An Overview of Digital Watermarking & Data Hiding Techniques for Secure Transmission of Medical Images K. ANUSUDHA. Assistant Professor

Similar documents
International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 9, September 2012)

Security and protection of digital images by using watermarking methods

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

CHAPTER 7 CONCLUSION AND FUTURE WORK

Image Authentication Scheme using Digital Signature and Digital Watermarking

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

Security Based Data Transfer and Privacy Storage through Watermark Detection

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

Multimedia Document Authentication using On-line Signatures as Watermarks

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

Safer data transmission using Steganography

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

Friendly Medical Image Sharing Scheme

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Triple Security of Information Using Stegnography and Cryptography

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs

Effective Management of Medical Information through ROI-Lossless Fragile Image Watermarking Technique

A comprehensive survey on various ETC techniques for secure Data transmission

Multi-factor Authentication in Banking Sector

A Concept of Digital Picture Envelope for Internet Communication

Data Hiding: Current Status and Key Issues

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Review of Medical Image Watermarking Requirements of Teleradiology

Parametric Comparison of H.264 with Existing Video Standards

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

The Mathematics of the RSA Public-Key Cryptosystem

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

A Secure Data Transmission By Integrating Cryptography And Video Steganography

Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar

Reversible Data Hiding for Security Applications

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Signature Amortization Technique for Authenticating Delay Sensitive Stream

A Factoring and Discrete Logarithm based Cryptosystem

Securing MANET Using Diffie Hellman Digital Signature Scheme

CSCE 465 Computer & Network Security

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE

MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION

Image Compression through DCT and Huffman Coding Technique

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

Secure File Transfer Using USB

Steganography and Visual Cryptography in Computer Forensics

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation

Computer Security: Principles and Practice

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Side Channel Analysis and Embedded Systems Impact and Countermeasures

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Peer-to-Peer Networks Anonymity (1st part) 8th Week

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Symmetric Key cryptosystem

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?

CS 758: Cryptography / Network Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

International ejournals

CHAPTER 1 INTRODUCTION

Single Sign-On Secure Authentication Password Mechanism

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Cryptography and Network Security Chapter 10

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secured Medical Information Transmission Using Chaos Through Cloud Computing

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Database Migration over Network

Fuzzy Keyword Search over Encrypted Stego in Cloud

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Monitoring Data Integrity while using TPA in Cloud Environment

Turgut Ozal University. Computer Engineering Department. TR Ankara, Turkey

Multiple Embedding Using Robust Watermarks for Wireless Medical Images

SCAN-CA Based Image Security System

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

International Journal of Advanced Computer Technology (IJACT) ISSN: Least Significant Bit algorithm for image steganography

Provisioning of Compression and Secure Management Services for Healthcare Data in Cloud Computing

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme

Chapter 23. Database Security. Security Issues. Database Security

encoding compression encryption

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Public Key Cryptography and RSA. Review: Number Theory Basics

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach

Transcription:

THE DICOM 2013 INTERNATIONAL CONFERENCE & SEMINAR March 14-16 Bangalore, India An Overview of Digital Watermarking & Data Hiding Techniques for Secure Transmission of Medical Images K. ANUSUDHA Assistant Professor Department of Electronics Engineering, Pondicherry University, Pondicherry, India.

Content Research Aim Origin of the Problem Need for Medical Image Security Components of Medical Image Security Digital Watermarking Techniques Data Hiding Techniques Conclusions References Contact info of Presenter 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 2

Research Aim The main focus is to provide secure medical image transaction as the exchange of medical reference data done via unsecured open networks leads to the condition of changes to occur in medical images and creates a threat which results in undesirable outcome. 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 3

Origin of the Problem Modern Health care Infrastructure. Easy access of medical information. Maintenance of Electronic Health record. Sheer amount of database. 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 4

Need for Medical Image Security To avoid: False insurance claim. Distribution of famous persons reports to tabloids. Misinterpreted Telediagnosis results. Escaping from crime. 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 5

Components of Medical Image Security SECURITY CONFIDENTIALITY RELIABILITY AVAILABILITY INTEGRITY AUTHENTICITY 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 6

Digital Watermarking Technique Digital watermarking is a steganographic technique which concentrates on providing authentication, copyright protection and ownership identification. Features: Imperceptible Robust Oblivious/Non-oblivious Payload size 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 7

Classification Domain Type of Document Human Perception Application Spatial Frequency Source Destination Text Image Audio Video Invisible Visible Robust Fragile Private Public 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 8

Relevance Cover Content: Secret message: Domain: Types: Medical Data EPR, Doctors ID, Hospital logo, UIN. Spatial & frequency ROI/RONI based 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 9

Data Hiding Technique Cryptographic techniques can be combined with Digital watermarking to increase the level of security. Features: Key generation Computational efficient 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 10

Performance Metrics Mean Square Error (MSE) Peak Signal to Noise Ratio (PSNR) 1 2 n 10log 10 * I I 2 max MSE I 2 Image Fidelity (IF) Number of Pixels Change Rate (NPCR) 1 * I I 2 2 I Unified Average Changing intensity (UACI) 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 11

SCHEME I SELECTIVE PLANE REPLACEMENT WATERMARKING 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 12

Proposed Block Diagram Embedding Block Medical Image Hospital Logo Bit Plane slicing RSA Encryption LSB plane of medical Image Encrypted Hospital Logo Reconstruction of the Medical Image Replacement of the LSB plane of the medical image with the MSB plane Encrypted image embedded into the MSB Plane of Medical Image Extraction Block Received Medical Image Bit Plane Slicing Extract LSB Plane RSA Decryption Hospital Logo 1-Apr-13 Medical Image Security 13

Embedding Process - Algorithm Step 1: The input medical image undergoes bit plane slicing. Image is partitioned to eight planes (LSB-MSB). Step 2: Hospital logo is considered as the secret image and is the input for RSA encryption. Step 3: The secret image is then encrypted using the RSA encryption method, C=M e mod n where: C - Encrypted image, M - Secret image e - Public key and n - Multiplicand of prime numbers (p,q) Step 4: The encrypted image bits replaces the MSB plane bits of the Medical image. Step 5: The MSB plane is replaced in place of the LSB plane of the medical image. Step 6: All the planes are reconstructed back to form the Secured Medical image. 1-Apr-13 Medical Image Security 14

Extraction Process - Algorithm Step 1: The received Medical image is passed on for Bit plane slicing. Step 2: The LSB plane is recovered and applied for RSA decryption. Step 3: The secret message is retrieved from the LSB plane using the RSA decryption method, where M=C d mod n Where: C - Encrypted Image d - Private Key 1-Apr-13 Medical Image Security 15

Simulation Results CT Image (512x 512) Hospital Image (221x228) 1-Apr-13 Medical Image Security 16

Simulation Results Bit Plane Slicing of CT image Encrypted Hospital Image Data hided MSB plane of CT Image 1-Apr-13 Medical Image Security 17

Simulation Results Reconstructed CT Image Recovered LSB plane Decrypted Hospital logo 1-Apr-13 Medical Image Security 18

Performance Analysis 1-Apr-13 Medical Image Security 19

Merits of Scheme I Can be applied for all types digital Medical Images. Size of the payload is flexible. ROI of the image is not disturbed. Withstands various attacks. 1-Apr-13 Medical Image Security 20

SCHEME II STREAM CIPHERED SPREADING WATERMARKING 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 21

Proposed Block Diagram Embedding Block Medical Image ROI Extraction Key generated from the Medical image Secret Key Stream Ciphering Encrypted ROI Spreading Diffie Hellman Algorithm Watermarked Medical Image Extraction Block Key Generated from the Medical Image Secret Key Watermarked Medical Image Correlation calculation ROI Extracted Stream Ciphering Extracted ROI Diffie Hellman Algorithm Key 1-Apr-13 Medical Image Security 22

Embedding Process - Algorithms Step 1: ROI portion is extracted from the medical image. Step 2:64 bit - PRNG sequence is generated and the bit stream is divided into groups of eight bits to form eight 8 bit key sequences. Step 3: The ROI portion is divided into 8x8 blocks and each pixel is multiplied with the 8 bit key sequences and encrypted using stream ciphering technique. Step 4: The same 64 bit random binary sequence is used for generating the Diffie Hellman Key generation. Step 5: The key generated by the Diffie Hellman algorithm is added to every encrypted stream ciphered pixel Values thereby the Encrypted portion of ROI is obtained which acts as the Watermark. Step 6: A pseudo random key generated from the medical image is used for spreading the encrypted watermark on to the medical image to generate the watermarked medical image. 1-Apr-13 Medical Image Security 23

Extraction Process - Algorithms Step 1: The correlation between the received watermarked image and the Pseudo random sequence is calculated. Step 2: The correlation value is used as the threshold for despreading the watermark. Step 3:The obtained watermark is decrypted by the Diffie-Hellman algorithm key and the 64 bit sequence. 1-Apr-13 Medical Image Security 24

Simulation Results MRI Image (512x512) ROI portion of the Cover image encrypted ROI Watermarked MRI image Zoomed retrieved ROI from the watermarked Image 1-Apr-13 Medical Image Security 25

Performance Analysis 1-Apr-13 Medical Image Security 26

Performance Analysis 1-Apr-13 Medical Image Security 27

Merits of Scheme II Can be applied for any Medical Image. ROI is ciphered to act as the watermark. Payload size is flexible. Withstands various attacks. 1-Apr-13 Medical Image Security 28

Key Issues Size of the payload Region based algorithms Withstand all types of Image processing attacks High fidelity 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 29

Conclusion The approach of providing security to medical images by combining Digital watermarking and data hiding techniques is an added feature to the distribution of DICOM standard images. 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 30

References 1. V. Fotopoulos, M. L. Stavrinou, A. N. Skodras, "Medical Image Authentication and Self-Correction through an Adaptive Reversible Watermarking Technique", IEEE Transaction on Bio-Informatics and Bio-Engineering, pp. 1-5, October 2008. 2. H.-K. Lee, H.-J. Kim, K.-R. Kwon, J. K. Lee, "ROI Medical Image Watermarking Using DWT and Bitplane", ACM Journal on Image Computing, 3-5, October 2005. 3. Cao, F., Huang, H.K. and Zhou, X.Q., Medical image security in a HIPAA mandated PACS environment. Computerized Medical Imaging and Graphics, IEEE transaction on Image Processing 27(2-3), pp. 185-196, 2003. 4. Zkou, X.Q., Huang, H.K. and Lou, S.L., Authenticity and integrity of digital mammography images. IEEE Transactions on Medical Imaging, 20(8), pp. 784-791, 2001. 5. Chao, H.M., Hsu, C.M. and Miaou, S.G., A data-hiding technique with authentication, integration, and confidentiality for electronic patients records, IEEE Transactions Information Technology in Biomedicine, 6, pp. 46-53, 2002. 6. Wang Yan and Ling-di Ping, A New Steganography Algorithm Based on Spatial Domain,Journal on Information Science and Engineering,vol 6,45-51,2009. 7. Ran Zan Wang, Chi-Fang Lin, Ja Chen Lin, Hiding data in images by optimal moderately significant bit replacement Pattern Recognition, Vol 3, pp 671-683, 2001. 8. Chi-Kwong Chan et al, Hidden data in images by simple LSB substitution, Elsevier Pattern Recognition, Vol 37,pp 469-474,2004. 9. Chin Chen Chang et al, A watermarking based image ownership and tampering authentication scheme Pattern recognition letter Vol 27,pp 439-446,2006. 10. Dalel Bouslimi et al, A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images, Computer methods and programs in biomedicine, Vol 106, pp 47-54, 2012. 11. Mustafa Ulutas, Guzin Ulutas and Vasif, Medical Image security and EPR hiding using Shamir s secret sharing scheme, ACM Journal of systems and software,vol 84, pp 341-353,2011. 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 31

Author Contacts K. Anusudha E-mail: anusudhak@yahoo.co.in, anusudha.dee@pondiuni.edu.in Department of Electronics Engineering, Pondicherry University. N. Venkateswaren E-mail: venkateswarann@ssn.edu.in Department of ECE, SSN College of Engineering. 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 32

Thank you for your attention!!! 4/1/2013 Secure Transmission of Medical Images - K.ANUSUDHA 33