A Trio Approach Satisfying CIA Triad for Medical Image Security

  • Sivasaranyan Guhan
  • Sridevi Arumugham
  • Siva Janakiraman
  • Amirtharajan Rengarajan
  • Sundararaman RajagopalanEmail author
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 30)


Medical image security attains a great appeal due to the challenges in transmitting them through an open network channel. Even a small change in medical information leads to a wrong diagnosis. Hence, methods to prevent the attacks and tampering on the medical images in the open channel have a great demand. This work proposes such an attractor-assisted medical image watermarking and double chaotic encryption which preserves the confidentiality, integrity and authenticity of the medical image. Patient diagnosis details are compressed using lossless compression approach and embedded in the pixels of patient’s DICOM image. Attractor-based selective watermarking is implemented using integer wavelet transform. Encryption will be carried out by employing chaotic maps using confusion and diffusion operations. The effectiveness of the work will be evaluated using standard analyses namely MSE, PSNR, SSIM, entropy, correlation, histogram and key space.


DICOM Confidentiality Integrity Authentication Compression Watermarking and encryption 


  1. 1.
    Shahbahrami A, Bahrampour R, Rostami MS, Ayoubi M (2011) Evaluation of Huffman and arithmetic algorithms for multimedia compression standards. Int J Comput Sci Eng Appl 1(4):34–47CrossRefGoogle Scholar
  2. 2.
    Mukesh PS, Pandya MS, Pathak S (2013) Enhancing AES algorithm with arithmetic coding. In: Proceedings of the 2013 international conference green computing, communication and conservation of energy, ICGCE 2013, pp 83–86Google Scholar
  3. 3.
    Kavitha KJ, Shan BP (2017) Implementation of DWM for medical images using IWT and QR code as a watermark. In: 2017 Conference on emerging devices and smart systems, ICEDSS 2017, Mar 2017, pp 252–255Google Scholar
  4. 4.
    Tyagi S, Singh HV, Agarwal R, Gangwar SK (2016) Digital watermarking techniques for security applications. In: 2016 International conference on emerging trends in electrical electronics and sustainable energy systems, pp 379–382Google Scholar
  5. 5.
    Zhang Y (2009) Digital Watermarking technology: a review. In: 2009 ETP international conference on future computer and communication, pp 250–252Google Scholar
  6. 6.
    Gupta P, Parmar G (2017) Image watermarking using IWT-SVD and its comparative analysis with DWT-SVD. In: 2017 International conference on computer, communication and electronics COMPTELIX 2017, pp 527–531Google Scholar
  7. 7.
    Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. J Med Imaging Health Inform 5(3):607–614CrossRefGoogle Scholar
  8. 8.
    Malonia M, Agarwal SK (2016) Digital image watermarking using discrete wavelet transform and arithmetic progression technique. In: 2016 IEEE students’ conference on electrical, electronics and computer science, pp 1–6Google Scholar
  9. 9.
    Aparna P, Kishore PVV (2018) An efficient medical image watermarking technique in e-healthcare application using hybridization of compression and cryptography algorithm. J Intell Syst 27(1):115–133CrossRefGoogle Scholar
  10. 10.
    Safi HW, Maghari AY (2017) Image encryption using double chaotic logistic map. In: International conference on promising electronic technologies, pp 66–70Google Scholar
  11. 11.
    Shyamala N (2017) Reversible chaotic encryption techniques for images. pp 2–6Google Scholar
  12. 12.
    Huang H, Yang S (2016) Colour image encryption based on logistic mapping and double random-phase encoding. IET Image Process 11(4):211–216MathSciNetCrossRefGoogle Scholar
  13. 13.
    Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Sig Process 144:444–452CrossRefGoogle Scholar
  14. 14.
  15. 15.
    Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Netw 2017Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Sivasaranyan Guhan
    • 1
  • Sridevi Arumugham
    • 1
  • Siva Janakiraman
    • 1
  • Amirtharajan Rengarajan
    • 1
  • Sundararaman Rajagopalan
    • 1
    Email author
  1. 1.School of Electrical and Electronics EngineeringSASTRA Deemed to be UniversityThanjavurIndia

Personalised recommendations