Enhancing Security in Medical Image Communication with JPEG2000 Compression and Lossless Watermarking

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 221)

Abstract

Medical image content authentication is very important, since medical image contents are more and more widely distributed. Reversible watermarking becomes a promising technique to embed the information into medical images. In this paper, we define the Region of Interest (ROI) in an image and trying to embed data in Region of Non Interest. When medical image shared through network, for the compression purpose we proposed the JPEG2000 algorithm and to improve the integrity and Authenticity hash value of the image is found by using MD5 and encrypted using RSA to form the DS (Digital Signature). DS and patient information is embedded into DICOM images. Strict authentication can be achieved by providing high security in accessing the secured medical images by medical experts which are available in the websites using Kerberos technique.

Keywords

Reversible watermarking Medical image security Medical image compression Authenticity and integrity RSA HD5 hash function JPEG2000 compression Kerberos 

References

  1. 1.
    Coatrieux G, Guillou C le, Cauvin J, Roux CH (2009) Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Info Technol Biomed 13(2)Google Scholar
  2. 2.
    Coatrieux G, Lamard M, Daccache W, Puentes J, Roux C (2005) A low distortion and reversible watermark application in angiographic images of the retina. In: Proceedings IEEE- EMBC conference, Shanghai pp 2224–2227Google Scholar
  3. 3.
    Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux CH (2010) Medical image integrity control combining digital signature and lossless watermarking, published in 2nd SSETOP international workshop on autonomous and spontaneous security, Saint malo, Version 1–14Google Scholar
  4. 4.
    Marcellin MW, Garmish MJ, Bilgin A, Bolick MP (2000) An overview of JPEG-2000. In: proceedings of IEEE data compression conference, pp 523–541Google Scholar
  5. 5.
    ISO (2000) JPEG2000 image codingsystem, ISO/IEC FCD 15444-1,JPEG2000 part I Final committee draft, Version 1.0Google Scholar
  6. 6.
    Kuang LQ, Zhang Y, Xie H (2009) A medical image authentication system based on reversible digital watermarking. In: IEEE, 1st international conference on information science and engineering (ICISE 2009), pp 1047–1050Google Scholar
  7. 7.
    Zain JM (2012) Strict authentication watermarking with JPEG compression (SAW-JPEG) for medical images. Euro J Sci Res 42(2):232–241. ISSN 450-216XGoogle Scholar
  8. 8.
    Zhaol GC, Yang X, Zhoul B Wei W RSA-based digital image encryption algorithm in wireless sensor networks. In: proceedings second international conference on signal processing systems, Version 2, pp 640–643Google Scholar
  9. 9.
    Rivest R, Shamir A, Adleman l (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126Google Scholar
  10. 10.
    Kuo WC, Chen MY (2005) A modified(t,n) threshold proxy signature scheme based on the RSA cryptosystem. In: Information technology and applications, ICITA vol 2, pp 576–579Google Scholar
  11. 11.
    Harn L, Ren J (2008) Efficient identity-based RSA multisignatures. Comput Secur 27:12–15Google Scholar
  12. 12.
    Coatrieux G, Guillou C le, Cauvin J, Locarnu L, Roux CH (2006) Enhancing shared medical image functionalities with image knowledge digest and watermarking, presented in the IEEE EMBC conference international technology applied biomedicine (ITAB 2006), JoanninaGoogle Scholar
  13. 13.
    Chang CC, Lin IC (20047) Remarks in fingerprint-based remote user authentication scheme using smart cards. ACM Operating Syst Rev 38(3):91–100Google Scholar
  14. 14.
    Chang CC, Tai WL, Lin MH (2005) A reversible data hiding scheme with modified side match vector quantization. In: proceedings of the international conference on advanced information networking and applications, vol 1, Tai-Wan, pp 947–952 Mar 2005Google Scholar
  15. 15.
    Keyvanpour MR, Merrikh-Bayat F (2010) A new encryption method for secure embedding in image watermarking. In: procedings of third international conference on advanced computer theory and engineering, vol 2, pp 402–407Google Scholar
  16. 16.
    Coatrieux G, Quantin C, Montagner J, Francois MF, Allert A, Roux CH (2008) Watermarking medical images with anonymous patient identification to verify authenticity, in ehealth beyond the horizon, vol 136, pp 667–672Google Scholar
  17. 17.
    Umamageswari A, FerniUkrit M, Suresh GR (2011) A survey on security in medical image communication. Int J Comput Appl 30(3):0975–8887Google Scholar
  18. 18.
    FerniUkrit M, Umamageswari A, Suresh GR (2011) A survey on lossless compression techniques for dynamic images. Int J Comput Appl 31(8):0975–8887Google Scholar
  19. 19.
    William S (2010) Cryptography and network securityGoogle Scholar

Copyright information

© Springer India 2013

Authors and Affiliations

  1. 1.Sathyabama UniversityChennaiIndia
  2. 2.Easwari Engineering CollegeChennaiIndia

Personalised recommendations