Enhancing Security in Medical Image Communication with ROI Based Lossless Watermarking and Novel Digital Signature

Umamageswari*, G.R.Suresh**
* Research Scholar, Sathyabama University, Chennai
** Professor, Easwari Engineering College, Chennai.
Periodicity:June - August'2013
DOI : https://doi.org/10.26634/jcom.1.2.2447

Abstract

The patient's information plays a very vital role for tele-diagnosis and tele-surgery in Medical Industry. Medical image content authentication is very important, since medical image contents are more and more widely distributed. Reversible watermarking becomes a promising technique to embed the information into medical images. This paper defines the Region of Interest (ROI) in an image and tries to embed data in Region of Non Interest (RONI). When medical image is shared through network, for the compression purpose, we propose the JPEG-LS algorithm and to provide security, to maintain secrecy, reliability and accessibility of embedded data we have proposed two Novel algorithms ACC(Advanced Classical Cipher) and SHA-I (Secure hash Algorithm) to produce the Digital Signature and used Arnold's cat map method (Arnold's Transform). Patient information, disease information and DS is embedded into DICOM images. Increase in authentication can be achieved when medical experts access secured medical images from web servers using Kerberos technique.

Keywords

Reversible Watermarking, Medical Image Security, Medical Image Compression, Authenticity and Integrity, Arnold's Cat Map Method, JPEG-LS Compression, Kerberos.

How to Cite this Article?

Umamageswari, A., and Suresh, G.R. (2013). Enhancing Security In Medical Image Communication With ROI Based Lossless Watermarking And Novel Digital Signature. i-manager’s Journal on Computer Science, 1(2) ,8-16. https://doi.org/10.26634/jcom.1.2.2447

References

[1]. GouenouCoatrieux., Clara le Guillou., J. Cauvin and Ch, Roux. (2009). Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Transaction on information technology in biomedicine, Vol.13,No.2,March.
[2]. G.Coatrieux., M. lamard., W. Daccache., j. Puentes., and C. Roux. (2005). A low distortion and reversible watermark application in angiographic images of the retina. In Proc. IEEE-EMBC, Shanghai, China, pp.2224- 2227.
[3]. W.Pan., G. Coatrieux., N. Cuppens-Boulahia., F. Cuppens and Ch. Roux. (2009). Medical image integrity control combining digital signature and lossless watermarking, published in 2nd SSETOP International Workshop On Autonomous And Spontaneous Security, Saint Malo: France, 2009, Version 1-14 Jan.
[4]. Micheal W. Marcellin., micheal J. Garmish., Ali Bilgin and Martin p.bolick. (2000). An overview of JPEG-2000,” in Proc IEEE data compression conference, pp.523-541.
[5].Joshua Raines., William Tolli., Joseph Holmes. (2004).VHDL Implementation of JPEG-LS Algorithm, SJBVHDL, October.
[6]. Changjiang Zhang et al (2008). Digital Image watermarking with Double encryption by Arnold Transform and Logistic, Fourth International Conference On Networked Computing & Advanced Information Management, pp. 329-334.
[7]. C.Y.Lin and S.F. Chang. (2001). Arobust image authentication method distinguishing jpeg compression from malicious manipulation, IEEE Trans. On Circuits and Systems of Video Technology, 11:153--168, Feb.
[8]. F.A. Petitcolas, R.Anderson, and M. Kuhn (1999). Information hiding: A survey. Proceedings of the IEEE, July, Vol. 87, pp. 1062—1078.
[9]. Minati Mishra., Ashanta Ranjan Routary and Sunil kumar. (2012). High Security Image Steganography with modified Arnold's cat map method, International Journal Of Computer Application (0975-8887), Vol 37-No9, Jan.
[10]. Shima Ramesh Maniyath and Supriya. M. (2011). An uncompressed Image encryption algorithm based on DNA Sequencesin CCSEA, CS &IT-CSCP.
[11]. G. C. Langelaar., I. Setyawan., and R. I. Lagendijk. (2000). Watermarking Digital Image and Video Data, in IEEE Signal Processing Magazine, pp. 20- 46, September.
[12]. Gcoatrieux., Clara le Guillou., J. Cauvin., L. locarnu and Ch, Roux. (2006). Enhancing shared medical image functionalities with image knowledge digest and watermarking, presented in the IEEE EMBCconf.Int.Technol. Appl.Biomed.Joannina, Greece, Oct
[13]. Digital imaging and Communication in Medicine ( DICOM)Standard.(2007)[online] . Available:www.nema.org.
[14]. C.C.Chang and I.C.Lin.(2004).Remarks in fingerprint-based remote user authentication scheme using smart cards, ACM operating system review, Vol.38, no.3, pp.91-100, Oct.
[15]. C.C. Chang., W.L. Tai and M.H. Lin. (2005). A reversible data hiding scheme with modified side match vector quantization, in Proc Of The International Conference On Advanced Information Networking And Applications, Vol.1,pp.947-952, Tai-Wan,March.
[16]. Mohammad Reza Keyvanpour., FarnooshMerrikh- Bayat (2010). A new encryption method for secure embedding in image watermarking, in Proc Third International Conference On Advanced Computer Theory And Engineering, Vol2, pp.402-407.
[17]. GCoatrieux., Catherin Quantin., JulienMontagner., Manianne Fazza Francois-Andre Allert and Ch. Roux (2008). Water marking medical images with anonymous patient identification to verify authenticity. in the Health beyond the horizon, pp.667-672.
[18]. A. Umamageswari., M. FerniUkrit., Dr. G.R. Suresh (2011). A survey on security in medical image communication. International Journal Of Computer Application, Vol. 3, September, pp. 41-45.
[19]. RC Gonzalez, RE Wood (2006). Digital Image Processing, 2nd Ed, PHI, New Delhi.
[20]. Ma Li, XiaoshiZheng., yanlingZhao., huiminwu, Shifeng l. (2008). Robust algorithm of Digital Image water marking based on Discrete Wavelet Transform, Electronic Commerce and Security, International Symposium, on Volume, Issue, 3-5 August, pp.942-945.
[ 2 1 ] . Saied Qamirg h o l i p o u r k a s m a n i , Ahmadrezanaghsh-Nilchi (2008). A new Robust Digital Image Water marking technique based on Joint DWT-DCT transformation, Convergence and hybrid Information technology, ICCIT'08, Third International Conference, on 1113, Vol:2, pp.539-544.
[22]. William stallings. (2010). Cryptography and network security.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.