Skip to main content

Enhancing Security in Medical Image Communication with JPEG2000 Compression and Lossless Watermarking

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 221))

Abstract

Medical image content authentication is very important, since medical image contents are more and more widely distributed. Reversible watermarking becomes a promising technique to embed the information into medical images. In this paper, we define the Region of Interest (ROI) in an image and trying to embed data in Region of Non Interest. When medical image shared through network, for the compression purpose we proposed the JPEG2000 algorithm and to improve the integrity and Authenticity hash value of the image is found by using MD5 and encrypted using RSA to form the DS (Digital Signature). DS and patient information is embedded into DICOM images. Strict authentication can be achieved by providing high security in accessing the secured medical images by medical experts which are available in the websites using Kerberos technique.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Coatrieux G, Guillou C le, Cauvin J, Roux CH (2009) Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Info Technol Biomed 13(2)

    Google Scholar 

  2. Coatrieux G, Lamard M, Daccache W, Puentes J, Roux C (2005) A low distortion and reversible watermark application in angiographic images of the retina. In: Proceedings IEEE- EMBC conference, Shanghai pp 2224–2227

    Google Scholar 

  3. Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux CH (2010) Medical image integrity control combining digital signature and lossless watermarking, published in 2nd SSETOP international workshop on autonomous and spontaneous security, Saint malo, Version 1–14

    Google Scholar 

  4. Marcellin MW, Garmish MJ, Bilgin A, Bolick MP (2000) An overview of JPEG-2000. In: proceedings of IEEE data compression conference, pp 523–541

    Google Scholar 

  5. ISO (2000) JPEG2000 image codingsystem, ISO/IEC FCD 15444-1,JPEG2000 part I Final committee draft, Version 1.0

    Google Scholar 

  6. Kuang LQ, Zhang Y, Xie H (2009) A medical image authentication system based on reversible digital watermarking. In: IEEE, 1st international conference on information science and engineering (ICISE 2009), pp 1047–1050

    Google Scholar 

  7. Zain JM (2012) Strict authentication watermarking with JPEG compression (SAW-JPEG) for medical images. Euro J Sci Res 42(2):232–241. ISSN 450-216X

    Google Scholar 

  8. Zhaol GC, Yang X, Zhoul B Wei W RSA-based digital image encryption algorithm in wireless sensor networks. In: proceedings second international conference on signal processing systems, Version 2, pp 640–643

    Google Scholar 

  9. Rivest R, Shamir A, Adleman l (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Google Scholar 

  10. Kuo WC, Chen MY (2005) A modified(t,n) threshold proxy signature scheme based on the RSA cryptosystem. In: Information technology and applications, ICITA vol 2, pp 576–579

    Google Scholar 

  11. Harn L, Ren J (2008) Efficient identity-based RSA multisignatures. Comput Secur 27:12–15

    Google Scholar 

  12. Coatrieux G, Guillou C le, Cauvin J, Locarnu L, Roux CH (2006) Enhancing shared medical image functionalities with image knowledge digest and watermarking, presented in the IEEE EMBC conference international technology applied biomedicine (ITAB 2006), Joannina

    Google Scholar 

  13. Chang CC, Lin IC (20047) Remarks in fingerprint-based remote user authentication scheme using smart cards. ACM Operating Syst Rev 38(3):91–100

    Google Scholar 

  14. Chang CC, Tai WL, Lin MH (2005) A reversible data hiding scheme with modified side match vector quantization. In: proceedings of the international conference on advanced information networking and applications, vol 1, Tai-Wan, pp 947–952 Mar 2005

    Google Scholar 

  15. Keyvanpour MR, Merrikh-Bayat F (2010) A new encryption method for secure embedding in image watermarking. In: procedings of third international conference on advanced computer theory and engineering, vol 2, pp 402–407

    Google Scholar 

  16. Coatrieux G, Quantin C, Montagner J, Francois MF, Allert A, Roux CH (2008) Watermarking medical images with anonymous patient identification to verify authenticity, in ehealth beyond the horizon, vol 136, pp 667–672

    Google Scholar 

  17. Umamageswari A, FerniUkrit M, Suresh GR (2011) A survey on security in medical image communication. Int J Comput Appl 30(3):0975–8887

    Google Scholar 

  18. FerniUkrit M, Umamageswari A, Suresh GR (2011) A survey on lossless compression techniques for dynamic images. Int J Comput Appl 31(8):0975–8887

    Google Scholar 

  19. William S (2010) Cryptography and network security

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Umamageswari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer India

About this paper

Cite this paper

Umamageswari, A., Suresh, G.R. (2013). Enhancing Security in Medical Image Communication with JPEG2000 Compression and Lossless Watermarking. In: S, M., Kumar, S. (eds) Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012). Lecture Notes in Electrical Engineering, vol 221. Springer, India. https://doi.org/10.1007/978-81-322-0997-3_36

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-0997-3_36

  • Published:

  • Publisher Name: Springer, India

  • Print ISBN: 978-81-322-0996-6

  • Online ISBN: 978-81-322-0997-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics