Secure Transmission and Recovery of Embedded Patient Information from Biomedical Images of Different Modalities through a Combination of Cryptography and Watermarking

Full Text (PDF, 987KB), PP.18-31

Views: 0 Downloads: 0

Author(s)

Subhajit Koley 1,* Koushik Pal 2 Goutam Ghosh 2 Mahua Bhattacharya 3

1. Electronics & Communication Engineering, Guru Nanak Institute of Technology, Kolkata, India

2. Institute of Radio Physics and Electronics, University of Calcutta, Kolkata, India

3. Indian Institute of Information, Technology and Management, Gwalior, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2014.04.03

Received: 2 Dec. 2013 / Revised: 28 Dec. 2013 / Accepted: 5 Feb. 2014 / Published: 8 Mar. 2014

Index Terms

Biomedical image, Cryptography, Watermarking, LSB, ASCII, attacks, image quality metrics

Abstract

In this paper a new type of information hiding skill in biomedical images is proposed through a combination of cryptography and digital watermarking to achieve the enhancement in confidential and authenticated data storage and secured transmission. Here patient's name and doctor's name are considered as patient's information which is encrypted using cryptography and embedded in the scan image of that patient through watermarking. RSA algorithm is used for encryption and higher order bit LSB replacement technique is used for embedding the information. The private keys are also embedded in the cover image to have better security and accurate recovery of the hidden information. The outcome of the proposed methodology shows that the hidden information doesn't affect the cover image and it can be recovered efficiently even from several noisy images. The strength of the proposed embedding scheme is also supported by several image quality matrices.

Cite This Paper

Subhajit Koley, Koushik Pal, Goutam Ghosh, Mahua Bhattacharya,"Secure Transmission and Recovery of Embedded Patient Information from Biomedical Images of Different Modalities through a Combination of Cryptography and Watermarking", IJIGSP, vol.6, no.4, pp.18-31, 2014. DOI: 10.5815/ijigsp.2014.04.03

Reference

[1]Rajendra Acharya U., P. Subbanna Bhat, Sathish Kumar, Lim Choo Min, "Transmission and storage of medical images with patient information, Computers in Biology and Medicine" 33, pg. 303–310, 2003.

[2]F. Cao, H. K. Huang, X. Q. Zhou, "Medical image security in a HIPAA mandated PACS environment". Computerized Medical Imaging and Graphics, 27 (2-3), pg. 185-196, 2003.

[3]Jasni Zain and Malcolm Clarke, "Security In Telemedicine: Issues In Watermarking Medical Images," Sciences of Electronic, Technologies of Information and Telecommunications, Tunisia, 2005.

[4]R. Ibrahim, T. S. Kuan, Steganography Imaging (SIS): "Hiding Secret Message inside an Image". Proceedings of the World Congress on Engineering and Computer Science, San Francisco, USA. 2010.

[5]Nayak, P Subbanna Bhat, R. Acharya and Niranjan; "Simultaneous storage of medical images in the spatial and frequency domain: a comparative study"; BioMedical Engineering OnLine , pp:3-17,2004.

[6]G N Swamy, K Srinivasa Rao, A Ravi Kumar; "A watermarking technique based on visual cryptography"; Journal of Information Assurance and Security 4, pp:470-473,2009.

[7]J. Dittmann, P. Wohlmacher, Klara Nahrstedt; "Multimedia and security using cryptographic and watermarking algorithm" ieee multimedia © IEEE, 2001.

[8]Behrouz A. Forouzan, Data Communications and Networking, 4/e, McGraw-Hill Higher Education, ISBN: 0072967757, 2007.

[9]G. Langelaar, I. Setyawan, R. Lagendijk, Watermarking digital image & video data. IEEE Signal Processing Magazine, pg. 20-46, 2000.

[10]A. Tirkel, G. Rankin, R. V. Schyndel, H. Mee, N. Osborne, Electronic watermark. In Proceedings of DICTA. pg. 666–672, 1993.

[11]A. K. Jain, "Fundamentals of Digital Image Processing", Prentice–Hall, Englewood Cliffs, NJ.

[12]I. J. Cox, M. Miller, J. Bloom, "Digital Watermarking," Morgan Kaufmann Publishers, 2002.

[13]W. K. Pratt, Digital Image Processing 4th Edition, John Wiley & Sons, Inc., Los Altos, California, 2007.

[14]R. C. Gonzalez and R.E. Woods, Digital Image Processing 2nd Edition, Prentice Hall, New Jersey, 2002.

[15]B. Smithal and K.A. Navas, "Spatial Domain- High Capacity Data Hiding in ROI Images", IEEE - ICSCN 2007.

[16]E. Koch, J. Rindfrey, J. Zhao, Copyright protection for multimedia data. In Proceeding sof the Int. Conf. on Digital Media and Electronic Publishing, 1994.

[17]T. Lehmann, A. Sovakar, W. Schmitt, R. Repges, "A comparison of similarity measures for digital subtraction radiography". Comput. Biol. Med. 27, pg. 151–167, 1997.

[18]H. M. Chao, C. M. Hsu, and S. G. Miaou, "A data-hiding technique with authentication, integration, and confidentiality for electronic patients records," in the IEEE Transactions Information Technology in Biomedicine, pp. 46-53, 2002.

[19]S. Walton, "Information authentication for a slipppery new age", Dr. Dobbs Journal, vol. 20, no. 4, pp.18-26, 1995. 

[20]Yang,Y. and Bao, F., "An Invertible Watermarking Schemes for Authentication of Electronic Clinical Brain Atlas", ICASSP, 2003.

[21]K. Pal, G. Ghosh, M. Bhattacharya, "A Novel Digital image Watermarking Scheme for Data Security using Bit Replacement and Majority Algorithm Technique", Watermarking, Vol 1, ISBN- 979-953-307-583-8, INTECH Publication, Croatia, Europe, pp-117-132, 2012.

[22]A. Umaamaheshvari, K. Thanushkodi; "high performance and effective watermarking scheme for medical images"; European Journal of Scientific Research,ISSN 1450-216X Vol.67 No.2, pp:283-293, 2012.

[23]C. Song, S. Sudiman, M. Merabti, "A Spatial and Frequency Domain Analysis of the Effect of Removal Attacks on Digital Image Watermarks" ISBN: 978-1-902560-24-3, PGNet, 2012.

[24]J.Samuel Manoharan, Dr.Kezi C.Vijila, A.Sathesh, "Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding Techniques towards Geometric Attacks", International Journal of Security (IJS), Volume (4) : Issue (3) pp. 28-37.

[25]K. Pal, G. Ghosh, M. Bhattacharya, "Retrieval of Hidden Infected Region using Biomedical Image Watermarking for Tele-diagnosis to Ensure Better Treatment", IEEE International Conference on Computers & Devices for Communication, Kolkata, 17-19 December 2012.

[26]K. Pal, G. Ghosh, M. Bhattacharya, "Reversible Digital Image Watermarking using Bit Replacement and Majority Algorithm Technique", Journal of Intelligent Learning Systems and Applications, ISSN: 2150-8402, Scientific Research Incorporation group, USA, Vol 4, Number-3, pp.199-206, August 2012.

[27]M. Eskicioglu and P. S. Fisher, "Image Quality Measures and Their Performance," IEEE Transactions on Communications, vol. 43, no. 12, pp. 2959-2965, December 1995.

[28]S. Koley, K. Pal, G. Ghosh, M. Bhattacharya, "Extraction and Authentication of Hidden Patient's Information from Biomedical Image through Crypto-Watermarking Technique", ISBN: 978-81-923777-9-7, pp. 183-188, 2013.

[29]K. Pal, G. Ghosh, M. Bhattacharya, "Biomedical Watermarking: An Emerging and Secure Tool for Data Security and Better Tele-d iagnosis in Modern Health Care System"- in "Research Development in Computer Vision and Image Processing: Methodologies and Applications", ISBN: 9781466645585, IGI Global, Pennsylvania, USA, pp-208-234, DOI:10.4018/978-1-4666-4558-5.ch012, Aug, 2013.