Abstract
Telemedicine is a booming healthcare practice that has facilitated the exchange of medical data and expertise between healthcare entities. However, the widespread use of telemedicine applications requires a secured scheme to guarantee confidentiality and verify authenticity and integrity of exchanged medical data. In this paper, we describe a region-based, crypto-watermarking algorithm capable of providing confidentiality, authenticity, and integrity for medical images of different modalities. The proposed algorithm provides authenticity by embedding robust watermarks in images’ region of non-interest using SVD in the DWT domain. Integrity is provided in two levels: strict integrity implemented by a cryptographic hash watermark, and content-based integrity implemented by a symmetric encryption-based tamper localization scheme. Confidentiality is achieved as a byproduct of hiding patient’s data in the image. Performance of the algorithm was evaluated with respect to imperceptibility, robustness, capacity, and tamper localization, using different medical images. The results showed the effectiveness of the algorithm in providing security for telemedicine applications.
Similar content being viewed by others
References
Fiaidhi J, Kuziemsky C, Mohammed S, Weber J, Topaloglou T: Emerging IT trends in healthcare and well-being. IT Prof 18(3):9–13, 2016
Saranummi N: In the spotlight: health information systems. IEEE Rev Biomed Eng 6:21–23, 2013
Huang HK: PACS and imaging informatics: basic principles and applications. Wiley-Blackwell, New York, 2010
Kocabas O, Soyata T, Aktas M: Emerging security mechanisms for medical cyber physical systems. IEEE/ACM Trans Comput Biol Bioinform 13(3):401–416, 2016
The Health Insurance Portability and Accountability Act (HIPAA), March 2009. [Online]. Available at: http://www.hhs.gov/ocr/privacy/index.html
Lee W, et al: A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Trans Inf Technol Biomed 12(1):34–41, 2008
Schneier B. Applied cryptography. Wiley, 1995
Mousavi S, Naghsh A, Abu-Bakar S: Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729, 2014
Digital Imaging and Communications in Medicine (DICOM) Standard, DICOM. (2006). [Online]. Available: http://medical.nema.org/dicom/2006/
Al-Haj A: Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images. J Digit Imaging 28(2):179–187, 2014
Al-Haj A, Abandah G, Hussein N: Crypto-based algorithms for secured medical image transmission. IET Inf Secur 9(6):365–373, 2015
Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. In: Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine. USA, 2000, pp. 250–255
Nyeem H, Boles W, Boyd C: A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326–343, 2012
Al-Haj A, Amer A: Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 8(3):737–750, 2014
Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C: Medical image integrity control combining digital signature and lossless watermarking. Data Privacy Manage. Autonom. Spontaneous Sec. (LNCS), vol. 5939, 2010, pp. 153–162
Zope-Chaudhari S, Venkatachalam P, Buddhiraju K: Secure dissemination and protection of multispectral images using crypto watermarking. IEEE J Sel Top Appl Earth Observ Remote Sens 8(11):5388–5394, 2015
Al-Haj A, Hussein N, Abandah G: Combining cryptography and digital watermarking for secured transmission of Medical images. In: Proc. of the IEEE International Conference on Information Management. UK, 2016
Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20(8):784–791, 2001
Patel P, Patel Y: Secure and authentic DCT image steganography through DWT-SVD Based Digital Watermarking with RSA Encryption. In: Proc. of the IEEE fifth International Conference on Communication Systems and Network Technologies, 2015, pp. 736–739
Guo X, Zhuang T: A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64, 2009
Guo X, Zhuang T: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digital Imaging 22(6): 2009
Dragoi I, Coltuc D: On local prediction based reversible watermarking. IEEE Trans Image Process 124(4):1244–1246, 2015
Thodi D, Rodríguez J: Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721–30, 2007
Celik M, Sharma G, Tekalp M, Saber E: Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253–266, 2005
Su C, Huang J, Shih C, Chen Y: Reversible and embedded watermarking of medical images for telemedicine. In: Proc. of the first IEEE International Conference on Industrial Networks and Intelligent Systems. 2015, pp. 145–150
Wu J, et al: Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76, 2008
Chiang K, Chang K, Chang R, Yen H: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging 21:77–90, 2008
Liew S, Zain J: Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555–566, 2011
Liew S, Zain J: Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 24:114–125, 2011
Al-Qershi O, Khoo B: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24:114–125, 2011
Guo X, Zhuang T: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620–628, 2009
Tan C, Ng C, Xu X, Poh C, Yong L, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540, 2011
Mousavi S, Naghsh A, Abu-Bakar S: A heuristic automatic and robust ROI detection method for medical image watermarking. J Digit Imaging 28(4):417–427, 2015
Su PC, Wang HJ, Kuo CCJ: Digital image watermarking in regions of interest. In: Proceedings of the IS&T conference on image processing, image quality, image capture systems. Savannah, Georgia, 1999, pp 295–300
Eswaraiah R, Reddy E: Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process 9(8):615–625, 2015
Digital Imaging and Communications in Medicine (DICOM), part 15: security profiles ed., National Electrical Manufacturers Association (NEMA), pS 3.15–2001, 2001
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Al-Haj, A., Mohammad, A. & Amer, A. Crypto-Watermarking of Transmitted Medical Images. J Digit Imaging 30, 26–38 (2017). https://doi.org/10.1007/s10278-016-9901-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10278-016-9901-1