A novel approach to medical image watermarking for tamper detection and recovery of region of interest using block compression and checksum

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Effective use of telecommunication and information technology in telemedicine increases the medical services to the patients who are from far away locations. The doctors provide these services by evaluating the patient details & scans like CT Scan, MRI and Ultra Sound. The patient information is exchanged between doctors and patients on a public network which is not safe. In medical image, specific regions are very important to diagnosis known as Region of Interest (ROI) and the rest of the regions are not of much importance known as Region of Non-Interest (RONI). Providing security to the ROI is an important issue hence medical image watermarking is used to transmit the medical images by embedding the ROI into RONI. At the destination, if tampering is found in ROI then recovery of ROI is possible by extracting the ROI from RONI. In the proposed method, the medical image is divided into three parts: BORDER, ROI and RONI. Further the ROI and RONI are divided into blocks and each ROI block is mapped to RONI block by applying division hash function. Lossless block compression technique is applied to each ROI block and embedded the compressed ROI block into mapped RONI block. To provide authenticity to ROI, checksum is calculated for ROI and embed this checksum in BORDER. Again checksum is calculated for each ROI block and placed in mapped RONI blocks. Whether ROI is tampered or not, is to be identified by extracting the checksum from BORDER and if it is tampered then recover the ROI by mapped RONI. The efficiency of the proposed algorithm is estimated by the performance measures mainly Peak Signal to Noise Ratio (PSNR). The proposed method gives good results on average 55 dB of PSNR compared to the previous methods [21] by efficiently compressing the ROI and by checking the authenticity.

  • Keywords

    Region of Interest; Region of Non-Interest; Division Hash Function; Lossless Block Compression; Checksum.

  • References

      [1] Lee WB, Lee CD. A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Trans Inf Technol Biomed. 2008; 12 (1):34-41. https://doi.org/10.1109/TITB.2007.906101.

      [2] Kocabas O, Soyata T, Aktas MK. Emerging Security Mechanisms for Medical Cyber Physical Systems. IEEE/ACM Trans Comput Biol Bioinform. 2016; 13(3):401-16. https://doi.org/10.1109/TCBB.2016.2520933.

      [3] Nyeem H, Boles W, Boyd C. A review of medical image watermarking requirements for teleradiology. J Digit Imaging. 2013; 26(2):326-43. https://doi.org/10.1007/s10278-012-9527-x.

      [4] Pujar JH, Kadlaskar LM. A new lossless method of image compression and decompression using Huffman coding techniques. Journal of Theoretical & Applied Information Technology. 2010; 15.

      [5] BW TA, Permana FP, editors. Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. Communication, Networks and Satellite (ComNetSat), 2012 IEEE International Conference on; 2012: IEEE.

      [6] Liew S-C, Liew S-W, Zain JM. Reversible medical image watermarking for tamper detection and recovery with Run Length Encoding compression. World Academy of Science, Engineering and Technology. 2010; 72:799-803.

      [7] Al-Qershi OM, Khoo BE. Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. Journal of Digital Imaging. 2011; 24(1):114-25. https://doi.org/10.1007/s10278-009-9253-1.

      [8] Kundu MK, Das S, editors. Lossless ROI medical image watermarking technique with enhanced security and high payload embedding. Pattern Recognition (ICPR), 2010 20th International Conference on; 2010: IEEE.

      [9] Chiang K-H, Chang-Chien K-C, Chang R-F, Yen H-Y. Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. Journal of Digital Imaging. 2008; 21(1):77-90. https://doi.org/10.1007/s10278-007-9012-0.

      [10] Pandey R, Singh AK, Kumar B, Mohan A. Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimedia Tools and Applications. 2016; 75 (22):14381-97. https://doi.org/10.1007/s11042-016-3536-6.

      [11] Kumar B, Anand A, Singh S, Mohan A. High capacity spread-spectrum watermarking for telemedicine applications. World Academy of Science, Engineering and Technology. 2011; 79:2011.

      [12] Nambakhsh M-S, Ahmadian A, Zaidi H. A contextual based double watermarking of PET images by patient ID and ECG signal. Computer methods and programs in biomedicine. 2011; 104 (3):418-25. https://doi.org/10.1016/j.cmpb.2010.08.016.

      [13] Ansari IA, Pant M, Ahn CW. SVD based fragile watermarking scheme for tamper localization and self-recovery. International Journal of Machine Learning and Cybernetics. 2016; 7(6):1225-39. https://doi.org/10.1007/s13042-015-0455-1.

      [14] Viswanathan P, Krishna PV. A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology. IEEE journal of biomedical and health informatics. 2014; 18(3):753-64. https://doi.org/10.1109/JBHI.2013.2281322.

      [15] Gaidhane VH, Hote YV, Singh V. A new approach for estimation of eigenvalues of images. International Journal of Computer Applications. 2011; 26 (9):1-6. https://doi.org/10.5120/3136-4324.

      [16] Hashemi-Berenjabad S, Mahloojifar A, Akhavan A, editors. Threshold based lossy compression of medical ultrasound images using contourlet transform. Biomedical Engineering (ICBME), 2011 18th Iranian Conference of; 2011: IEEE. https://doi.org/10.1109/ICBME.2011.6168553.

      [17] Badshah G, Liew S-C, Zain JM, Hisham SI, Zehra A. Importance of watermark lossless compression in digital medical image watermarking. Research Journal of Recent Sciences ISSN. 2015; 2277:2502.

      [18] Al-Haj A, Mohammad A. Crypto-watermarking of transmitted medical images. Journal of digital imaging. 2017; 30(1):26-38. https://doi.org/10.1007/s10278-016-9901-1.

      [19] Al-Haj A. Secured telemedicine using region-based watermarking with tamper localization. Journal of digital imaging. 2014; 27(6):737-50. https://doi.org/10.1007/s10278-014-9709-9.

      [20] Khor HL, Liew S-C, Zain JM. Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images. Journal of digital imaging. 2017; 30(3):328-49. https://doi.org/10.1007/s10278-016-9930-9.

      [21] Eswaraiah R, Reddy ES. Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. International journal of telemedicine and applications. 2014; 2014:13. https://doi.org/10.1155/2014/984646.




Article ID: 12855
DOI: 10.14419/ijet.v7i4.12855

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.