unequal Error Protection Error Resilience Selective Encryption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    36.211, G.T.: Evolved Universal Terrestrial Radio Access (E-UTRA); physical channels and modulation, Release 9 (2009)Google Scholar
  2. 2.
    36.321, G.T.: Evolved Universal Terrestrial Radio Access (E-UTRA); medium access control (MAC) protocol specification, Release 9 (2009)Google Scholar
  3. 3.
    36.322, G.T.: Evolved Universal Terrestrial Radio Access (E-UTRA); radio link control (RLC) protocol specification, Release 9 (2009)Google Scholar
  4. 4.
    36.323, G.T.: Evolved Universal Terrestrial Radio Access (E-UTRA); packet data convergence protocol (PDCP) specification, Release 9 (2009)Google Scholar
  5. 5.
    Abdulfetah, A.A., Sun, X., ans Nur Mohammad, H.Y.: Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain. Information Technology Journal 9(3), 460–466 (2010)CrossRefGoogle Scholar
  6. 6.
    Albanese, A., Blmer, J., Edmonds, J., Luby, M., Sudan, M.: Priority Encoding Transmission. IEEE Transaction on Information Theory 42(6), 1737–1744 (1996)CrossRefzbMATHGoogle Scholar
  7. 7.
    Anderson, R.: Security Engineering - A Guide to Building Dependable Distributed Systems. Wiley (2008)Google Scholar
  8. 8.
    Babel, M., Bédat, L., Déforges, O., Motsch, J.: Context-Based Scalable Coding and Representation of High Resolution Art Pictures for Remote Data Access. In: Proc. of the IEEE International Conference on Multimedia and Expo, ICME 2007, pp. 460–463 (2007)Google Scholar
  9. 9.
    Babel, M., Déforges, O.: WG1N4870 - Response to call for AIC techniques and evaluation methods. Tech. rep., ISO/ITU JPEG commitee, San Francisco (2009)Google Scholar
  10. 10.
    Babel, M., Déforges, O., Bédat, L., Strauss, C., Pasteau, F., Motsch, J.: WG1N5315 – Response to Call for AIC evaluation methodologies and compression technologies for medical images: LAR Codec. Tech. rep., ISO/ITU JPEG commitee, Boston, USA (2010)Google Scholar
  11. 11.
    Babel, M., Déforges, O., Ronsin, J.: Interleaved S+P Pyramidal Decomposition with Refined Prediction Model. In: IEEE International Conference on Image Processing, ICIP 2005, Genova, Italy, vol. 2, pp. 750–753 (2005)Google Scholar
  12. 12.
    Babel, M., Parrein, B., Déforges, O., Normand, N., Guédon, J.P., Coat, V.: Joint source channel coding: secured and progressive transmission of compressed medical images on the Internet. Computerized Medical Imaging and Graphics 32(4), 258–269 (2008)CrossRefGoogle Scholar
  13. 13.
    Bas, P., Marc Chassery, J., Davoine, F.: Using the fractal code to watermark images. In: Proc. Int. Conf. Image Processing ICIP, pp. 469–473 (1998)Google Scholar
  14. 14.
    Bender, W., Butera, W., Gruhl, D., Hwang, R., Paiz, F.J., Pogreb, S.: Applications for data hiding. IBM Systems Journal 39, 547–568 (2000)CrossRefGoogle Scholar
  15. 15.
    Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3/4), 313–336 (1996)CrossRefGoogle Scholar
  16. 16.
    Boeglen, H.: IT++ library for numerical communications simulations (2007),
  17. 17.
    Cayre, F., Chappelier, V., Jegou, H.: Signal processing and information theory library (2010),
  18. 18.
    Chu, Y., Ganz, A.: Wista: a wireless telemedicine system for disaster patient care. Mobile Networks and Applications 12, 201–214 (2007)CrossRefGoogle Scholar
  19. 19.
    Clunie, D.: DICOM Research Applications, Life at the Fringe of Reality. In: SPIE Medical Imaging, USA (2009)Google Scholar
  20. 20.
    Clunie, D.: DICOM support for compression schemes - more than JPEG. In: 5th Annual Medical Imaging Informatics and Teleradiology Conference, USA (2009)Google Scholar
  21. 21.
    Cox, I.J., Member, S., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)CrossRefGoogle Scholar
  22. 22.
    Dahlman, E., Parkvall, S., Skold, J., Beming, P.: 3G Evolution: HSPA and LTE for Mobile Broadband. Academic Press Inc. (2007)Google Scholar
  23. 23.
    Déforges, O., Babel, M., Bédat, L., Ronsin, J.: Color LAR Codec: A Color Image Representation and Compression Scheme Based on Local Resolution Adjustment and Self-Extracting Region Representation. IEEE Trans. on Circuits and Systems for Video Technology 17(8), 974–987 (2007)CrossRefGoogle Scholar
  24. 24.
    Dufaux, F., Nicholson, D.: JWL: JPEG 2000 for wireless applications. In: SPIE Proc. Applications of Digital Image Processing XXVII, vol. 5558, pp. 309–318 (2004)Google Scholar
  25. 25.
    Editors, J.: JPEG 2000 image coding system - Part 11: Wireless JPEG2000 Committee Draft. ISO/IEC CD 15444-11 / ITU-T SG8 (2004)Google Scholar
  26. 26.
    Elias, P.: Coding for Noisy Channels. Convention Record 4, 37–49 (1955)Google Scholar
  27. 27.
    Ferguson, N., Schneier, B.: Practical Cryptography. Wiley (2003)Google Scholar
  28. 28.
    Flécher, E., Raulet, M., Roquier, G., Babel, M., Déforges, O.: Framework For Efficient Cosimulation And Fast Prototyping on Multi-Components With AAA Methodology: LAR Codec Study Case. In: Proc. of the 15th European Signal Processing Conference (Eusipco 2007), Poznan, Poland, pp. 1667–1671 (2007)Google Scholar
  29. 29.
    Fonteneau, C., Motsch, J., Babel, M., Déforges, O.: A Hierarchical Selective Encryption Technique in a Scalable Image Codec. In: Proc. of International Conference in Communications (2008)Google Scholar
  30. 30.
    Furon, T., Cayre, F., Fontaine, C.: Watermarking Security in Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks. In: Cvejic, Seppanen (eds.). Idea Group Publishing (2007)Google Scholar
  31. 31.
    Gibaud, B.: The DICOM standard: a brief overview. In: Molecular Imaging: Computer Reconstruction and Practice. NATO Science for Peace and Security Series, pp. 229–238. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  32. 32.
    Gilani, M., Skodras, A.N.: DLT-Based Digital Image Watermarking. In: Proc. First IEEE Balkan Conference on Signal Processing, Communications, Circuits and Systems, Istanbul, Turkey (2000)Google Scholar
  33. 33.
    Grangetto, M., Magli, E., Olmo, G.: A syntax-preserving error resilience tool for JPEG 2000 based on error correcting arithmetic coding. IEEE Trans. on Image Processing 15(4), 807–818 (2006)CrossRefGoogle Scholar
  34. 34.
    Hamidouche, W., Olivier, C., Babel, M., Déforges, O., Boeglen, H., Lorenz, P.: LAR Image transmission over fading channels: a hierarchical protection solution. In: Proc. of The Second International Conference on Communication Theory, Reliability, and Quality of Service, Colmar France, pp. 1–4 (2009)Google Scholar
  35. 35.
    Hashmi, N., Myung, D., Gaynor, M., Moulton, S.: A sensorbased, web service-enabled, emergency medical response system. In: Workshop on End-to-End, Sense-and-Respond Systems, Applications and Services, pp. 25–29 (2005)Google Scholar
  36. 36.
    Hsu, C.T., Wu, J.L.: Multiresolution watermarking for digital images. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing 45(8), 1097–1101 (1998)CrossRefGoogle Scholar
  37. 37.
    Hwang, S.O.: Content and service protection for iptv. IEEE Transactions on Broadcasting 55(2), 425–436 (2009)CrossRefGoogle Scholar
  38. 38.
    I.-T.I.-T.T.: 81 (JPEG-1)-based still-image coding using an alternative arithmetic coder. Tech. rep., ISO/ITU JPEG commitee (2005)Google Scholar
  39. 39.
    Wolf, J.K., Wyner, A.D., Ziv, J.: Source coding for multiple description. Bell System Technical Journal 59(8), 1417–1426 (1980)zbMATHMathSciNetGoogle Scholar
  40. 40.
    Kang, J.S., You, Y., Sung, M.Y.: Steganography using block-based adaptive threshold. In: 22nd International Symposium on Computer and Information Sciences, ISCIS 2007, pp. 1–7 (2007)Google Scholar
  41. 41.
    Kunt, M., Ikonomopoulos, A., Kocher, M.: Second Generation Image Coding Techniques. Proceedings of the IEEE 73(4), 549–575 (1985)CrossRefGoogle Scholar
  42. 42.
    Li, J., Zhang, X., Liu, S., Ren, X.: An adaptive secure watermarking scheme for images in spatial domain using fresnel transform. In: 1st International Conference on Information Science and Engineering (ICISE), pp. 1630–1633 (2009)Google Scholar
  43. 43.
    Liu, X., Eskicioglu, A.M.: Selective encryption of multimedia content in distribution networks: challenges and new directions. In: Conf. Communications, Internet, and Information Technology, pp. 527–533 (2003)Google Scholar
  44. 44.
    Mathon, B., Bas, P., Cayre, F., Macq, B.: Comparison of secure spread-spectrum modulations applied to still image watermarking. Annals of Telecommunication 11-12, 810–813 (2009)Google Scholar
  45. 45.
    Meerwald, P., Uhl, A.: A survey of wavelet-domain watermarking algorithms. In: Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, pp. 505–516. SPIE (2001)Google Scholar
  46. 46.
    Mehlführer, C., Wrulich, M., Ikuno, J.C., Bosanska, D., Rupp, M.: Simulating the long term evolution physical layer. In: Proc. of the 17th European Signal Processing Conference (EUSIPCO 2009), Glasgow, Scotland (2009)Google Scholar
  47. 47.
    Mehlführer, C., Wrulich, M., Ikuno, J.C., Bosanska, D., Rupp, M.: Simulating the Long Term Evolution Physical Layer. In: Proc. of the 17th European Signal Processing Conference (2009)Google Scholar
  48. 48.
    Mohr, A., Riskin, E.A., Ladner, R.E.: Unequal Loss Protection: Graceful degradation of image quality over packet erasure channels through forward error correction. Journal on Selected Areas in Communications 18(6), 819–828 (2000)CrossRefGoogle Scholar
  49. 49.
    Motsch, J., Babel, M., Déforges, O.: Joint Lossless Coding and Reversible Data Embedding in a Multiresolution Still Image Coder. In: Proc. of European Signal Processing Conference, EUSIPCO, Glasgow, UK, pp. 1–4 (2009)Google Scholar
  50. 50.
    Motsch, J., Déforges, O., Babel, M.: Embedding Multilevel Image Encryption in the LAR Codec. In: IEEE Communications International Conference 2006, Bucharest, Romania (2006)Google Scholar
  51. 51.
    Norcen, R., Podesser, M., Pommer, A., Schmidt, H.P., Uhl, A.: Confidential storage and transmission of medical image data. Computers in Biology and Medicine 33(3), 277–297 (2003)CrossRefGoogle Scholar
  52. 52.
    Norman, T.: The road to LTE for GSM and UMTS operators. Tech. rep., Analysys Mason (2009)Google Scholar
  53. 53.
    Oosterwijk, H.: The DICOM standard, overview and characteristics. Tech. rep., Ringholm Whitepapers (2004)Google Scholar
  54. 54.
    Pattichis, C., Kyriacou, E., Voskarides, S., Pattichis, M., Istepanian, R., Schizas, C.: Wireless telemedicine systems: An overview. IEEE Antennas and Propagation Magazine 44(2), 143–153 (2002)CrossRefGoogle Scholar
  55. 55.
    Pedersen, P.C., Sebastian, D.: Wireless Technology Applications in a Rural Hospital. In: 2004 American Telemedicine Association Annual Meeting (2004)Google Scholar
  56. 56.
    Reed, I., Solomon, G.: Polynomial Codes Over Certain Finite Fields. Journal of the Society of Industrial and Applied Mathematics (SIAM) 2, 300–304 (1960)CrossRefMathSciNetGoogle Scholar
  57. 57.
    Ruanaidh, J., Dowling, W., Boland, F.: Phase watermarking of digital images. In: International Conference on Image Processing, vol. 3, pp. 239–242 (1996)Google Scholar
  58. 58.
    Ruanaidh, J.J.K., Pun, O.: D’informatique Rotation, scale and translation invariant digital image watermarking. IEEE International Conference on Image Processing ICIP1997, 536–539 (1997)Google Scholar
  59. 59.
    Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons (1996)Google Scholar
  60. 60.
    Sesia, S., Toufik, I., Baker, M.: LTE, The UMTS Long Term Evolution: From Theory to Practice. Wiley (2009)Google Scholar
  61. 61.
    Shinohara, M., Motoyoshi, F., Uchida, O., Nakanishi, S.: Wavelet-based robust digital watermarking considering human visual system. In: Proceedings of the 2007 Annual Conference on International Conference on Computer Engineering and Applications, pp. 177–180 (2007)Google Scholar
  62. 62.
    . Signal & Information Processing Lab, D.U.o.T.: Image and Video Compression Learning Tool VcDemo (2004),
  63. 63.
    Sneha, S., Dulipovici, A.: Strategies forWorking with Digital Medical Images. In: HICSS 2006: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, vol. 5, p. 100 (2006)Google Scholar
  64. 64.
    Taubman, D.S., Marcellin, M.W.: JPEG2000: Image Compression Fundamentals, Standards, and Practice. Kluwer Academic Publishers (2001)Google Scholar
  65. 65.
    Temal, L., Dojat, M., Kassel, G., Gibaud, B.: Towards an ontology for sharing medical images and regions of interest in neuroimaging. Journal of Biomedical Informatics 41(5), 766–778 (2008)CrossRefGoogle Scholar
  66. 66.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13, 890–896 (2003)Google Scholar
  67. 67.
    Tian, J., Wells Jr., R.O.: Reversible data-embedding with a hierarchical structure. In: 2004 International Conference on Image Processing, ICIP, vol. 5, pp. 3419–3422 (2004)Google Scholar
  68. 68.
    Tian, J., Wells, R.O.: Reversible data-embedding with a hierarchical structure. In: ICIP, vol. 5, pp. 3419–3422 (2004)Google Scholar
  69. 69.
    Tsui, T.K., Zhang, X.P., Androutsos, D.: Color image watermarking using multidimensional Fourier transforms. IEEE Transactions on Information Forensics and Security 3(1), 16–28 (2008)CrossRefGoogle Scholar
  70. 70.
    Uhl, A., Pommer, A.: Image and Video Encryption - From Digital Rights Management to Secured Personal Communication. In: Advances in Information Security, vol. 15. Springer, Heidelberg (2005)Google Scholar
  71. 71.
    Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: ACIVS Advanced Concepts for Intelligent Vision Systems, Ghent, Belgium, pp. 90–97 (2002)Google Scholar
  72. 72.
    Vucetic, J.: Telemedicine: The Future of Wireless Internet Applications. In: Southeast Wireless 2003 (2003)Google Scholar
  73. 73.
    Xia, X.G., Boncelet, C.G., Arce, G.R.: A multiresolution watermark for digital images. In: IEEE International Conference on Image Processing (ICIP), pp. 548–551 (1997)Google Scholar
  74. 74.
    Yang, M., Bourbakis, N., Li, S.: Data, image and video encryption. IEEE Potentials, 28–34 (2004)Google Scholar
  75. 75.
    Zhao, J., Koch, E.: Embedding robust labels into images for copyright protection. In: Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, pp. 242–251 (1995)Google Scholar

Copyright information

© Springer Berlin Heidelberg 2012

Authors and Affiliations

  • Marie Babel
    • 1
    Email author
  • François Pasteau
    • 1
  • Clément Strauss
    • 1
  • Maxime Pelcat
    • 1
  • Laurent Bédat
    • 1
  • Médéric Blestel
    • 1
  • Olivier Déforges
    • 1
  1. 1.INSA, IRISA, UMR 6074European University of Brittany (UEB)RennesFrance

Personalised recommendations