Skip to main content

Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking

  • Conference paper
Book cover Data Privacy Management and Autonomous Spontaneous Security (DPM 2009, SETOP 2009)

Abstract

Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their confidentiality, integrity and traceability in an autonomous way. In this context, watermarking has been recently proposed as a complementary mechanism for medical data protection. In this paper, we focus on the verification of medical image integrity through the combination of digital signatures with such a technology, and especially with Reversible Watermarking (RW). RW schemes have been proposed for images of sensitive content for which any modification may affect their interpretation. Whence, we compare several recent RW schemes and discuss their potential use in the framework of an integrity control process in application to different sets of medical images issued from three distinct modalities: Magnetic Resonance Images, Positron Emission Tomography and Ultrasound Imaging. Experimental results with respect to two aspects including data hiding capacity and image quality preservation, show different limitations which depend on the watermark approach but also on image modality specificities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Coatrieux, G., Maître, H., Sankur, B., Rolland, Y., Collorec, R.: Relevance of Watermarking in Medical Imaging. In: Proc. of IEEE EMBS Int. Conf. ITAB, Arlington, USA, pp. 250–255 (2000)

    Google Scholar 

  2. Zhou, X.Q., Huang, H.K., Lou, S.L.: Authenticity and integrity of digital mammography images. IEEE Trans. on Medical Imaging 20(8), 784–791 (2001)

    Article  Google Scholar 

  3. Chao, H.M., Hsu, C.M., Miaou, S.G.: A Data-Hidding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records. IEEE Trans. on Information Technology in Biomedicine 6(1), 46–53 (2002)

    Article  Google Scholar 

  4. Coatrieux, G., Lecornu, L., Sankur, B., Roux, C.: A Review of Image Watermarking Applications in Healthcare. In: Proc. of the IEEE EMBC Conf., New York, USA, pp. 4691–4694 (2006)

    Google Scholar 

  5. Piva, A., Barni, M., Bartolini, F., Capellini, V.: Exploiting the cross-correlation of RGB channels for robust watermarking of color images. In: Proc. of IEEE Int. Conf. on ICIP, vol. I, pp. 306–310 (1999)

    Google Scholar 

  6. Gilbert, H., Handschuh, H.: Security Analysis of SHA-256 and Sisters. In: Selected Areas in Cryptography, pp. 175–193 (2003)

    Google Scholar 

  7. Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  8. Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US Patent application, Docket No.:77102/E-D (1999)

    Google Scholar 

  9. Coatrieux, G., Lamard, M., Daccache, W., Puentes, J., Roux, C.: A low distortion and reversible watermark application to angiographic images of the retina. In: Proc. of the IEEE EMBC Conf., Shanghai, China, pp. 2224–2227 (2005)

    Google Scholar 

  10. Ni, Z., Shi, Y., Ansari, N., Wei, S.: Reversible data hiding. In: Proc. IEEE Int. Symp. Circuits and Systems, May 2003, vol. 2, pp. 912–915 (2003)

    Google Scholar 

  11. Xuan, G., Yao, Q., Yang, C., Gao, J., Chai, P., Shi, Y.Q., Ni, Z.: Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 323–332. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Leest, A., Veen, M., Bruekers, F.: Reversible watermarking for images. In: Proc. of Int Conf. SPIE, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA (January 2004)

    Google Scholar 

  13. Fridrich, J., Goljan, J., Du, R.: Invertible authentication. In: Proc. of Int. Conf. SPIE, Security and Watermarking of Multimedia Content, San Jose, CA, January 2001, pp. 197–208 (2001)

    Google Scholar 

  14. Xuan, G., Chen, J., Zhu, J., Shi, Y.Q., Ni, Z., Su, W.: Lossless data hiding based on integer wavelet transform. In: Proc. MMSP, St. Thomas, Virgin Islands, pp. 312–315 (2002)

    Google Scholar 

  15. Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proc. IEEE ICIP, vol. 2, pp. 157–160 (2002)

    Google Scholar 

  16. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. on Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  17. Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. on Image Processing 13(8), 1147–1156 (2004)

    Article  MathSciNet  Google Scholar 

  18. Lee, S., Yoo, C.D., Kalker, T.: Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform Information Forensics and Security. IEEE Trans. Info. Forensics and Security 2(3), 321–330 (2007)

    Article  Google Scholar 

  19. Xuan, G.R., Shi, Y.Q., Yang, C.Y., Zheng, Y.Z., Zou, D.K., Chai, P.Q.: Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique. In: Proc. of Int. Conf. Multimedia and Expo., pp. 1520–1523 (2005)

    Google Scholar 

  20. Thodi, D.M., Rodriquez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. Image Processing 16(3), 721–730 (2007)

    Article  Google Scholar 

  21. Wu, X.: Lossless compression of continuous-tone images via context selection, quantization, and modeling. IEEE Trans. on Image Proc. 6(5), 656–664 (1997)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pan, W., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, C. (2010). Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., Roudier, Y. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2009 2009. Lecture Notes in Computer Science, vol 5939. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11207-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11207-2_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11206-5

  • Online ISBN: 978-3-642-11207-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics