DOI QR코드

DOI QR Code

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities

  • Badshah, Gran (Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang) ;
  • Liew, Siau-Chuin (Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang) ;
  • Zain, Jasni Mohamad (Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang) ;
  • Ali, Mushtaq (Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang)
  • Received : 2014.12.03
  • Accepted : 2015.10.15
  • Published : 2015.12.31

Abstract

Region of interest (ROI) is the most informative part of a medical image and mostly has been used as a major part of watermark. Various shapes ROIs selection have been reported in region-based watermarking techniques. In region-based watermarking schemes an image region of non-interest (RONI) is the second important part of the image and is used mostly for watermark encapsulation. In online healthcare systems the ROI wrong selection by missing some important portions of the image to be part of ROI can create problem at the destination. This paper discusses the complete medical image availability in original at destination using the whole image as a watermark for authentication, tamper localization and lossless recovery (WITALLOR). The WITALLOR watermarking scheme ensures the complete image security without of ROI selection at the source point as compared to the other region-based watermarking techniques. The complete image is compressed using the Lempel-Ziv-Welch (LZW) lossless compression technique to get the watermark in reduced number of bits. Bits reduction occurs to a number that can be completely encapsulated into image. The watermark is randomly encapsulated at the least significant bits (LSBs) of the image without caring of the ROI and RONI to keep the image perceptual degradation negligible. After communication, the watermark is retrieved, decompressed and used for authentication of the whole image, tamper detection, localization and lossless recovery. WITALLOR scheme is capable of any number of tampers detection and recovery at any part of the image. The complete authentic image gives the opportunity to conduct an image based analysis of medical problem without restriction to a fixed ROI.

Keywords

References

  1. J. X. Chen, Z. L. Zhu, and H. Yu, "A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme," Optik - International Journal for Light and Electron Optics, vol. 125, no. 11, pp. 2472-2478, 2014. https://doi.org/10.1016/j.ijleo.2013.12.001
  2. A. Cheddad, J. Condell, K. Curran, and P. McKevitt, "Digital image steganography: survey and analysis of current methods," Signal Processing, vol. 90, no. 3, pp. 727-752, 2010. https://doi.org/10.1016/j.sigpro.2009.08.010
  3. J. Pan, J. Zheng, and G. Zhao, "Blind watermarking of NURBS curves and surfaces," Computer-Aided Design, vol. 45, no. 2, pp. 144-153, 2013. https://doi.org/10.1016/j.cad.2012.09.001
  4. F. Y. Shih and Y. T. Wu, "Robust watermarking and compression for medical images based on genetic algorithms," Information Sciences, vol. 175, no. 3, pp. 200-216, 2005. https://doi.org/10.1016/j.ins.2005.01.013
  5. N. Wang and C. Men, "Reversible fragile watermarking for 2-D vector map authentication with localization," Computer-Aided Design, vol. 44, no. 4, pp. 320-330, 2012. https://doi.org/10.1016/j.cad.2011.11.001
  6. J. C. Garcia-Alvarez, H. Fuhr, and G. Castellanos-Dominguez, "Evaluation of region-of-interest coders using perceptual image quality assessments," Journal of Visual Communication and Image Representation, vol. 24, no. 8, pp. 1316-1327, 2013. https://doi.org/10.1016/j.jvcir.2013.09.003
  7. M. M. Abd-Eldayem, "A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine," Egyptian Informatics Journal, vol. 14, no. 1, pp. 1-13, 2013. https://doi.org/10.1016/j.eij.2012.11.002
  8. B. Davie, V. Florance, A. Friede, J. Sheehan, and J. E. Sisk, "Bringing health-care applications to the internet," IEEE Internet Computing, vol. 5, no. 3, pp. 42-48, 2001. https://doi.org/10.1109/4236.935176
  9. F. J. McEvoy and E. Svalastoga, "Security of patient and study data associated with DICOM images when transferred using compact disc media," Journal of Digital Imaging, vol. 22, no. 1, pp. 65-70, 2009. https://doi.org/10.1007/s10278-007-9068-x
  10. R. Norcen, M. Podesser, A. Pommer, H. P. Schmidt, and A. Uhl, "Confidential storage and transmission of medical image data," Computers in Biology and Medicine, vol. 33, no. 3, pp. 277-292, 2003. https://doi.org/10.1016/S0010-4825(02)00094-X
  11. L. O. M. Kobayashi, S. S. Furuie, and P. S. Barreto, "Providing integrity and authenticity in DICOM images: a novel approach," IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 4, pp. 582-589, 2009. https://doi.org/10.1109/TITB.2009.2014751
  12. O. M. Al-Qershi and B. E. Khoo, "ROI-based tamper detection and recovery for medical images using reversible watermarking technique," in Proceedings of IEEE International Conference on Information Theory and Information Security (ICITIS), Beijing, China, 2010, pp. 151-155.
  13. S. Das and M. K. Kundu, "Effective management of medical information through ROI-lossless fragile image watermarking technique," Computer Methods and Programs in Biomedicine, vol. 111, no. 3, pp. 662-675, 2013. https://doi.org/10.1016/j.cmpb.2013.05.027
  14. G. Badshah, S. C. Liew, J. M. Zain, S. I. Hisham, and A. Zehra, "Importance of watermark lossless compression in digital medical image watermarking," Research Journal of Recent Sciences, vol. 4, no. 3, pp. 75-79, 2015.
  15. G. Badshah, S. C. Liew, J. M. Zain, and M. Ali, "Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique," Journal of Digital Imaging, 01 October 2015. http://dx.doi.org/10.1007/s10278-015-9822-4.
  16. D. Coppersmith, F. C. Mintzer, C. P. Tresser, C. W. Wu, and M. N. Yeung, "Fragile imperceptible digital watermark with privacy control," in Proceedings of SPIE 3657: Security and Watermaking of Multimedia Contents. Bellingham, WA: Interntional Society for Optics and Photonics, 1999.
  17. S. C. Liew, S. W. Liew, and J. M. Zain, "Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication," Journal of Digital Imaging, vol. 26, no. 2, pp. 316-325, 2013. https://doi.org/10.1007/s10278-012-9484-4
  18. A. Al-Haj and A. Amer, "Secured telemedicine using region-based watermarking with tamper localization," Journal of Digital Imaging, vol. 27, no. 6, pp. 737-750, 2014. https://doi.org/10.1007/s10278-014-9709-9
  19. G. Badshah, S. C. Liew, M. Z. Jasni, and T. Herawan, "Tamper localization and recovery medical image watermarking," in Proceedings of International Conference on Computational Science and Information Management (ICoCSIM-2012), Medan, Indonesia, 2012, pp. 266-270.