Browse > Article
http://dx.doi.org/10.6109/jkiice.2017.21.4.759

Watermark Authentication Cryptography for Medical Image Security  

Cho, Young-bok (Department of Computer Science, Chungbuk National University)
Woo, Sung-Hee (Department of Medical Information&Engineering, Korea National University Transportation)
Lee, Sang-Ho (Department of Computer Science, Chungbuk National University)
Abstract
In this paper, we preserve the transparency of digital contents by compressing and storing the medical image for a certain period so as to be safe and robust against various attacks of medical images. The proposed algorithm generates an encrypted image authentication code that extracts the feature value of the original image and combines it with the user's information. in order to extract hidden data, the authentication code is first decrypts the encrypted medical image and extracts the hidden data using the spatial characteristics of image. The proposed algorithm guarantees integrity when comparing extracted authentication code and newly generated authentication code for image authentication after directly inserting it into content itself through watermarking. We have proved various security of attack of image data and proved that the certification rate is improved to 98.4%.
Keywords
Authentication Code; Integrity; Medical Image; Security; Watermark;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. T. Oh, Y. B. Lee and S. J. Yeon, "Security Mechanism for Medical Image Information on PACS Using Invisible Watermark," in Proceedings of the International Conference on High Performance Computing for Computational Science 2004, pp. 315-324, 2004.
2 E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations using semi-fragile watermarks," in Proceedings of the Electronic Imaging. International Society for Optics and Photonics, pp. 152-163, 2003.
3 M. Awrangjeb, "An Overview of Reversible Data Hiding," in Proceedings of the Sixth International Conference on Computer and Information Technology, pp.75-79, 2003.
4 X. Q. Zhou, H. K. Huang and S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Transactions on Medical Imaging, vol. 20, no. 8, pp. 784- 791, Aug. 2001.   DOI
5 K. F. Li, T. S. Chen and S. C. Wu, "Image tamper detection and recovery system based on discrete wavelet transform," in Proceedings of the IEEE Pacific Rim Conference, vol. 1, no. 8, pp.164-167, 2001.
6 I. J. Cox, M. l. Miller and J. A. Bloom, "Watermarking applications and their Properties," in Proceedings of the Information Technology:Coding and Computing 2000, pp. 6-10, 2000.
7 J. J. Eggers, J. K. Su, and B. Girod, "Performance of a practical blind watermarking scheme," in Proceedings of the Photonics West 2001-Electronic Imaging, vol. 4314, pp. 594-605, 2001.
8 S. Milani, M, Fontani., P. Bestagini, M. Barni, A. Piva, M. Tagliasacchi, and S. Tubaro, "An overview on video forensics," in Proceeding of Signal Proceedings Conference, pp. 1229-1233, 2012.
9 S.Y Tak, J.M Ban, S Lew, W.J Lee, B.R Lee and H.CKang, "A Study on an Image Stabilization in Moving Vehicle," International Journal of The Institute of Electronics Engineers, vol. 49, no. 4, pp. 95-104, Jun. 2012.
10 S. D. Lin, and Z. L Yang, "Hierarchical Fragile Watermarking Scheme for Image Authentication," International Journal of Intelligent Automation & Soft Computing, vol. 17, no.2 , pp. 245-255, Mar. 2011.   DOI
11 H. J. Kim, S. Xiang and I. K. Yeo. "Robustness analysis of patchwork watermarking schemes," in Digital Audio Watermarking Techniques and Technologies:Applications and Benchmarks. IGI Global, pp. 172-186, 2008.
12 R. Amirtharajan, and J. B. B. Rayappan, "Brownian motion of binary and gray-binary and gray bits in image for stego," International Journal of Applied Sciences, vol.12, no.5, pp. 428-439, May. 2012.   DOI
13 M. U. Celik, G. Sharma, A. M. Tekalp and E. Saber, "Lossless generalized-LSB data embedding," IEEE Transactions on Image Processing, vol.14, no.2, pp.253- 266, Feb. 2005.   DOI
14 S. Lee, C. D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Transactions on Information Forensics and Security, vol.2, no.3, pp.321- 330, Sept. 2007.   DOI