International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Digital Medical Image Security in Teleradiology using Tamper Localization and Lossless Recovery Watermarking based on LZW lossless compressed Watermark

Author Affiliations

  • 1 Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang, Gambang 26300 Kuantan, MALAYSIA

Res. J. Recent Sci., Volume 4, Issue (12), Pages 71-76, December,2 (2015)

Abstract

Digital imaging technology has got its permanent place almost in every field of life. Computed tomography, X-Ray, Magnetic Resonance Imaging, Ultrasound etc. are medical imaging technologies being used for the purpose of medical imaging. Each of the technologies play special role for surgical planning of health recovery process. With the passage of time human needed decentralization of health facilities for easy and better services provision to the far flank areas of the countries. Decentralization of such facilities has become possible due to the usage of modern communication means such as internet. Teleradiology is a health promoting facility based on internet to get access to remotely located radiologist for better analysis of medical images. Teleradiological images are facing security problems due to different noises and unprotected nature of internet channels by giving opportunities to the unauthorized users getting easy access to the communicating medical images data for change of contents according to their own wishes. Medical image data is very sensitive data and do not afford even a bit of change. Surgical decision made on the basis of altered or tampered medical images can lead to non-recoverable loss. To avoid such a big loss there is an intense need of taking such steps making sure the image protection as well as its recovery into its original version. Image tampering occurred in Teleradialogy environment can be covered by using digital watermarking techniques. This research uses Least Significant Bits (LSBs) based digital watermarking technique for content authentication of Ultrasound medical images. The image has two main parts, ROI (region of interest) and RONI (region of non-interes). Usually ROI covers one third part of the image, consisting of image important information. ROI is defined and compressed using more than one lossless compression techniques. Lempe Ziv Welch LZW is a better lossless compression resulting technique due to its good reduction of bits capability and better compression ratio. LZW lossless compressed ROI is inserted into RONI as a watermark. On the recever side the lossless compressed watermarkis retrived decompressed and used for the lossless recovery of tampered areas of the image ROI.

References

  1. Newell J. D., J. R. and Kelsey C.A., Digital imagingin diagnostic radiology, New York, Churchill Livingstone, (1990)
  2. Swanson M.D., Kobayashi M. and Tewfik A.H., Multimedia Data-Embedding and Watermarking Technologies, Proceedings of the IEEE, 86(6), 1064-1087 (1998)
  3. Matthew Holliman and Nasir Memon, Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes, IEEE Transactions on Image Processing,9(3),(2000)
  4. Hirak Kumar Maity and Santi Prasad Maity, Joint Robust and Reversible Watermarking for Medical Images, Second international conference on Communication, Computing and Security (ICCCS), Procedia Technology, (6), 275-282 (2012)
  5. Gerhard C., Langelaar, Iwansetyawan and Reginald L., Lageidijk, Watermarking Digital Image and Video Data, A State-of-the-Art Overview. IEEE Signal Processing Magazine, 20-46 (2000)
  6. Swanson M., Kobayashi M. and Tewfik, Multimedia Data Embedding and Watermarking Technologies, Proc. IEEE, (86), 1064-1087 (1998)
  7. Cox J., Kilian J., Leighton T. and Shamoon T., Secure spread spectrum watermarking for multimedia, IEEE Transaction on Image processing, (6), 1673-1687 (1997)
  8. Sviatolsavvoloshynovskiy, Shelby Pereira, Thierry Pun, Joachim J. Eggars and Jonathan K. SU., Attacks on Digital Watermark: Classification, Estimation-Based Attacks and Benchmarks, IEEE Communication Magazine, (8), 118-126 (2001)
  9. Radharani S. and L.M. Valarmathi, A Study on Watermarking Scheme for Image Authentication, International Journal of Computer Application, 2(4), 24-32 (2010)
  10. Wong P.W., A watermark for image integrity and ownership verification, In proc. IS&TPIC Conference, Portland, (1997)
  11. Wu C.W., Coppersmith D., Mintzer F.C., Tresser C.P. and Yeung M.N., Fragile imperceptible digital watermark with privacy control, In Proc. SPIE Security Watermarking Multimedia Contents, (3657) , (1999)
  12. Min. Wu and Bede Liu, Watermarking For Image Authentication, 0-8186-8821-1/98$10.00 Copyright IEEE,(1998)
  13. Deepthi Anand and U.C. Niranjan, Watermarking medical images with patient information, IEEE Proceedings in EMBS Conference, Hong Kong,20(2), 703-706, (1998)
  14. Houtan Larijani and Gholamali Rezai Rad, A New Spatial Domain Algorithm for Gray Scale Images Watermarking, IEEE Proceedings of the International Conference on Computer and Communication Engineering, Kuala Lumpur Malaysia, 13-15, (2008)
  15. Podilchuk C.I. and Zeng W., Image-adaptive watermarking using visual models, IEEE Journal on Selected Areas in Communications,16(4), 525-539 (1998)
  16. Zeng W. and Liu B., A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images, IEEE Trans. Image Processing,8(11), 1534-1548 (1999)
  17. Jasni M. Zain and Fauzi A.R.M., Medical image watermarking with tamper detection and recovery, In: Engineering in Medicine and Biology Socity (EMBS) Annual International Conference of the IEEE, New York City USA, 3270-3273 (2006)
  18. Jasni M. Zain and A.R.M. Fauzi., Evaluation of Medical Image Watermarking with Tamper Detection and Recovery (AWTDR), In the 29th Annual International Conference on, Engineering in Medicine and Biology Socity (EMBS) of the IEEE, 5661-5664 (2007)
  19. Al-Qershi O.M. and Khoo B.E., Authentication and Data Hiding Using Reversible ROI-based Watermarking Scheme for DICOM Images, In Proceedings of International Conference on Medical Systems Engineering (ICMSE), 829-834 (2009)
  20. Al-Qershi O.M. and Koo B.E., ROI-based Tamper Detection and Recovery for Medical images using Reversible watermarking technique, IEEE International Conference on information theory and Information Security (ICITIS), 151-155 (2010)
  21. Liew S.C. and Zain J.M., Reversible medical image watermarking for tamper detection and recovery, In. 3rd IEEE International Conference on: Computer and Information Technology (ICCSIT), 417-420 (2010)
  22. Liew S.C., Liew S.W. and Zain J.M., Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication, J Digital Imaging,(2), 316-325 (2013)
  23. Watanabe E. and Mori K., Lossy Image Compression Using a Molecular Structured Neural Network, Proceedings of IEEE Signal Processing Socity Workshop, Washington DC, 403-412 (2001)
  24. Vilas H. Gaidhane, Vijander, Yogesh V. Hote and Mahendra Kumar, New Approaches for Image Compression Using Neural Network, Journal of Intelligent Learning System and Applications,(3), 220-229 (2011)
  25. WongS., Zaremba L., GoodenD. and Huang H.K., Radiologic Image Compression A Review,Procc, IEEE,83(2), 194-218, (1995)