Abstract
Among security mechanisms studied today, a growing interest is given to the protection of digital content especially with the help of encryption, watermarking and, more recently, of their combination. If encryption can be considered as an “a priori” protection mechanism since once data are decrypted they are no longer protected, it should be completed by an “a posteriori” protection, a protection watermarking can provide. Basically, when it is applied to images, watermarking modifies or modulates in an imperceptible way the image pixels’ gray level values in order to insert a message. This message can be used to assess the origins as well as the integrity of the image. As defined, watermarking provides an “a posteriori” protection as the image content is still available for interpretation while remaining protected. In order to benefit from the complementarity of these two mechanisms, in terms of a priori/a posteriori protection, different approaches have been proposed. In this chapter, focusing in the healthcare domain, we present the different purposes for which these approaches have been proposed for.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
DMP: “Dossier Médical Personnel”, supported by The ASIP santé; dmp.gouv.fr.
- 2.
DICOM: Digital Imaging and Communications in Medicine; http://medical.nema.org.
References
Abbas, A., Khan, S.: A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J. Biomed. Health Inform. 18(4), 1431–1441 (2014)
Adelsbach, A., Huber, U., Sadeghi, A.: Fingercasting-joint fingerprinting and decryption of broadcast messages. Transactions on DHMS II. Lecture Notes in Computer Science, vol. 4499 pp. 1–34. Springer, Heidelberg (2007)
Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13(8), 1147–1156 (2004)
Allaërt, F.A., Dusserre, L.: Security of health information system in France: what we do will no longer be different from what we tell. Int. J. Biomed. Comput. 35, 201–204 (1994)
Allaërt, A., Quantin, C.: Responsabilités et rémunérations des actes de télé-expertise. Journal de Gestion et d’Economie Médicales 30(4), 219–229 (2012)
Alliance, W.F.: Wi-fi Protected Access: Strong, Standards-Based, Interoperable Security for Today’s Wi-Fi Networks, pp. 492–495. White paper, University of Cape Town (2003)
Anderson, R.J., Manifavas, C.: Chameleon: a new kind of stream cipher. In: 4th Int. Workshop Fast Software Encryption (FSE), pp. 107–113 (1997)
Antonini, M., Barlaud, M., Mathieu, P., Daubechies, I.: Image coding using wavelet transform. IEEE Trans. Image Process. 1(2), 205–220 (1992)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3.4), 313–336 (1996)
Boho, A., Van Wallendael, G., Dooms, A., De Cock, J., Braeckman, G., Schelkens, P., Preneel, B., Van de Walle, R.: End-to-end security for video distribution, the combination of encryption, watermarking, and video adaptation. IEEE Signal Process. Mag. 30(2), 97–107 (2013)
Bouslimi, D., Coatrieux, G., Roux, C.: A telemedicine protocol based on watermarking evidences for identification of liabilities in case of litigation. In: IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 506–509 (2012)
Bouslimi, D., Coatrieux, G., Cozic, M., Roux, C.: A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Trans. Inf. Technol. Biomed. 16, 891–899 (2012)
Bouslimi, D., Coatrieux, G., Roux, C.: A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images. Comput. Methods Programs Biomed. 106, 47–54 (2012)
Cancellaro, M., Battisti, F., Carli, M., Boato, G., De Natale, F.G.B., Neri, A.: A joint digital watermarking and encryption method. SPIE 6819, 68, 191C (2008)
Cancellaro, M., Battisti, F., Carli, M., Boato, G., De Natale, F.G.B., Neri, A.: A commutative digital image watermarking and encryption method in the tree structured haar transform domain. Signal Process. Image Commun. 26(1), 1–12 (2011)
Celik, M., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. Proc. IEEE ICIP 2, 157–160 (2002)
Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Look-up table based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 3(3), 475–487 (2008)
Charpentier, A., Fontaine, C., Furon, T., Cox, I.: An asymmetric fingerprinting scheme based on tardos codes. In: 13th International Conference on Information Hiding (IH), vol. 6958, pp. 43–58 (2011)
Chakrabarti, C., Vishwanath, M., Owens, R.: Architectures for wavelet transforms: a survey. J. VLSI Signal Process. Syst. Signal Image Video Technol. 14(2), 171–192 (1996)
Chen, B., Wornell, G.: Quantization Index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)
Chen, C., Wu, X.: An angle QIM watermarking algorithm based on Watson perceptual model. In: Fourth International Conference on Image and Graphics, pp. 324–328 (2007)
Chiang, K., Chang-Chien, K., Chang, R., Yen, H.: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J. Digit. Imaging 21(1), 77–90 (2008)
Chrysochos, E., Fotopoulos, V., Skodras, A.N., Xenos, M.: Reversible image watermarking based on histogram modification. In: 11th Panhellenic Conf. of Informatics (PCI), pp. 93–104 (2007)
Costa, M.: Writing on dirty paper. IEEE Trans. Inf. Theory 58, 782–800 (2003)
Coatrieux, G., Maître, H., Sankur, B., Rolland, Y., Collorec, R.: Relevance of watermarking in medical imaging. In: IEEE EMBS Conference on Information Technology Applications in Biomedicine, pp. 250–255 (2000)
Coatrieux, G., Maître, H., Rolland, Y.: Tatouage d’images médicales: perception d’une marque. In: SETIT (2003)
Coatrieux, G., Puentes, J., Lecornu, L., Cheze Le Rest, C., Roux, C.: Compliant secured specialized electronic patient record platform. In: 1st International Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2), pp. 156–159 (2006)
Coatrieux, G., Le Guillou, C., Cauvin, J.M., Roux, C.: Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans. Inf. Technol. Biomed. 13(2), 158–165 (2009)
Coatrieux, G., Huang, H., Shu, H., Roux, C., Luo, L.: A watermarking based medical image integrity control system and an image moment signature for tampering characterization. IEEE J. Biomed. Health Inform. 17(6), 1057–1067 (2013)
Cox, I., Miller, M., Bloom, J., Honsinger, C.: Digital Watermarking, vol. 53. Springer, Berlin (2002)
Cox, I., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Los Altos (2007)
Daemen, J., Rijmen, V.: AES Proposal: The Rijndael Block Cipher. Technical report, Proton World Int.1, Katholieke Universiteit Leuven, ESAT-COSIC, Belgique (2002)
David, S., Mendelson, M.: RSNA Image Share 2012. In: SIIM (2012)
De Moor, G.: Standardisation in health care informatics and telematics in Europe: CEN TC 251 activities. Stud. Health Technol. Inform. 6, 1–13 (1993)
De Vleeschouwer, C., Delaigle, J., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia 5(1), 97–105 (2003)
Décret n∘ 2010-1229 du 19 octobre 2010 relatif à la télémédecine
Devlin, B., Cote, L.: Data warehouse: from architecture to implementation. Addison-Wesley Longman Publishing Co., Amsterdam (1996)
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol, Version 1.2 (2008)
Diebold, F.: A Personal Perspective on the Origin(s) and Development of ‘Big Data’: The Phenomenon, the Term, and the Discipline. Sage, London (2012)
Dusserre, L. and Allaërt, F.A. and Quantin, C.: Pmsi et déontologie. Le Pmsi: questions juridiques et éthiques. In: Actes du colloque Information Médicale, Secret et droits d’accès des acteurs, pp. 75–79 (1991)
Eastlake III, D., Jones, P.: Us secure hash algorithm 1 (sha1). Technical report, RFC 3174 (Informational) (2001)
Eskicioglu, A., Fisher, P.: Image quality measures and their performance. IEEE Trans. Commun. 43(12), 2959–2965 (1995)
Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007(1), 1–15 (2007)
Franco-Contreras, J., Coatrieux, G., Cuppens, F., Roux, C., Cuppens-Boulahia, N.: Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. Inf. Forensics Secur. 9(3), 397–410 (2014)
Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)
Fridrich, J., Goljan, M.: Protection of digital images using self embedding. In: Symposium on Content Security and Data Hiding in Digital Media (1999)
Fridrich, J., Goljan, J., Du, R.: Invertible authentication. In: Proceedings of International Conference SPIE, Security and Watermarking of Multimedia Content, pp. 197–208 (2001)
Fung, C., Gortan, A., Godoy, Jr., W.: A review study on image digital watermarking. In: The Tenth International Conference on Networks (ICN 2011), pp. 24–28 (2011)
Furon, T., Bas, P.: Broken arrows. EURASIP J. Inf. Secur. 2008, 3 (2008)
Guru, J., Damecha, H.: Digital watermarking classification: a survey. Int. J. Comput. Sci. Trends Technol. 2, 8–13
Herrera-Joancomartí, J., Katzenbeisser, S., Megías, J., Minguillón, D., Pommer, A., Steinebach, M., Uhl, A.: ECRYPT European network of excellence in cryptology. First summary report on hybrid systems, D.WVL.5 (2005)
Honsinger, C., Jones, P., Rabbani, M., Stoffel, J.: Lossless recovery of an original image containing embedded data. US Patent application, Docket No.: 77102/E-D (1999)
Hwang, H., Kim, H., Sachnev, V., Joo, S.: Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting. KSII Trans. Internet Inf. Syst. 4, 655 (2010)
Katzenbeisser, S., Petitcolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston (2000)
Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Electronic Imaging ’99. Security and Watermarking of Multimedia Contents, vol. 3657 (1999)
Lashkari, A., Towhidi, F., Hosseini, R.: Wired equivalent privacy (WEP). In: International Conference on Future Computer and Communication (ICFCC), pp. 492–495 (2009)
Légifrance: Loi n 2002-303 du 4 mars 2002. http://www.legifrance.gouv.fr/affichTexte.do? (2002)
Liu, K.: Human visual system based watermarking for color images. In: Fifth International Conference on Information Assurance and Security (IAS), vol. 2, pp. 623–626. IEEE, New York (2009)
Loytynoja, M., Cvejic, N., Lahetkangas, E., Seppanen, T.: Audio encryption using fragile watermarking. In: Proc. IEEE Int. Conference on Information, Communications and Signal Processing, pp. 881—885 (2005)
Lee, H., Kim, H., Kwon, K., Lee, J.: Digital watermarking of medical image using ROI information. In: Proc. IEEE Int. Workshop Healthcom, pp. 404–407 (2005)
Lee, S., Yoo, C., Kalker, T.: Reversible image watermarking based on integer-to-integer wavelet transform information forensics and security. IEEE Trans. Inf. Forensics Secur. 2(3), 321–330 (2007)
Li, Q., Cox, I.: Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking. IEEE Trans. Inf. Forensics Secur. 2(2), 127–139 (2007)
Liew, S.C., Zain, J.M.: Reversible tamper localization and recovery watermarking scheme with secure hash. Eur. J. Sci. Res. 49(2), 249–264 (2011)
Manasrah, T., Al-Haj, A.: Management of medical images using wavelets-based multi-watermarking algorithm. In: International Conference on Innovations in Information Technology, pp. 697–701 (2008)
Meerwald, P., Uhl, A.: Survey of wavelet-domain watermarking algorithms. In: Photonics West 2001-Electronic Imaging. International Society for Optics and Photonics, pp. 505–516 (2001)
Memon, N., Wong, P.: A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10, 643–649 (2001)
Menezes, A.J., Van Oorshot, P., Vanstone, S.: Handbook of Applied Crytography. CRC Press, Boca Raton (1996)
Mintzer, F., Lotspiech, J., Morimoto, N.: Safeguarding digital library contents and users: digital watermarking. D-Lib Mag. (1997)
Ni, Z., Shi, Y., Ansari, N., Wei, S.: Reversible data hiding. Proc. IEEE Int. Symp. Circuits Syst. 2, 912–915 (2003)
Paillier-99, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT), vol. 1592, pp. 223–238 (1999)
Pan, W., Coatrieux, G., Montagner, J., Cuppens, N., Cuppens, F., Roux, C.: Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking. Lecture Notes in Computer Science, vol. 5939, pp. 153–162. Springer, Heidelberg (2009)
Pan, W., Coatrieux, G., Montagner, J., Cuppens, N., Cuppens, F., Roux, C.: Reversible watermarking based on invariant image classification and dynamical error histogram shifting. In: Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 4477–4480 (2011)
Pérez-González, F., Mosquera, C., Barni, M., Abrardo, A.: Rational dither modulation: a high-rate data-hiding method invariant to gain attacks. IEEE Trans. Signal Process. 53(10), 3960–3975 (2005)
Piva, A., Barni, M., Bartolini, F., De Rosa, A.: Data hiding technologies for digital radiography. Proc. IEE Vision Image Signal Process. 152(5), 604–610 (2005)
Puech, W., Rodrigues, J.: A new crypto-watermarking method for medical images safe transfer. In: Proc. of the 12th European Signal Processing Conference (EUSIPCO’04), pp. 1481–1484 (2004)
Puech, W., Chaumont, M., Strauss, O.: A reversible data hiding method for encrypted images. In: SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, p. 68191E (2008)
Quantin, C., Jaquet-Chiffelle, D., Coatrieux, G., Benzenine, E., Allaert, F.: Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records. Int. J. Med. Inform. 80(2), e6–11 (2011)
Rajendra-Acharya, U., Acharya, D., Subbanna Bhat, P., Niranjan, U.: Compact storage of medical images with patient information. IEEE Trans. Inf. Technol. Biomed. 5(4), 320–323 (2001)
Rajendra-Acharya, U., Niranjan, U., Iyengar, S., Kannathal, N., Min, L.: Simultaneous storage of patient information with medical images in the frequency domain. Comput. Methods Programs Biomed. 76, 13–19 (2004)
Rao, K., Yip, P.: Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic, San Diego (1990)
Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B.: A provably secure anonymous buyer–seller watermarking protocol. IEEE Trans. Inf. Forensics Secur. 5(4), 920–931 (2010)
Rodrigues, J., Puech, W., Fiorio, C.: Lossless crypto-data hiding in medical images without increasing the original image size. In: 2nd International Conference on Advances in Medical Signal and Information Processing, pp. 358–365 (2004)
Sachnev, V., Kim, H., Nam, J., Suresh, S., Shi, Y.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuit Syst. Video Technol. 19(7), 989–999 (2009)
Schmitz, R., Li, S., Grecos, C., Zhang, X.: A new approach to commutative watermarking encryption. In: 13th Joint IFIP TC6 and TC11 Conf. Communications and Multimedia Security (2012)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. International Thomson Publishing, Paris (1997)
Shih, F.: Digital Watermarking and Steganography: Fundamentals and Techniques. CRC Press, Boca Raton (2012)
Singh, J., Dubey, A.: MPEG-2 video watermarking using quantization index modulation. In: IEEE 4th International Conference on Internet Multimedia Services Architecture and Application(IMSAA), pp. 1–6 (2010)
Singhal, N., Lee, Y., Kim, C., Lee, S.: Robust image watermarking based on local Zernike moments. In: IEEE 9th Workshop on Multimedia Signal Processing, pp. 401–404 (2007)
Smith, S.W.: The discrete fourier transform, Chap. 8 In: The Scientist and Engineer’s Guide to Digital Signal Processing, 2nd edn. California Technical Publishing, San Diego (1999)
Snyder, A., Weaver, A.: The e-logistics of securing distributed medical data. In: Proceedings of IEEE International Conference on Industrial Informatics (INDIN 2003), pp. 207–216. IEEE, New York (2003)
Subramanyam, A., Emmanuel, S., Kankanhalli, M.: Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans. Multimedia 14(3), 703–716 (2012)
Tian, J.: Reversible data embedding using a difference expansion,. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)
Watson, A.B.: DCT quantization matrices optimized for individual images. In: Human Vision, Visual Processing, and Digital Display IV (SPIE’1993), vol. 1913, pp. 202–216 (1993)
Xuan, G., Chen, J., Zhu, J., Shi, Y., Ni, Z., Su, W.: Lossless data hiding based on integer wavelet transform. In: Proc. MMSP, pp. 312–315 (2002)
Xuan, G., Yao, Q., Yang, C., Gao, J.: Lossless data hiding using histogram shifting method based on integer wavelets. IWDW 2006. Lecture Notes in Computer Science, vol. 4283, pp. 323–332. Springer, Heidelberg (2006)
Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)
Zhu, X.: A new spatial perceptual mask for image watermarking. In: 19th International Conference on Pattern Recognition (ICPR), pp. 1–4. IEEE, New York (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Bouslimi, D., Coatrieux, G. (2015). Encryption and Watermarking for medical Image Protection. In: Gkoulalas-Divanis, A., Loukides, G. (eds) Medical Data Privacy Handbook. Springer, Cham. https://doi.org/10.1007/978-3-319-23633-9_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-23633-9_19
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23632-2
Online ISBN: 978-3-319-23633-9
eBook Packages: Computer ScienceComputer Science (R0)