Home Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding
Article
Licensed
Unlicensed Requires Authentication

Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding

  • J. Jennifer Ranjani ORCID logo EMAIL logo and M. Babu
Published/Copyright: July 19, 2017
Become an author with De Gruyter Brill

Abstract

Increased growth of information technology in healthcare has led to a situation where the security of patient information is more important and is a critical issue. The aim of the proposed algorithm is to provide a framework to verify the integrity of the medical images. In this paper, the integrity of the medical images is verified by embedding hash signatures using the sequential square embedding technique. This technique is as efficient as the diamond encoding technique but with increased payload capability. The medical image is first divided into the region of interest (ROI) block and the signature block. The hash signatures are determined by dividing the ROI into nonoverlapping blocks. During the data hiding stage, the hash signatures are embedded in randomly chosen pixel pairs in the signature block using the sequential square encoding (SSE) technique. In the experimental results, the data hiding capacity of the proposed SSE technique is verified in terms of peak signal-to-noise ratio. Also, the medical image integrity is substantiated by comparing the L2 norm between computed and extracted hash signatures. Modifications such as contrast enhancement, rotation, scaling, and changing the image information result in increased L2 norm; thus, the integrity of the medical images can be verified. The parameters required for embedding, such as the embedding parameter and the seed for random sequence generation, are encrypted and communicated to the receiving end. Hence, the proposed algorithm provides a secure framework for medical image integrity verification.

Bibliography

[1] A. Al-Haj, G. Abandah and N. Hussein, Crypto-based algorithms for secured medical image transmission, IET Inf. Security9 (2015), 365–373.10.1049/iet-ifs.2014.0245Search in Google Scholar

[2] A. Andreopoulos and J. K. Tsotsos, Efficient and generalizable statistical models of shape and appearance for analysis of cardiac MRI, Med. Image Anal.12 (2008), 335–357.10.1016/j.media.2007.12.003Search in Google Scholar PubMed

[3] H. C. Andrew and C. L. Patterson, Singular value decompositions and digital image processing, IEEE Trans. Acoustics Speech Signal Process.24 (1976), 26–53.10.1109/TASSP.1976.1162766Search in Google Scholar

[4] D. Bouslimi, G. Coatrieux, M. Cozic and C. Roux, A joint encryption/watermarking system for verifying the reliability of medical image, IEEE Trans. Inf. Technol. Biomed.16 (2012), 891–899.10.1109/TITB.2012.2207730Search in Google Scholar PubMed

[5] J. Buchmann, Introduction to Cryptography, Springer-Verlag, New York, 2001.10.1007/978-1-4684-0496-8Search in Google Scholar

[6] R. M. Chao, H. C. Wu, C. C. Lee and Y. P. Chu, A novel image data hiding scheme with diamond encoding, EURASIP J. Inf.Security2009 (2009), 1–9.10.1155/2009/658047Search in Google Scholar

[7] G. Coatrieux, C. Le Guillou, J.-M. Cauvin and C. Roux, Reversible watermarking for knowledge digest embedding and reliability control in medical images, IEEE Trans. Inf. Technol. Biomed.13 (2009), 158–165.10.1109/TITB.2008.2007199Search in Google Scholar PubMed

[8] G. Coatrieux, H. Huang, H. Shu, L. Luo and C. Roux, A watermarking-based medical image integrity control system and an image moment signature for tampering characterization, IEEE J. Biomed. Health Inform.17 (2013), 1057–1067.10.1109/JBHI.2013.2263533Search in Google Scholar PubMed

[9] Y. Dai and X. Wang, Medical image encryption based on a composition of logistic maps and Chebyshev maps, Proc. IEEE Conf. Inf. Automat. (2012), 210–214.10.1109/ICInfA.2012.6246810Search in Google Scholar

[10] R. Eswaraiah and E. S. Reddy, Robust medical image watermarking techniques for accurate detection of tampers inside region of interest and recovering original region of interest, IET Image Process.9 (2015), 615–625.10.1049/iet-ipr.2014.0986Search in Google Scholar

[11] H. Farid, Image forgery detection: a survey, IEEE Signal Process. Mag.26 (2009), 16–25.10.1109/MSP.2008.931079Search in Google Scholar

[12] A. Giakoumaki, S. Pavlopoulos and D. Koutsouris, Multiple image watermarking applied to health information management, IEEE Trans. Inf. Technol. Biomed.10 (2006), 722–732.10.1109/TITB.2006.875655Search in Google Scholar

[13] W. Hong, Adaptive reversible data hiding method based on error energy control and histogram shifting, Opt. Commun.285 (2012), 101–108.10.1016/j.optcom.2011.09.005Search in Google Scholar

[14] W. Hong and T. S. Chen, A novel data embedding method using adaptive pixel pair matching, IEEE Trans. Inf. Forens. Security7 (2012), 176–184.10.1109/TIFS.2011.2155062Search in Google Scholar

[15] H. Huang, G. Coatrieux, H. Shu, L. Luo and C. Roux, Blind integrity verification of medical images, IEEE Trans. Inf. Technol. Biomed.16 (2012), 1122–1126.10.1109/TITB.2012.2207435Search in Google Scholar PubMed

[16] T. Kauppi, V. Kalesnykiene, J.-K. Kamarainen, L. Lensu, I. Sorri, H. Uusitalo, H. Kalviainen and J. Pietila, DIARETDB0: Evaluation Database and Methodology for Diabetic Retinopathy Algorithms, 2007, Available at: http://www.it.lut.fi/project/imageret/diaretdb0/index.html.Search in Google Scholar

[17] T. Kauppi, V. Kalesnykiene, J.-K. Kamarainen, L. Lensu, I. Sorri, A. Raninen, R. Voutilainen, H. Uusitalo, H. Kalviainen and J. Pietila, DIARETDB1: Diabetic Retinopathy Database and Evaluation Protocol, 2007, Available at: http://www.it.lut.fi/project/imageret/diaretdb1/index.html.10.5244/C.21.15Search in Google Scholar

[18] L. O. M. Kobayashi, S. S. Furuie and P. S. L. M. Barreto, Providing integrity and authenticity in DICOM images: a novel approach, IEEE Trans. Inf. Technol. Biomed.13 (2009), 582–589.10.1109/TITB.2009.2014751Search in Google Scholar PubMed

[19] S. S. Kozat, R. Venkatesan and M. K. Mihcak, Robust perceptual image hashing via matrix invariants, Proc. IEEE Conf. Image Process. (2004), 3443–3446.10.1109/ICIP.2004.1421855Search in Google Scholar

[20] L. Laouamer, L. T. Nana, M. Al Shakh and A. C. Pascu, Informed symmetric encryption algorithm for DICOM medical image based on N-grams, Proc. IEEE Conf. Sci. Inf. (2013), 353–357.Search in Google Scholar

[21] X. Li, B. Yang and T. Zeng, Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection, IEEE Trans. Image Process.20 (2011), 3524–3533.10.1109/TIP.2011.2150233Search in Google Scholar PubMed

[22] X. Li, B. Li, B. Yang and T. Zeng, General framework to histogram-shifting-based reversible data hiding, IEEE Trans. Image Process.22 (2013), 2181–2191.10.1109/TIP.2013.2246179Search in Google Scholar PubMed

[23] A. B. Mahmood and R. D. Dony, Segmentation based encryption method for medical images, Proc. IEEE Conf. Internet Technol. Secured Trans. (2011), 596–601.Search in Google Scholar

[24] V. Monga and M. K. Mihcak, Robust and secure image hashing via non-negative matrix factorizations, IEEE Trans. Inf. Forens. Security2 (2007), 377–390.10.1109/TIFS.2007.902670Search in Google Scholar

[25] T.-S. Nguyen, C.-C. Chang and N.-T. Huynh, A novel reversible data hiding scheme based on difference histogram modification and optimal EMD algorithm, J. Vis. Commun. Image Represent.33 (2015), 389–397.10.1016/j.jvcir.2015.10.008Search in Google Scholar

[26] N. Otsu, A threshold selection method from gray-level histograms, IEEE Trans. Syst. Man Cybernet.9 (1979), 62–66.10.1109/TSMC.1979.4310076Search in Google Scholar

[27] W. Pan, G. Coatrieux, N. Cuppens-Boulahia, F. Cuppens and C. Roux, Medical image integrity control combining digital signature and lossless watermarking, In: Data Privacy Management and Autonomous Spontaneous Security, Lecture Notes in Computer Science, J. Garcia-Alfaro, G. Navarro-Arribas, N. Cuppens-Boulahia and Y. Roudier, eds., vol. 5939, Springer, Berlin, 2010, pp. 153–162.10.1007/978-3-642-11207-2_12Search in Google Scholar

[28] R. Pandey, A. K. Singh, B. Kumar and A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology, Multimedia Tools Appl.75 (2017), 14381–14397.10.1007/s11042-016-3536-6Search in Google Scholar

[29] J. J. Ranjani and M. S. Chithra, Bayesian denoising of ultrasound images using heavy-tailed Levy distribution, IET Image Process.9 (2015), 338–345.10.1049/iet-ipr.2013.0863Search in Google Scholar

[30] V. Sachnev, H. J. Kim, J. Nam, S. Suresh and Y. Q. Shi, Reversible watermarking algorithm using sorting and prediction, IEEE Trans. Circuit Syst. Video Technol.19 (2009), 989–999.10.1109/TCSVT.2009.2020257Search in Google Scholar

[31] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley, New Jersey, 1996.Search in Google Scholar

[32] A. Sharma, A. K. Singh and S. P. Ghrera, Robust and secure multiple watermarking technique for medical images, Wireless Pers. Commun.92 (2017), 1611–1624.10.1007/s11277-016-3625-xSearch in Google Scholar

[33] A. K. Singh, Improved hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimedia Tools Appl.76 (2017), 8881–8900.10.1007/s11042-016-3514-zSearch in Google Scholar

[34] A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain, Natl. Acad. Sci. Lett.37 (2014), 351–358.10.1007/s40009-014-0241-8Search in Google Scholar

[35] A. K. Singh, M. Dave and A. Mohan, Robust and secure multiple watermarking in wavelet domain, J. Med. Imaging Health Inform.5 (2015), 406–414.10.1166/jmihi.2015.1407Search in Google Scholar

[36] A. K. Singh, B. Kumar, M. Dave and A. Mohan, Multiple watermarking on medical images using selective discrete wavelet transform coefficients, J. Med. Imaging Health Inform.5 (2015), 607–614.10.1166/jmihi.2015.1432Search in Google Scholar

[37] A. K. Singh, B. Kumar and M. Dave, Robust and imperceptible dual watermarking for telemedicine applications, Wireless Pers. Commun.80 (2015), 1415–1433.10.1007/s11277-014-2091-6Search in Google Scholar

[38] A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Pers. Commun.83 (2015), 2133–2150.10.1007/s11277-015-2505-0Search in Google Scholar

[39] J. J. Staal, M. D. Abramoff, M. Niemeijer, M. A. Viergever and B. Van Ginneken, Ridge based vessel segmentation in color images of the retina, IEEE Trans. Med. Imaging23 (2004), 501–509.10.1109/TMI.2004.825627Search in Google Scholar PubMed

[40] A. Zear, A. K. Singh and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine, Multimedia Tools Appl. (2016), doi: 10.1007/s11042-016-3862-8 (Online First).10.1007/s11042-016-3862-8Search in Google Scholar

[41] A. Zear, A. K. Singh and P. Kumar, Multiple watermarking for healthcare applications, J. Intell. Syst. 27 (2018), 5–18.10.1515/jisys-2016-0036Search in Google Scholar

[42] A. Zear, A. K. Singh and P. Kumar, Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications, Int. J. Inf. Comput. Security9 (2017), 20–37.10.1504/IJICS.2017.082837Search in Google Scholar

Received: 2017-01-30
Published Online: 2017-07-19
Published in Print: 2018-01-26

©2018 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 3.11.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jisys-2017-0019/html
Scroll to top button