Abstract
Medical image content authentication is very important, since medical image contents are more and more widely distributed. Reversible watermarking becomes a promising technique to embed the information into medical images. In this paper, we define the Region of Interest (ROI) in an image and trying to embed data in Region of Non Interest. When medical image shared through network, for the compression purpose we proposed the JPEG2000 algorithm and to improve the integrity and Authenticity hash value of the image is found by using MD5 and encrypted using RSA to form the DS (Digital Signature). DS and patient information is embedded into DICOM images. Strict authentication can be achieved by providing high security in accessing the secured medical images by medical experts which are available in the websites using Kerberos technique.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Coatrieux G, Guillou C le, Cauvin J, Roux CH (2009) Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Info Technol Biomed 13(2)
Coatrieux G, Lamard M, Daccache W, Puentes J, Roux C (2005) A low distortion and reversible watermark application in angiographic images of the retina. In: Proceedings IEEE- EMBC conference, Shanghai pp 2224–2227
Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux CH (2010) Medical image integrity control combining digital signature and lossless watermarking, published in 2nd SSETOP international workshop on autonomous and spontaneous security, Saint malo, Version 1–14
Marcellin MW, Garmish MJ, Bilgin A, Bolick MP (2000) An overview of JPEG-2000. In: proceedings of IEEE data compression conference, pp 523–541
ISO (2000) JPEG2000 image codingsystem, ISO/IEC FCD 15444-1,JPEG2000 part I Final committee draft, Version 1.0
Kuang LQ, Zhang Y, Xie H (2009) A medical image authentication system based on reversible digital watermarking. In: IEEE, 1st international conference on information science and engineering (ICISE 2009), pp 1047–1050
Zain JM (2012) Strict authentication watermarking with JPEG compression (SAW-JPEG) for medical images. Euro J Sci Res 42(2):232–241. ISSN 450-216X
Zhaol GC, Yang X, Zhoul B Wei W RSA-based digital image encryption algorithm in wireless sensor networks. In: proceedings second international conference on signal processing systems, Version 2, pp 640–643
Rivest R, Shamir A, Adleman l (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Kuo WC, Chen MY (2005) A modified(t,n) threshold proxy signature scheme based on the RSA cryptosystem. In: Information technology and applications, ICITA vol 2, pp 576–579
Harn L, Ren J (2008) Efficient identity-based RSA multisignatures. Comput Secur 27:12–15
Coatrieux G, Guillou C le, Cauvin J, Locarnu L, Roux CH (2006) Enhancing shared medical image functionalities with image knowledge digest and watermarking, presented in the IEEE EMBC conference international technology applied biomedicine (ITAB 2006), Joannina
Chang CC, Lin IC (20047) Remarks in fingerprint-based remote user authentication scheme using smart cards. ACM Operating Syst Rev 38(3):91–100
Chang CC, Tai WL, Lin MH (2005) A reversible data hiding scheme with modified side match vector quantization. In: proceedings of the international conference on advanced information networking and applications, vol 1, Tai-Wan, pp 947–952 Mar 2005
Keyvanpour MR, Merrikh-Bayat F (2010) A new encryption method for secure embedding in image watermarking. In: procedings of third international conference on advanced computer theory and engineering, vol 2, pp 402–407
Coatrieux G, Quantin C, Montagner J, Francois MF, Allert A, Roux CH (2008) Watermarking medical images with anonymous patient identification to verify authenticity, in ehealth beyond the horizon, vol 136, pp 667–672
Umamageswari A, FerniUkrit M, Suresh GR (2011) A survey on security in medical image communication. Int J Comput Appl 30(3):0975–8887
FerniUkrit M, Umamageswari A, Suresh GR (2011) A survey on lossless compression techniques for dynamic images. Int J Comput Appl 31(8):0975–8887
William S (2010) Cryptography and network security
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer India
About this paper
Cite this paper
Umamageswari, A., Suresh, G.R. (2013). Enhancing Security in Medical Image Communication with JPEG2000 Compression and Lossless Watermarking. In: S, M., Kumar, S. (eds) Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012). Lecture Notes in Electrical Engineering, vol 221. Springer, India. https://doi.org/10.1007/978-81-322-0997-3_36
Download citation
DOI: https://doi.org/10.1007/978-81-322-0997-3_36
Published:
Publisher Name: Springer, India
Print ISBN: 978-81-322-0996-6
Online ISBN: 978-81-322-0997-3
eBook Packages: EngineeringEngineering (R0)