Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs



Similar documents
CHAPTER 7 CONCLUSION AND FUTURE WORK

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

WATERMARKING FOR IMAGE AUTHENTICATION

Image Authentication Scheme using Digital Signature and Digital Watermarking

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

Euler Vector: A Combinatorial Signature for Gray-Tone Images

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Reversible Data Hiding for Security Applications

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 9, September 2012)

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

Security and protection of digital images by using watermarking methods

Friendly Medical Image Sharing Scheme

Experimental DRM Architecture Using Watermarking and PKI

Secure cloud access system using JAR ABSTRACT:

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

Application-Specific Biometric Templates

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Master s Program in Information Systems

A comprehensive survey on various ETC techniques for secure Data transmission

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

Triple Security of Information Using Stegnography and Cryptography

Data Integrity by Aes Algorithm ISSN

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

ISSN: A Review: Image Retrieval Using Web Multimedia Mining

Information Security for Modern Enterprises

Multimedia Document Authentication using On-line Signatures as Watermarks

Journal of Electronic Banking Systems

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

Safer data transmission using Steganography

Multi-factor Authentication in Banking Sector

REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES

Chapter 23. Database Security. Security Issues. Database Security

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

How To Encrypt Data With A Power Of N On A K Disk

Colour Image Encryption and Decryption by using Scan Approach

An Oracle White Paper February Managing Unstructured Data with Oracle Database 11g

1 File Processing Systems

Security Based Data Transfer and Privacy Storage through Watermark Detection

Secured Lossless Medical Image Compression Based On Adaptive Binary Optimization

JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS. Department of Electrical Engineering University of Hagen D Hagen, Germany

A Study of New Trends in Blowfish Algorithm

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop Presented by An In seok

Extracting, Storing And Viewing The Data From Dicom Files

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns

SCAN-CA Based Image Security System

How To Ensure Correctness Of Data In The Cloud

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

ADVANCE SECURITY TO CLOUD DATA STORAGE

DATABASE SECURITY, INTEGRITY AND RECOVERY

Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance

International Journal of Engineering Technology, Management and Applied Sciences. November 2014, Volume 2 Issue 6, ISSN

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE.

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Paper-based Document Authentication using Digital Signature and QR Code

White Paper: Librestream Security Overview

A Robust Multimedia Contents Distribution over IP based Mobile Networks

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Design of Distributed Pharmaceutical Retail Management System Based on Advanced Encryption Standard Algorithm

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Oracle Plug-in for Windows Agent 7.1 User Guide

Integration of Sound Signature in 3D Password Authentication System

Healthcare Compliance Solutions

Oracle Database 11g Comparison Chart

MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Implementation and Design of AES S-Box on FPGA

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Simple Encryption/Decryption Application

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT

<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

A CASE STUDY OF ELECTRONIC SIGNATURE APPLIED IN PRE-EMPLOYMENT SCREENING INDUSTRY

Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP

Sports Management Information Systems. Camilo Rostoker November 22, 2002

Improving data integrity on cloud storage services

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

Transcription:

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim Afdel 5 1, 2 Laboratory of Industrial and Computer engineering, ENSA Agadir, Morocco 3 Department of Computer Engineering, ENSA of Khouribga 4, 5 Laboratory of the Computing Systems and Vision, Faculty of Sciences Agadir, Morocco 1 amnzou.said@gmail.com, 2 erraha@gmail.com, 3 ykhamlichi@gmail.com, 4 machkour@hotmail.com, 5 karim.afdel@gmail.com Abstract. In this paper, we propose an efficient digital watermarking scheme to strengthen the security level already present in the database management system and to avoid illegal access to comprehensive content of database including patient s information. Doctors diagnose medical images by seeing Region of Interest (ROI). A ROI of a medical image is an area including important information and must be stored without any distortion. If a medical image is illegally obtained or if its content is changed, it may lead to wrong diagnosis. We substitute the part out of ROI of LSB bitplane of the image with the patient data and a binary feature map. This latter is obtained by extracting edges of the resized image to the quarter of its size using Laplacian operator. This image is directly integrated into the database. The edge map and invariant moments are used to check the integrity of the image. Keywords: Watermarking; ROI; LSB; SecureFile LOB. 1 Introduction With the changes in the computer world and the health data security, securing medical information system is becoming a priority for citizens and for government.

Data security has three main properties: confidentiality, integrity and availability. Overall, the property of confidentiality prevents illegal access. The property of integrity guarantees detection of any modification of data, whether accidental or malicious. Finally, the property of availability protects the system against the attacks of denial of service. Digital watermarking is a technology for embedding digital information in digital content (audio, images, video ) [1][2][3]. It has introduced as a tool to improve the security, and different watermarking schemes have been proposed to address the problems of medical privacy and security [4][5][12]. In this article we present a secured system for medical database. The security mentioned in this paper is primarily concerned with the integrity and confidentiality of data. The section 2 includes a description of the software that was used for the implementation of our system, special attention will be reserved for the ORACLE Database Management System and security procedures offered by the latter to ensure confidentiality. The section 3 describes the functionalities of this system in particular the one of watermarking used like an additional mean to enhance the integrity and confidentiality in database system. 2 Environment of achieving system To develop our system we use Java language and Oracle DBMS (Database management system). Java was used to design the user interface and implement the functionalities of the system. The Oracle database was used for the storage and retrieval of data. 2.1 Java We used Java to develop the user interface on the one hand, and implement the functionalities of the system on the other. We chose this language for security, portability and particularly his API (Advanced Programming Interface) with classes of handling of image.

2.2 The Oracle DBMS with SecureFiles Oracle is a database system that can manage complex objects like image. In previous versions of Oracle, The image is either integrated into the database (BLOB) or outside (BFILE) storing a descriptor of the file containing this image (Figure 1). [6].gif.jpg Etc DB s BFILE BFILE Reference.gif.jpg Etc External files WWW BLOB Images integrated in DB Images outside of DB Fig. 1. Image BLOB and BFILE In this work, we use the new Oracle Database 11g technology, Oracle SecureFiles. Oracle SecureFiles is a novel architecture that provides the most scalable execution of filesystem-like unstructured content and advanced filesystems while preserving the rich features and benefits of the Oracle database server [7]. SecureFile LOBs allow the integration of images in the database and hence benefit from: Super fast and powerful file storage. Sharing, confidentiality, consistency, etc. 2.3 Interaction Java / Oracle The integration of SQL code in the Java code allows the manipulation of textual data from the database (information about the patient) using the user interface. This manipulation is provided by the JDBC interface. In addition, with the ORDImage class (Java class) we can perform basic operations on images SecureFile LOBs (insertion, extraction and modification).

3 Functionalities of the system Our system includes the basic functionalities of any information management system to insert, view and update data. In addition, it should allow the practitioner to achieve the following: Construction of the watermarked image, Storage of the watermarked image, Verify the integrity of the medical image, Retrieve patient information from the watermarked image, Archiving original image. 3.1 Construction of the watermarked image To ensure the integrity of images and confidentiality, we used the technique of watermarking where information and images of the patient are a single entity. The construction of the watermarked image is one of the main functions of our system. It includes the following tasks: retrieve the original image from database, separation of the LSB plane 1 of the image (Figure 2), construction of signature with the moments [8] of the edge map 2 (Figure 3), encryption of patient data and signature, integration of encrypted data in the LSB, construction of the watermarked image. The process of achieving this function is shown on a mammogram in Figure 2. The information is entered in first step, stored in the database without any treatment and in particular on the image. In the second step, to get watermarked image, we proceed to the integration of the ROI part of LSB and patient information and our signature using edge map of the image [9][10][11] and invariant moments [12]. The resulting image 1 Least Significant Bits plane: the back plane of the image. 2 map of points representing contour s image.

is then stored in database. For reasons of security and performance of the database, the original image will be saved on an external device: magnetic tape, DVD, etc. Raw Image MSB LSB Encryption LSB Extract the ROI part of LSB & & Information of patient. Database Signature Watermarked image Fig. 2. Process of construction and storage of the watermarked image. 3.1.1 Construction of the signature The signature is composed of both the edge map and the average value of functions of moments. On the one hand the moments of second and third order are known to be invariants of the image. In other words, the values of these moments remain unchanged during a change in scale [13], rotation and / or orthogonal transformations [10][14][15]. On the other hand, the edge map uniquely characterizes the image. Any intentional or accidental modification of the image of the patient affects this map.

3.1.2 Creating the edge map The edge map is obtained by applying the operator Laplacian of Gaussian (LOG) [16] on the original image without LSBs bitplane. To increase the ability to integrate and reduce the space occupied by this map in terms of LSB bits of the image, we have reduced by a factor of 4 the size of the original image before the creation of this map. The logic of using the edge map is that any change on the image will affect the edge and result in the alteration of this map. This map is also used to locate the modified area. Figure 3 shows the steps for creating the edge map of a mammography image. Original Image Image without LSB Resized image Edge map of image (a) (b) (c) (d) Fig. 3. Creating the edge map of a mammography image 3.1.3 Integration of the signature The first step is to calculate the average value of the moments of second and third order on the image of mammography without LSBs bitplane. The second step begins with the extraction of the edge map (Figure 4 (a)), which will be subdivided into blocks of 6x6 pixels. These blocks are divided in terms of LSB bits to make the difficult reconstruction of the map to illegal access. The technique of arrangement consists to replace the right part of the block by the left part of the neighbouring block and this along a circular well definite way (Figure 4 (b)). The LSBs bitplane of the image is then replaced by the ROI part of LSB and encrypted data consists of information of the patient, the average value of the moments of the second and third order, and blocks of edge. We used the symmetric AES (Advanced Encryption Standard) algorithm [17] for data encryption.

a b c d (a) l k p m n o e f j i h g (b) a b c p Fig. 4. Rearranging the edge map in blocks of size 6x6 pixels. (a) The edge map is divided into blocks alphabetically ordered along a circular path; (b) The blocks are arranged continuously. 3.2 Locating of tamper region The verification of the image integrity is a crucial function in our system. To check the integrity of an image already stored in the database, we begin by extracting patient s data and the average of moments (above cited) from the LSBs bitplane of this image. Then we recalculate moment invariants of the image without the LSBs bitplane. If the calculated moments is identical to that extracted from the LSBs bitplane, then the retrieved image is intact. Otherwise, the image has been altered and its integrity is not preserved. This process is illustrated in Figure 5. In the case where the image is altered, we can identify the altered region. We rearrange the edge map integrated in the LSBs bitplane by reversing the steps described above. We then compare the results to edge map of the retrieved image without the LSBs bitplane. A simple comparison of two maps allows localizing the affected region (see Figure 5).

Image restored from the DB Separating the level of grey of each pixel in: MSB( b7-b1) and LSB( b0 ) Deciphering tattooes from the LSB Calculating the average value of the invariant moments of the MSB Average of the invariant moments Yes = No And Intact image Image and data of Patient Extracting the map of edge Modified Image The image of the MSB reduced in 1/4 of his initial size - Extracting the edge using the LoG operator Identifying the altered region Fig. 5. The process of verifying the integrity of the image. This verification process is also shown in Figure 6 with experimental values on a mammography image. Watermarked Image Intact image Image and data of patient Difference of the Moments = 0 Verification of the integrity of the image Différence des moments = 0,0394 Modified image DB Detection of the altered region Fig. 6. The process of verifying the integrity of a mammography image.

4 Conclusion International Journal of Computer Engineering Science (IJCES) In this article we have implemented a security architecture using watermarking and encryption techniques in addition to the security provided by database management system. As proprieties of the security, we have treated the confidentiality (Figures 2, 3 and 4) and integrity (Figures 5 and 6) of both data and image. References 1. Jagadish, N., Subbanna Bhat, P., Acharya, R. and Niranjan, UC.: Simultaneous storage of medical images in the spatial and frequency domain: A comparative study. BioMedical Engineering OnLine (2004). 2. Cox, J., Miller, ML., Bloom, JA.: Digital Watermarking. Morgan Kauffman, San Francisco (2002). 3. Knopp, R., Robert, A.: Detection Theory and Digital Watermarking. Proceedings of SPIE, 3971:14-23 (2000). 4. Coatrieux, G., Maitre, H., Sankur, B., Rolland, Y., Collorec, R.: Relevance of Watermarking in Medical Imaging. Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine, p. 250-255. Arlington, USA (2000). 5. El Hajji, M., Ouaha, H., Afdel, K., Douzi, H.: Multiple Watermark for Authentication and Tamper Detection using Mixed Scales DWT. International Journal of Computer Applications (0975 8887), Volume 28 No.6 (2011). 6. Sears, R., Ingen, C., Gray, J.: To BLOB or not to BLOB: Large Object Storage in a database or Filesystem?. Microsoft Research Technical Report, MSR-TR-2006-45 (2006). 7. Rajamani, R.: Oracle Database 11g: SecureFiles, An Oracle White Paper (2007). 8. Ming-Kuel, H.: Visual pattern recognition by moment invariants, IRE Trans. Information Theory, IT (8), 179-187 (1962).

9. Lavanya, A., Natarajan, V.: Enhancing security of DICOM images during storage and transmission in distributed environment. Sadhana,Vol. 36, Part 4 (2011). 10. Siva Sankar, A., Jayachandra Prasad, T., Giri Prasad, M.N.: LSB Based Lossless Digital Image Watermarking using Polynomials in Spatial Domain for DRM. IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology, 13, 18-23, (2011). 11. Khamlichi, Y.I., Zaz, Y., Machkour, M., AFDEL, K.: Authentication Watermarked System for Content Based Medical Image. WSEAS Transactions on Signal Processing, Issue 5, Volume 2, ISSN 1790-5022, pp 826-830 (2006). 12. Khamlichi, Y.I., Machkour, M., AFDEL, K., Moudden, A.: Multiple Watermark for Tamper Detection in Mammography Images, WSEAS Transactions on Computers, Issue 6, Volume 5, ISSN 1109-2750, pp 1222-1226 (2006). 13. Mamistvalov, A. G.: n-dimensial moment invariants and conceptual theory of recognition n-dimensional solids. IEEE Trans. On PAMI, 20 (8) :819-831 (1998). 14. Schmid, C.: Image Matching by local invariants of gray levels: application to the indexing of a database of objects, PhD thesis, INRIA-France (1996). 15. Tahri, O., Chaumette, F.: Determination of Moment Invariants and Their Application to Visual Servoing, Research Report No. 4845 - June 2003, INRIA- France (2003). 16. Hildreth, E. C.: The Detection of Intensity Changes by Computer and Biological Vision Systems, Computer Vision, Graphics, and Image Processing, 22, 1-27 (1983). 17. Daemen, J., Rijmen, V.: AES Proposal Rijndael, Networks, 2nd ed. (1999). [Online]. Available: http://csrc.nist.gov/cryptotoolkit/aes/index.html