Skip to main content

Advertisement

Log in

Secured Telemedicine Using Region-Based Watermarking with Tamper Localization

  • Published:
Journal of Digital Imaging Aims and scope Submit manuscript

Abstract

Medical images exchanged over public networks require a methodology to provide confidentiality for the image, authenticity of the image ownership and source of origin, and image integrity verification. To provide these three security requirements, we propose in this paper a region-based algorithm based on multiple watermarking in the frequency and spatial domains. Confidentiality and authenticity are provided by embedding robust watermarks in the region-of-non-interest (RONI) of the image using a blind scheme in the discrete wavelet transform and singular value decomposition domain (DWT-SVD). On the other hand, integrity is provided by embedding local fragile watermarks in the region-of-interest (ROI) of the image using a reversible scheme in the spatial domain. The integrity provided by the proposed algorithm is implemented on a block-level of the partitioned-image, thus enabling localized detection of tampered regions. The algorithm was evaluated with respect to imperceptibility, robustness, capacity, and tamper localization capability, using MRI, Ultrasound, and X-ray gray-scale medical images. Performance results demonstrate the effectiveness of the proposed algorithm in providing the required security services for telemedicine applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Davie B, Florence V, Friede A, Sheehan J, Sisk J: Bringing health-care applications to the internet. IEEE Internet Comput 5(3):42–46, 2001

    Article  Google Scholar 

  2. McEvoy F, Svalastoga E: Security of patient and study data associated with DICOM images when transferred using compact disc media. J Digit Imaging 22(1):65–70, 2007

  3. Norcen R, Podesser M, Pommer A, Schmidt HP, Uhl A: Confidential storage and transmission of medical image data. Comput Biol Med 33:277–292, 2003

    Article  CAS  PubMed  Google Scholar 

  4. Kobayashi L, Furuie S, Barreto P: Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13(4):582–589, 2009

    Article  PubMed  Google Scholar 

  5. Rodrigues JM,Puech W, Fiorio C: Lossless crypto-data hiding in medical images without increasing the original image size. In: Proc. 2nd Int. Conf. Adv. Med. Signal Inf. Process., Sep. 2004, pp 358–365

  6. Bernarding J, Thiel A, Grzesik A: A JAVA-based DICOM server with integration of clinical findings and DICOM-conform data encryption. Int J Med Inform 64:429–438, 2001

    Article  CAS  PubMed  Google Scholar 

  7. Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. In: Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine. Arlington, USA, Nov. 2000, pp 250–255

  8. Stallings W: Cryptography and Network Security—Principles and Practice. Prentice-Hall, Englewood Cliffs, 1999

    Google Scholar 

  9. Digital Imaging and Communications in Medicine (DICOM) Standard, DICOM: 2006. [Online]. Available: http://medical.nema.org/dicom/2006/

  10. Digital Imaging and Communications in Medicine (DICOM): part 15: security profiles ed., National Electrical Manufacturers Association (NEMA), 2001, pS 3.15–2001

  11. Cox IJ, Miller ML, Bloom JA: Digital Watermarking. Morgan Kaufmann, San Francisco, 2002, pp 26–36

    Google Scholar 

  12. Hartung F, Kutter M: Multimedia watermarking techniques. In: Proc. IEEE, vol. 87, no. 7, pp 1069–1107, July 2006

  13. Coatrieux G, Lecornu L, Sankur B, Roux Ch: A review of image watermarking applications in healthcare. Porc. of IEEE-EMBC Conf., New York, USA, 2006, pp 4691–4694

  14. Coatrieux G, Quantin C, Montagner J, Fassa M, Allaert FA, Roux Ch: “Watermarking medical images with anonymous patient identification to verify authenticity,” Studies Health Technol. Inf 136:667–672, 2008

  15. Coatrieux G, Maitre H, Sankur B: Strict integrity control of biomedical images. In: Proc. SPIE Security Watermarking Multimedia Contents III, SPIE 2001, vol. 4314, San Jose, CA January 2001, pp 229–240

  16. Chao H, Hsu C, Miaou S: A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6(1):46–53, 2002

    Article  PubMed  Google Scholar 

  17. Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20(8):784–791, 2001

    Article  CAS  PubMed  Google Scholar 

  18. De Vleeschouwer C, Delaigle J, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimed 5:97–105, 2003

    Article  Google Scholar 

  19. Tan C, Ng C, Xu X, Poh C, Yong L, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540, 2011

    Article  PubMed Central  PubMed  Google Scholar 

  20. Guo X, Zhuang T: A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64, 2009

    Article  PubMed Central  PubMed  Google Scholar 

  21. Alattar A: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13:1147–1156, 2004

    Article  PubMed  Google Scholar 

  22. Thodi D, Rodríguez J: Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721–730, 2007

    Article  PubMed  Google Scholar 

  23. Celik M, Sharma G, Tekalp M, Saber E: Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253–266, 2005

    Article  PubMed  Google Scholar 

  24. Celik MU M, Sharma G, Tekalp A: Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15:1042–1049, 2006

    Article  PubMed  Google Scholar 

  25. Zhou Z, Huang H, Liu B: Digital signature embedding (DSE) for medical image integrity in a data grid off-site backup archive. Proc SPIE 5748:306–317, 2005

    Article  Google Scholar 

  26. Liew S, Zain J: Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555–566, 2011

    Article  Google Scholar 

  27. Liew S, Way S, Zain J: Tamper localization and lossless recovery watermarking scheme with ROI Segmentation and Multilevel Authentication. J Digit Imaging 24:114–125, 2012

    Google Scholar 

  28. Osamah M, Khoo B: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24:114–125, 2011

    Article  Google Scholar 

  29. Guo X, Zhuang T: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620–628, 2009

    Article  PubMed Central  PubMed  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Al-Haj.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Haj, A., Amer, A. Secured Telemedicine Using Region-Based Watermarking with Tamper Localization. J Digit Imaging 27, 737–750 (2014). https://doi.org/10.1007/s10278-014-9709-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10278-014-9709-9

Keywords

Navigation