Skip to main content

Advertisement

Log in

A Review of Medical Image Watermarking Requirements for Teleradiology

  • Published:
Journal of Digital Imaging Aims and scope Submit manuscript

Abstract

Teleradiology allows medical images to be transmitted over electronic networks for clinical interpretation and for improved healthcare access, delivery, and standards. Although such remote transmission of the images is raising various new and complex legal and ethical issues, including image retention and fraud, privacy, malpractice liability, etc., considerations of the security measures used in teleradiology remain unchanged. Addressing this problem naturally warrants investigations on the security measures for their relative functional limitations and for the scope of considering them further. In this paper, starting with various security and privacy standards, the security requirements of medical images as well as expected threats in teleradiology are reviewed. This will make it possible to determine the limitations of the conventional measures used against the expected threats. Furthermore, we thoroughly study the utilization of digital watermarking for teleradiology. Following the key attributes and roles of various watermarking parameters, justification for watermarking over conventional security measures is made in terms of their various objectives, properties, and requirements. We also outline the main objectives of medical image watermarking for teleradiology and provide recommendations on suitable watermarking techniques and their characterization. Finally, concluding remarks and directions for future research are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Hyung-Kyo L, Hee-Jung K, Ki-Ryong K, Jong-Keuk L: Digital watermarking of medical image using ROI information. In: Enterprise networking and computing in healthcare industry, 2005. HEALTHCOM 2005. Proceedings of 7th International Workshop on, 2005, pp. 404–407

  2. Al-Damegh SA: (22 March). Emerging issues in medical imaging (Indian J Med Ethics.2005 Oct-Dec;2(4) ed.) [Online]. Available: http://www.ijme.in/134co123.html

  3. Ruotsalainen P: Privacy and security in teleradiology. European Journal of Radiology 73:31–35, 2010

    Article  PubMed  Google Scholar 

  4. Prior F, Ingeholm ML, Levine BA, Tarbox L: Potential impact of HITECH security regulations on medical imaging. In: 2009 31st Annual International Conference of the IEEE Engineering in Medicine and Biology Society. EMBC 2009, 3–6 Sept. 2009, Piscataway, NJ, USA, 2009, pp. 2157–60

  5. Kobayashi LOM, Furuie SS: Proposal for DICOM multiframe medical image integrity and authenticity. Journal of Digital Imaging 22:71–83, 2009

    Article  PubMed  Google Scholar 

  6. Cao F, Huang HK, Zhou XQ: Medical image security in a HIPAA mandated PACS environment. Computerized Medical Imaging and Graphics 27:185–196, 2003

    Article  PubMed  CAS  Google Scholar 

  7. Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. In: Information Technology Applications in Biomedicine, 2000. Proceedings. 2000 IEEE EMBS International Conference on, 2000, pp. 250–255

  8. Tan C, Ng J, Xu X, Poh C, Guan Y, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. Journal of Digital Imaging 24:528–540, 2011

    Article  PubMed  Google Scholar 

  9. Memon NA, Chaudhry A, Ahmad M, Keerio ZA: Hybrid watermarking of medical images for ROI authentication and recovery. International Journal of Computer Mathematics 88:2057–2071, 2011

    Article  Google Scholar 

  10. Lin PL, Hsieh C-K, Huang P-W: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38:2519–2529, 2005

    Article  Google Scholar 

  11. Chang C-C, Fan Y-H, Tai W-L: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41:654–661, 2008

    Article  Google Scholar 

  12. Al-Qershi OM, Khoo BE: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. Journal of Digital Imaging 24:114–125, 2011

    Article  PubMed  Google Scholar 

  13. Memon NA, Gilani SAM, Ali A: Watermarking of chest CT scan medical images for content authentication. In: Information and Communication Technologies, 2009. ICICT '09. International Conference on, 2009, pp. 175–180

  14. Liew SC, Zain JM: Reversible medical image watermarking for tamper detection and recovery. In: Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, 2010, pp. 417–420

  15. Kundu MK, Das S: Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding. in Pattern Recognition (ICPR), 2010 20th International Conference on, 2010, pp. 1457–1460

  16. Coatrieux G, Lecornu L, Sankur B, Roux C: A Review of Image Watermarking Applications in Healthcare. In: Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE, 2006, pp. 4691–4694

  17. Cox I, Miller M, Bloom J, Fridrich J, Kalker T: Digital watermarking and steganography, 2nd edition. Elsevier, Burlington, 2007

    Google Scholar 

  18. Coatrieux G, Maitre H, Sankur B: Strict integrity control of biomedical images. In: Security and watermarking of multimedia contents III, January 22, 2001–January 25, 2001, San Jose, CA, United states, 2001, pp. 229–240

  19. (27 March 2012). ISO 27799:2008, Health informatics—information security management in health using ISO/IEC 27002 [Online]. Available: http://www.iso.org/iso/catalogue_detail?csnumber=41298

  20. The Health Insurance Portability and Accountability Act (HIPAA) [Online]. Available: http://www.hhs.gov/ocr/privacy/index.html

  21. Code of Federal Regulations-Title 45, subtitle A—Dept. of Health and Human Services, part 164—Security and Privacy [Online]. Available: http://www.access.gpo.gov/nara/cfr/waisidx_10/45cfr164_10.html

  22. Directive 95/46/EC of the European Parliament and of the Council [Online]. Available: ec.europa.eu/justice/policies/privacy/…/dir1995-46_part1_en.pdf

  23. (09 October 2011). Holistic, or full of holes? PCI, HIPAA and experiences in implementing secure computing systems [Online]. Available: http://www.dotsec.com/Links%20-%20health.html

  24. (03 October 2011). Australian Law Reform Commission [Online]. Available: http://www.alrc.gov.au/

  25. DICOM, Part 15: security and system management profiles, PS 3.15-2009 [Online]. Available: ftp://medical.nema.org/medical/dicom/2009/

  26. Turner JE, Bhacchu DS et al. (May 2002): Beginners guide to PACS. In: MDA Evaluation Report, ed London: PACSnet, Bence-Jones Offices, St. Georges’s Hospital

  27. Baur HJ, Engelmann U, Saurbier F, Schroter A, Baur U, Meinzer HP: How to deal with security issues in teleradiology. Computer Methods and Programs in Biomedicine 53:1–8, 1997

    Article  PubMed  CAS  Google Scholar 

  28. Epstein MA, Pasieka MS, Lord WP, Wong STC, Mankovich NJ: Security for the digital information age of medicine: issues, applications, and implementation. Journal of Digital Imaging 11:[d]33–44, 1998

    Article  Google Scholar 

  29. Jahangiri A: Training: information security [Online]. Available: http://www.alijahangiri.org/documents/Information-Security.htm

  30. Goldwasser S, Bellare M: (07 October). Lecture notes on cryptography [Online]. Available: http://cseweb.ucsd.edu/∼mihir/papers/gb.pdf

  31. Kalker T: Issues with digital watermarking and perceptual hashing. Proc. SPIE 4518:189, 2001

    Article  Google Scholar 

  32. Paar C, Pelzl J: Hash functions: understanding cryptography. ed: Springer Berlin Heidelberg, 2010, pp. 293–317

  33. Zhou XQ, Huang HK, Lou SL: Secure method for sectional image archiving and transmission. In: Medical imaging 2000: PACS Design and Evaluation: Engineering and Clinical Issues, 15–17 Feb. 2000, USA, 2000, pp. 390–9

  34. Xiaoyun Wang DF, Xuejia Lai, Hongbo Yu: (2004). Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD [Online]. Available: http://eprint.iacr.org/

  35. Canavan JE: Chapter 12: firewalls. In: Fundamentals of network security, ed Boston, London: Library of Congress Cataloging-in-Publication Data, Artech House

  36. Canavan, J. E. Chapter 11: virtual private networks. In: Fundamentals of network security, ed Boston, London: Library of Congress Cataloging-in-Publication Data, Artech House.

  37. Stine K, Dang Q: Encryption Basics. Journal of AHIMA 82:44–47, 2011

    PubMed  Google Scholar 

  38. (01 September 2011). Encryption [Online]. Available: http://en.wikipedia.org/wiki/Encryption

  39. Canavan JE: Chapter 3: encryption, digital signatures, and certification authorities. In: Fundamentals of network security, ed Boston, London: Library of Congress Cataloging-in-Publication Data, Artech House

  40. DICOM, Part 3: information object definitions [Online]. Available: ftp://medical.nema.org/medical/dicom/2009/09_03pu3.pdf

  41. Wong MLD, Goh AWT, Chua HS: Medical image authentication using DPT watermarking: a preliminary attempt. Forensics in Telecommunications, Information and Multimedia 8:42–53, 2009

    Article  Google Scholar 

  42. (06 October 2011). Cryptographic hash function [Online]. Available: http://en.wikipedia.org/wiki/Cryptographic_hash_function

  43. Lafourcade P, Alexandre C, Florian M: (1st Semester 2010/2011, 03 October). Lecture note 05-security models: symmetric encryption, [Online]. Available: http://www-verimag.imag.fr/∼plafourc/teaching/Master_Pro_2010_2011/Lecture_Note10/Lecture_Note_05.pdf

  44. Evans BL (12 November 2011). Image Hashing Research [Online]. Available: http://users.ece.utexas.edu/~bevans/projects/hashing/

  45. (3 October 2011). Perceptual hashing [Online]. Available: http://isis.poly.edu/projects/percephash

  46. Voloshynovskiy S, Koval O, Beekhof F, Pun T: Conception and limits of robust perceptual hashing: towards side information assisted hash functions. In: Media forensics and security, January 19, 2009–January 21, 2009, San Jose, CA, United states, 2009, p. The Society for Imaging Science and Technology (IS and T); The International Society for Optical Engineering (SPIE)

  47. Preneel B: Analysis and design of cryptographic hash functions (PhD Thesis) [Online]. Available: http://homes.esat.kuleuven.be/∼preneel/phd_preneel_feb1993.pdf, 2003

  48. Digital watermarking services & applications. Available: http://www.digitalwatermarkingalliance.org/membership.asp

  49. Liew SC, Zain JM: Experiment of tamper detection and recovery watermarking in PACS. In: Computer Research and Development, 2010 Second International Conference on, 2010, pp. 387–390

  50. Que D, Wen X, Chen B: PACS model based on digital watermarking and its core algorithms. In: MIPPR 2009-Medical Imaging, Parallel Processing of Images, and Optimization Techniques: 6th International Symposium on Multispectral Image Processing and Pattern Recognition, October 30, 2009–November 1, 2009, Yichang, China, 2009, pp. Natl. Lab. Multi-spectral Inf. Process. Technol.; Huazhong University of Science and Technology; National Natural Science Foundation of China; China Three Gorges University

  51. Li Q, Memon N: Security models of digital watermarking. In: Sebe N, Liu Y, Zhuang Y, Huang T Eds. Multimedia content analysis and mining. vol. 4577, ed: Springer Berlin/Heidelberg, 2007, pp. 60–64

  52. Lim SJ, Moon H-M, Chae S-H, Chung Y, Pan SB: JPEG 2000 and digital watermarking technique using in medical image. In 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009, July 8, 2009 - July 10, 2009, Shanghai, China, 2009, pp. 413–416

  53. Das S, Kundu M: Effective management of medical information through a novel blind watermarking technique. Journal of Medical Systems, pp. 1–13

  54. Navas KA, Sasikumar M: Survey of medical image watermarking algorithms. Presented at the 4rth International Conference: Sciences of Electronic, Technologies of Information and Telecommunications (SETIT), TUNISIA, 2007

  55. Chao H-M, Hsu C-M, Miaou S-G: A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Transactions on Information Technology in Biomedicine 6:46–53, 2002

    Article  PubMed  Google Scholar 

  56. Fallahpour M, Megias D, Ghanbari M: High capacity, reversible data hiding in medical images. In: Image processing (ICIP), 2009 16th IEEE International Conference on, 2009, pp. 4241–4244

  57. Ulutas M, Ulutas G, Nabiyev VV: Medical image security and EPR hiding using Shamir’s secret sharing scheme. Journal of Systems and Software, vol. (in press), Corrected Proof, 2012

  58. Luo H, Yu F-X, Chen H, Huang Z-L, Li H, Wang P-H: Reversible data hiding based on block median preservation. Information Sciences 181:308–328, 2011

    Article  Google Scholar 

  59. Wu JHK, Chang R-F, Chen C-J, Wang C-L, Kuo T-H, Moon WK, Chen D-R: Tamper detection and recovery for medical images using near-lossless information hiding technique. Journal of Digital Imaging 21:59–76, 2008

    Article  PubMed  Google Scholar 

  60. Jianguo Z, Jianyong S, Yuanyuan Y, Chenwen L, Yihong Y, Jin J, Weihua C, Kun S, Guozhen Z: Image-based electronic patient records for secured collaborative medical applications. In: 2005 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 31 Aug.-3 Sept. 2005, Piscataway, NJ, USA, 2006, p. 3pp

  61. Münch H, Engelmann U, Schröter A, Meinzer HP: The integration of medical images with the electronic patient record and their web-based distribution1. Academic Radiology 11:661–668, 2004

    Article  PubMed  Google Scholar 

  62. Cheung S-C, Chiu DKW, Ho C: The use of digital watermarking for intelligence multimedia document distribution. Journal of Theoretical and Applied Electronic Commerce Research 3:103–118, 2008

    Article  Google Scholar 

  63. Zhou W, Rockwood T, Sagetong P: Non-repudiation oblivious watermarking schema for secure digital video distribution. In: Multimedia Signal Processing, 2002 IEEE Workshop on, 2002, pp. 343–346

  64. Fridrich J: Applications of data hiding in digital images. In: Proceedings of Fifth International Symposium on Signal Processing and its Applications, 22–25 Aug. 1999, Brisbane, Qld., Australia, 1999, p. 9 vol.1

  65. Navas KA, Archana Thampy S, Sasikumar M: EPR hiding in medical images for telemedicine. In: Proceedings of World Academy of Science and Engineering and Technology, 2008

  66. Nyeem H, Boles W, Boyd C: Developing a digital image watermarking model. In: Digital Image Computing Techniques and Applications (DICTA), 2011 International Conference on, Noosa, Queensland, Australia, 2011, pp. 468–473

  67. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T: Models of watermarking. In: Digital watermarking and steganography (second edition), ed Burlington: Morgan Kaufmann, 2008, pp. 61–103

  68. Deng C, Gao X, Li X, Tao D: A local Tchebichef moments-based robust image watermarking. Signal Processing 89:1531–1539, 2009

    Article  Google Scholar 

  69. Ganic E, Eskicioglu AM: Robust DWT-SVD domain image watermarking: embedding data in all frequencies. presented at the Proceedings of the 2004 workshop on Multimedia and security, Magdeburg, Germany, 2004

  70. Liu J-L, Lou D-C, Chang M-C, Tso H-K: A robust watermarking scheme using self-reference image. Computer Standards & Interfaces 28:356–367, 2006

    Article  Google Scholar 

  71. Nikolaidis N, Pitas I: Robust image watermarking in the spatial domain. Signal Processing 66:385–403, 1998

    Article  Google Scholar 

  72. Pan W, Coatrieux G, Cuppens N, Cuppens F, Roux C: An additive and lossless watermarking method based on invariant image approximation and Haar wavelet transform. In: 2010 32nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2010), 31 Aug.-4 Sept. 2010, Piscataway, NJ, USA, 2010, pp. 4740–3

  73. Qi X, Qi J: A robust content-based digital image watermarking scheme. Signal Processing 87:1264–1280, 2007

    Article  Google Scholar 

  74. Rey C, Dugelay JL: Blind detection of malicious alterations on still images using robust watermarks. In: Secure Images and Image Authentication (Ref. No. 2000/039), IEE Seminar on, 2000, pp. 7/1–7/6

  75. Simitopoulos D, Koutsonanos DE, Strintzis MG: Robust image watermarking based on generalized radon transformations. Circuits and Systems for Video Technology, IEEE Transactions on 13:732–745, 2003

    Article  Google Scholar 

  76. Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10:1593–1601, 2001

    Article  PubMed  CAS  Google Scholar 

  77. Badran EF, Sharkas MA, Attallah OA: Multiple watermark embedding scheme in wavelet-spatial domains based on ROI of medical images. In: 2009 National Radio Science Conference, NRSC 2009, March 17, 2009 - March 19, 2009, New Cairo, Egypt, 2009

  78. Guo X, Zhuang T-G: A region-based lossless watermarking scheme for enhancing security of medical data. Journal of Digital Imaging 22:53–64, 2009

    Article  PubMed  Google Scholar 

  79. Shih FY, Wu Y-T: Robust watermarking and compression for medical images based on genetic algorithms. Information Sciences 175:200–216, 2005

    Article  Google Scholar 

  80. Nyeem H, Boles W, Boyd C: On the robustness and security of digital image watermarking. In: IEEE/IAPR International Conference on Informatics, Electronics & Vision (ICIEV) 2012 (accepted)

  81. Tefas A, Nikolaidis N, Pitas I: Chapter 22—image watermarking: techniques and applications. In: Al B Ed. The Essential Guide to Image Processing, Secondth edition. Academic, Boston, 2009, pp 597–648

    Chapter  Google Scholar 

  82. Nezhadarya E, Wang ZJ, Ward RK: Robust image watermarking based on multiscale gradient direction quantization. IEEE Transactions on Information Forensics and Security 6:1200–1213, 2011

    Article  Google Scholar 

  83. Lie WN, Chang LC: Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification. IEEE Transactions on Multimedia 8:46–59, 2006

    Article  Google Scholar 

  84. Jen-Sheng T, Win-Bin H, Yau-Hwang K: On the selection of optimal feature region set for robust digital image watermarking. Image Processing, IEEE Transactions on 20:735–743, 2011

    Article  Google Scholar 

  85. Bi N, Sun Q, Huang D, Yang Z, Huang J: Robust image watermarking based on multiband wavelets and empirical mode decomposition. IEEE Transactions on Image Processing 16:1956–1966, 2007

    Article  PubMed  Google Scholar 

  86. Agarwal P, Prabhakaran B: Robust blind watermarking of point-sampled geometry. Information Forensics and Security, IEEE Transactions on 4:36–48, 2009

    Article  Google Scholar 

  87. Shan H, Kirovski D, Min W: High-fidelity data embedding for image annotation. Image Processing, IEEE Transactions on 18:429–435, 2009

    Article  Google Scholar 

  88. Hasan YMY, Hassan AM: Tamper detection with self-correction hybrid spatial-DCT domains image authentication technique. In: 2007 IEEE International Symposium on Signal Processing and Information Technology, 15–18 Dec. 2007, Piscataway, NJ, USA, 2007, pp. 369–74

  89. Lee T-Y, Lin SD: Dual watermark for image tamper detection and recovery. Pattern Recognition 41:3497–3506, 2008

    Article  Google Scholar 

  90. Zain JM, Fauzi ARM: Medical image watermarking with tamper detection and recovery. In: Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE, 2006, pp. 3270–3273

  91. Holliman M, Memon N: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9:432–441, 2000

    Article  PubMed  CAS  Google Scholar 

  92. Al-Qershi OM, Khoo BE: High capacity data hiding schemes for medical images based on difference expansion. Journal of Systems and Software 84:105–112, 2011

    Article  Google Scholar 

  93. Fan Z, Hongbin Z: Digital watermarking capacity and reliability. In: e-Commerce Technology, 2004. CEC 2004. Proceedings. IEEE International Conference on, 2004, pp. 295–298

  94. Yu N, Cao l, Fang W, Li X: Practical analysis of watermarking capacity. In: Communication Technology Proceedings, 2003. ICCT 2003. International Conference on, 2003, pp. 1872–1877 vol.2

  95. Smitha B, Navas KA: Spatial domain—high capacity data hiding in ROI images. In: Signal Processing, Communications and Networking, 2007. ICSCN '07. International Conference on, 2007, pp. 528–533

  96. Uttridge I, Bazzana G, Gemma D, Heiler J, Giuchi M, Geyres S: Evaluation of the security of distributed IT systems through ITSEC/ITSEM: experiences and findings. In: Information systems security, ed: Chapman & Hall, Ltd., 1996, pp. 405–416

  97. ISO/IEC 27001:2005. Available: http://www.iso.org/iso/catalogue_detail?csnumber=42103

  98. Zain JM, Baldwin LP, Clarke M: Reversible watermarking for authentication of DICOM images. In: Conference Proceedings—26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2004, September 1, 2004 - September 5, 2004, San Francisco, CA, United states, 2004, pp. 3237–3240

  99. Coatrieux G, Montagner J, Huang H, Roux C: Mixed reversible and RONI watermarking for medical image reliability protection. In: Engineering in Medicine and Biology Society, 2007. EMBS 2007. 29th Annual International Conference of the IEEE, 2007, pp. 5653–5656

  100. Piva A, Barni M, Bartolini F, De Rosa A: Data hiding technologies for digital radiography. Vision, Image and Signal Processing, IEE Proceedings 152:604–610, 2005

    Article  Google Scholar 

  101. Raul RC, Claudia FU, Trinidad-Bias GJ: Data hiding scheme for medical images. In: Electronics, Communications and Computers, 2007. CONIELECOMP '07. 17th International Conference on, 2007, pp. 32–32

  102. Zain JM, Fauzi ARM, Aziz AA: Clinical assessment of watermarked medical images. Journal of Computer Science 5:857–863, 2009

    Article  Google Scholar 

  103. Guo X, Zhuang T-G: A lossless watermarking scheme for enhancing security of medical data in PACS. In: Medical Imaging 2003: PACS and Integrated Medical Information Systems: Design and Evaluation, February 18, 2003–February 20, 2003, San Diego, CA, United States, 2003, pp. 350–359

  104. Coatrieux G, Lamard M, Daccache W, Puentes W, Roux C: A low distortion and reversible watermark: application to angiographic images of the retina. In: Engineering in Medicine and Biology Society, 2005. IEEE-EMBS 2005. 27th Annual International Conference of the, 2005, pp. 2224–2227

  105. Giakoumaki A, Pavlopoulos S, Koutsouris D: Multiple image watermarking applied to health information management. Information Technology in Biomedicine, IEEE Transactions on 10:722–732, 2006

    Article  Google Scholar 

  106. Osborne D, Abbott D, Sorell M, Rogers D: Multiple embedding using robust watermarks for wireless medical images. In: 3rd International Conference on Mobile and Ubiquitous Multimedia, MUM 2004, October 27, 2004 - October 29, 2004, College Park, MD, United States, 2004, pp. 245–250

  107. Memon NA, Gilani SAM, Qayoom S: Multiple watermarking of medical images for content authentication and recovery. In: 2009 IEEE 13th International Multitopic Conference, INMIC 2009, December 14, 2009–December 15, 2009, Islamabad, Pakistan, 2009, p. Muhammad Ali Jinnah University; University of Engineering and Technology; Institute of Electrical and Electronics Engineers; Pakistan Science Foundation; Nayatel (Micronet Broadband Group of Companies)

  108. Pan W, Coatrieux G, Cuppens-Boulahia N; Cuppens F, Roux C: Medical image integrity control combining digital signature and lossless watermarking. In: Data privacy management and autonomous spontaneous security. vol. 5939, J. Garcia-Alfaro, G. Navarro-Arribas, N. Cuppens-Boulahia, and Y. Roudier, Eds., ed: Springer Berlin/Heidelberg, 2010, pp. 153–162

  109. Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C: Medical image integrity control combining digital signature and lossless watermarking. In: 4th International Workshop on Data Privacy Management, DPM 2009, and 2nd International Workshop on Autonomous and Spontaneous Security, SETOP 2009, September 24, 2009 - September 25, 2009, St. Malo, France, 2010, pp. 153–162

  110. Li-Qun K, Yuan Z, Xie H: A Medical image authentication system based on reversible digital watermarking. In: Information Science and Engineering (ICISE), 2009 1st International Conference on, 2009, pp. 1047–1050

  111. Li-Qun K, Yuan Z, Xie H: Watermarking image authentication in hospital information system. In: Information Engineering and Computer Science, 2009. ICIECS 2009. International Conference on, 2009, pp. 1–4

  112. Nambakhsh MS, Ahmadian A, Ghavami M, Dilmaghani RS, Karimi-Fard S: A novel blind watermarking of ECG signals on medical images using EZW algorithm. In: Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE, 2006, pp. 3274–3277

  113. Smith JP: Authentication of digital medical images with digital signature technology. Radiology 194:771–4, 1995

    PubMed  CAS  Google Scholar 

  114. Viswanathan P, Venkata Krishna P: Text fusion watermarking in medical image with semi-reversible for secure transfer and authentication. In: Advances in Recent Technologies in Communication and Computing, 2009. ARTCom '09. International Conference on, 2009, pp. 585–589

  115. Pushpala K, Nigudkar R: A novel watermarking technique for medical image authentication. Computers in Cardiology 2005:683–686, 2005

    Google Scholar 

  116. Lin C-H, Yang C-Y, Chang C-W: Authentication and protection for medical image. In: 2nd International Conference on Computational Collective Intelligence - Technologies and Applications, ICCCI 2010, November 10, 2010 - November 12, 2010, Kaohsiung, Taiwan, 2010, pp. 278–287

  117. Lim YS, Feng DD: Multiple block based authentication watermarking for distribution of medical images. In: 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, ISIMP 2004, October 20, 2004 - October 22, 2004, Hong Kong, China, Hong kong, 2004, pp. 631–634

  118. Fotopoulos V, Stavrinou ML, Skodras AN: Medical image authentication and self-correction through an adaptive reversible watermarking technique. In: BioInformatics and BioEngineering, 2008. BIBE 2008. 8th IEEE International Conference on, 2008, pp. 1–5

  119. Ahmed F, Moskowitz IS: A semi-reversible watermark for medical image authentication. In: Distributed Diagnosis and Home Healthcare, 2006. D2H2. 1st Transdisciplinary Conference on, 2006, pp. 59–62

  120. Guoxia S, Huiqiang S, Xinghua S, Shuzhong B, Ju L: Combination independent content feature with watermarking annotation for medical image retrieval. In: Innovative Computing, Information and Control, 2007. ICICIC '07. Second International Conference on, 2007, pp. 607–607

  121. Navas KA, Thampy A, Sasikumar M: A novel technique for EPR hiding in medical images for telemedicine. In: 4th Kuala Lumpur International Conference on Biomedical Engineering 2008, Biomed 2008, June 25, 2008–June 28, 2008, Kuala Lumpur, Malaysia, 2008, pp. 703–706

  122. Wu M, Liu B: Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia 6:528–538, 2004

    Article  Google Scholar 

  123. Huang H, Coatrieux G, Shu HZ, Luo LM, Roux C: Medical image tamper approximation based on an image moment signature. In: 2010 12th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom 2010), 1–3 July 2010, Piscataway, NJ, USA, 2010, pp. 254–9

  124. Jun-Chou C, Chin-Chen C: Detection and restoration of a tampered medical image. In: Medical Imaging and Augmented Reality. Second International Workshop, MIAR 2004. Proceedings, 19–20 Aug. 2004, Berlin, Germany, 2004, pp. 78–85

  125. Navas KA, Nithya VS, Rakhi R, Sasikumar M: Lossless watermarking in JPEG2000 for EPR data hiding. In: 2007 IEEE International Conference on Electro/Information Technology, 17–20 May 2007, Piscataway, NJ, USA, 2007, pp. 697–702

  126. Zinger S, Jin Z, Sankur B: Optimization of watermarking performances using error correcting codes and repetition. Presented at the CMS’2001: Communications and Multimedia Security, 2001

  127. Nayak J, Bhat PS, Kumar MS, Rajendra Acharya U: Reliable transmission and storage of medical images with patient information using error control codes. In: IEEE INDICON 2004 - 1st India Annual Conference, December 20, 2004 - December 22, 2004, Kharagpur, India, 2004, pp. 147–150

  128. Machkour M, Khamlichi YI, Afdel K: Data security in medical information system. In: Multimedia Computing and Systems, 2009. ICMCS '09. International Conference on, 2009, pp. 391–394

  129. Huang H, Coatrieux G, Montagner J, Shu HZ, Luo LM, Roux C: Medical image integrity control seeking into the detail of the tampering. In: Engineering in Medicine and Biology Society, 2008. EMBS 2008. 30th Annual International Conference of the IEEE, 2008, pp. 414–417

  130. Dickson KWC, Patrick CKH, Vivying SYC, Eleanna K: Protecting the Exchange of Medical Images in Healthcare Process Integration with Web Services. In: System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference, 2007, pp. 131–131

  131. Fridrich J, Goljan M, Du R: Invertible authentication. San Jose, CA, USA, 2001, pp. 197–208

  132. Cox I, Doërr G, Furon T: Watermarking is not cryptography. In: Digital Watermarking. vol. 4283, Y. Shi and B. Jeon, Eds., ed: Springer Berlin/Heidelberg, 2006, pp. 1–15

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hussain Nyeem.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Nyeem, H., Boles, W. & Boyd, C. A Review of Medical Image Watermarking Requirements for Teleradiology. J Digit Imaging 26, 326–343 (2013). https://doi.org/10.1007/s10278-012-9527-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10278-012-9527-x

Keywords

Navigation