Skip to main content

Advertisement

Log in

Crypto-Watermarking of Transmitted Medical Images

  • Published:
Journal of Digital Imaging Aims and scope Submit manuscript

Abstract

Telemedicine is a booming healthcare practice that has facilitated the exchange of medical data and expertise between healthcare entities. However, the widespread use of telemedicine applications requires a secured scheme to guarantee confidentiality and verify authenticity and integrity of exchanged medical data. In this paper, we describe a region-based, crypto-watermarking algorithm capable of providing confidentiality, authenticity, and integrity for medical images of different modalities. The proposed algorithm provides authenticity by embedding robust watermarks in images’ region of non-interest using SVD in the DWT domain. Integrity is provided in two levels: strict integrity implemented by a cryptographic hash watermark, and content-based integrity implemented by a symmetric encryption-based tamper localization scheme. Confidentiality is achieved as a byproduct of hiding patient’s data in the image. Performance of the algorithm was evaluated with respect to imperceptibility, robustness, capacity, and tamper localization, using different medical images. The results showed the effectiveness of the algorithm in providing security for telemedicine applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Fiaidhi J, Kuziemsky C, Mohammed S, Weber J, Topaloglou T: Emerging IT trends in healthcare and well-being. IT Prof 18(3):9–13, 2016

    Article  Google Scholar 

  2. Saranummi N: In the spotlight: health information systems. IEEE Rev Biomed Eng 6:21–23, 2013

    Article  PubMed  Google Scholar 

  3. Huang HK: PACS and imaging informatics: basic principles and applications. Wiley-Blackwell, New York, 2010

    Google Scholar 

  4. Kocabas O, Soyata T, Aktas M: Emerging security mechanisms for medical cyber physical systems. IEEE/ACM Trans Comput Biol Bioinform 13(3):401–416, 2016

    Article  PubMed  Google Scholar 

  5. The Health Insurance Portability and Accountability Act (HIPAA), March 2009. [Online]. Available at: http://www.hhs.gov/ocr/privacy/index.html

  6. Lee W, et al: A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Trans Inf Technol Biomed 12(1):34–41, 2008

    Article  PubMed  Google Scholar 

  7. Schneier B. Applied cryptography. Wiley, 1995

  8. Mousavi S, Naghsh A, Abu-Bakar S: Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729, 2014

    Article  PubMed  PubMed Central  Google Scholar 

  9. Digital Imaging and Communications in Medicine (DICOM) Standard, DICOM. (2006). [Online]. Available: http://medical.nema.org/dicom/2006/

  10. Al-Haj A: Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images. J Digit Imaging 28(2):179–187, 2014

    Article  PubMed Central  Google Scholar 

  11. Al-Haj A, Abandah G, Hussein N: Crypto-based algorithms for secured medical image transmission. IET Inf Secur 9(6):365–373, 2015

    Article  Google Scholar 

  12. Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. In: Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine. USA, 2000, pp. 250–255

  13. Nyeem H, Boles W, Boyd C: A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326–343, 2012

    Article  PubMed Central  Google Scholar 

  14. Al-Haj A, Amer A: Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 8(3):737–750, 2014

    Article  Google Scholar 

  15. Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C: Medical image integrity control combining digital signature and lossless watermarking. Data Privacy Manage. Autonom. Spontaneous Sec. (LNCS), vol. 5939, 2010, pp. 153–162

  16. Zope-Chaudhari S, Venkatachalam P, Buddhiraju K: Secure dissemination and protection of multispectral images using crypto watermarking. IEEE J Sel Top Appl Earth Observ Remote Sens 8(11):5388–5394, 2015

    Article  Google Scholar 

  17. Al-Haj A, Hussein N, Abandah G: Combining cryptography and digital watermarking for secured transmission of Medical images. In: Proc. of the IEEE International Conference on Information Management. UK, 2016

  18. Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20(8):784–791, 2001

    Article  CAS  PubMed  Google Scholar 

  19. Patel P, Patel Y: Secure and authentic DCT image steganography through DWT-SVD Based Digital Watermarking with RSA Encryption. In: Proc. of the IEEE fifth International Conference on Communication Systems and Network Technologies, 2015, pp. 736–739

  20. Guo X, Zhuang T: A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64, 2009

    Article  PubMed  Google Scholar 

  21. Guo X, Zhuang T: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digital Imaging 22(6): 2009

  22. Dragoi I, Coltuc D: On local prediction based reversible watermarking. IEEE Trans Image Process 124(4):1244–1246, 2015

    Article  Google Scholar 

  23. Thodi D, Rodríguez J: Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721–30, 2007

    Article  PubMed  Google Scholar 

  24. Celik M, Sharma G, Tekalp M, Saber E: Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253–266, 2005

    Article  PubMed  Google Scholar 

  25. Su C, Huang J, Shih C, Chen Y: Reversible and embedded watermarking of medical images for telemedicine. In: Proc. of the first IEEE International Conference on Industrial Networks and Intelligent Systems. 2015, pp. 145–150

  26. Wu J, et al: Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76, 2008

    Article  PubMed  Google Scholar 

  27. Chiang K, Chang K, Chang R, Yen H: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging 21:77–90, 2008

    Article  PubMed  Google Scholar 

  28. Liew S, Zain J: Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555–566, 2011

    Google Scholar 

  29. Liew S, Zain J: Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 24:114–125, 2011

    Article  Google Scholar 

  30. Al-Qershi O, Khoo B: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24:114–125, 2011

    Article  PubMed  Google Scholar 

  31. Guo X, Zhuang T: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620–628, 2009

    Article  PubMed  Google Scholar 

  32. Tan C, Ng C, Xu X, Poh C, Yong L, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540, 2011

    Article  PubMed  Google Scholar 

  33. Mousavi S, Naghsh A, Abu-Bakar S: A heuristic automatic and robust ROI detection method for medical image watermarking. J Digit Imaging 28(4):417–427, 2015

    Article  PubMed  PubMed Central  Google Scholar 

  34. Su PC, Wang HJ, Kuo CCJ: Digital image watermarking in regions of interest. In: Proceedings of the IS&T conference on image processing, image quality, image capture systems. Savannah, Georgia, 1999, pp 295–300

  35. Eswaraiah R, Reddy E: Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process 9(8):615–625, 2015

    Article  Google Scholar 

  36. Digital Imaging and Communications in Medicine (DICOM), part 15: security profiles ed., National Electrical Manufacturers Association (NEMA), pS 3.15–2001, 2001

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Al-Haj.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Haj, A., Mohammad, A. & Amer, A. Crypto-Watermarking of Transmitted Medical Images. J Digit Imaging 30, 26–38 (2017). https://doi.org/10.1007/s10278-016-9901-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10278-016-9901-1

Keywords

Navigation