Skip to main content

Encryption and Watermarking for medical Image Protection

  • Chapter
Medical Data Privacy Handbook

Abstract

Among security mechanisms studied today, a growing interest is given to the protection of digital content especially with the help of encryption, watermarking and, more recently, of their combination. If encryption can be considered as an “a priori” protection mechanism since once data are decrypted they are no longer protected, it should be completed by an “a posteriori” protection, a protection watermarking can provide. Basically, when it is applied to images, watermarking modifies or modulates in an imperceptible way the image pixels’ gray level values in order to insert a message. This message can be used to assess the origins as well as the integrity of the image. As defined, watermarking provides an “a posteriori” protection as the image content is still available for interpretation while remaining protected. In order to benefit from the complementarity of these two mechanisms, in terms of a priori/a posteriori protection, different approaches have been proposed. In this chapter, focusing in the healthcare domain, we present the different purposes for which these approaches have been proposed for.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    DMP: “Dossier Médical Personnel”, supported by The ASIP santé; dmp.gouv.fr.

  2. 2.

    DICOM: Digital Imaging and Communications in Medicine; http://medical.nema.org.

References

  1. Abbas, A., Khan, S.: A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J. Biomed. Health Inform. 18(4), 1431–1441 (2014)

    Google Scholar 

  2. Adelsbach, A., Huber, U., Sadeghi, A.: Fingercasting-joint fingerprinting and decryption of broadcast messages. Transactions on DHMS II. Lecture Notes in Computer Science, vol. 4499 pp. 1–34. Springer, Heidelberg (2007)

    Google Scholar 

  3. Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13(8), 1147–1156 (2004)

    Article  MathSciNet  Google Scholar 

  4. Allaërt, F.A., Dusserre, L.: Security of health information system in France: what we do will no longer be different from what we tell. Int. J. Biomed. Comput. 35, 201–204 (1994)

    Google Scholar 

  5. Allaërt, A., Quantin, C.: Responsabilités et rémunérations des actes de télé-expertise. Journal de Gestion et d’Economie Médicales 30(4), 219–229 (2012)

    Article  Google Scholar 

  6. Alliance, W.F.: Wi-fi Protected Access: Strong, Standards-Based, Interoperable Security for Today’s Wi-Fi Networks, pp. 492–495. White paper, University of Cape Town (2003)

    Google Scholar 

  7. Anderson, R.J., Manifavas, C.: Chameleon: a new kind of stream cipher. In: 4th Int. Workshop Fast Software Encryption (FSE), pp. 107–113 (1997)

    Google Scholar 

  8. Antonini, M., Barlaud, M., Mathieu, P., Daubechies, I.: Image coding using wavelet transform. IEEE Trans. Image Process. 1(2), 205–220 (1992)

    Article  Google Scholar 

  9. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3.4), 313–336 (1996)

    Google Scholar 

  10. Boho, A., Van Wallendael, G., Dooms, A., De Cock, J., Braeckman, G., Schelkens, P., Preneel, B., Van de Walle, R.: End-to-end security for video distribution, the combination of encryption, watermarking, and video adaptation. IEEE Signal Process. Mag. 30(2), 97–107 (2013)

    Article  Google Scholar 

  11. Bouslimi, D., Coatrieux, G., Roux, C.: A telemedicine protocol based on watermarking evidences for identification of liabilities in case of litigation. In: IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 506–509 (2012)

    Google Scholar 

  12. Bouslimi, D., Coatrieux, G., Cozic, M., Roux, C.: A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Trans. Inf. Technol. Biomed. 16, 891–899 (2012)

    Article  Google Scholar 

  13. Bouslimi, D., Coatrieux, G., Roux, C.: A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images. Comput. Methods Programs Biomed. 106, 47–54 (2012)

    Article  Google Scholar 

  14. Cancellaro, M., Battisti, F., Carli, M., Boato, G., De Natale, F.G.B., Neri, A.: A joint digital watermarking and encryption method. SPIE 6819, 68, 191C (2008)

    Google Scholar 

  15. Cancellaro, M., Battisti, F., Carli, M., Boato, G., De Natale, F.G.B., Neri, A.: A commutative digital image watermarking and encryption method in the tree structured haar transform domain. Signal Process. Image Commun. 26(1), 1–12 (2011)

    Article  MATH  Google Scholar 

  16. Celik, M., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. Proc. IEEE ICIP 2, 157–160 (2002)

    Google Scholar 

  17. Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Look-up table based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 3(3), 475–487 (2008)

    Article  Google Scholar 

  18. Charpentier, A., Fontaine, C., Furon, T., Cox, I.: An asymmetric fingerprinting scheme based on tardos codes. In: 13th International Conference on Information Hiding (IH), vol. 6958, pp. 43–58 (2011)

    Google Scholar 

  19. Chakrabarti, C., Vishwanath, M., Owens, R.: Architectures for wavelet transforms: a survey. J. VLSI Signal Process. Syst. Signal Image Video Technol. 14(2), 171–192 (1996)

    Article  Google Scholar 

  20. Chen, B., Wornell, G.: Quantization Index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  21. Chen, C., Wu, X.: An angle QIM watermarking algorithm based on Watson perceptual model. In: Fourth International Conference on Image and Graphics, pp. 324–328 (2007)

    Google Scholar 

  22. Chiang, K., Chang-Chien, K., Chang, R., Yen, H.: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J. Digit. Imaging 21(1), 77–90 (2008)

    Article  Google Scholar 

  23. Chrysochos, E., Fotopoulos, V., Skodras, A.N., Xenos, M.: Reversible image watermarking based on histogram modification. In: 11th Panhellenic Conf. of Informatics (PCI), pp. 93–104 (2007)

    Google Scholar 

  24. Costa, M.: Writing on dirty paper. IEEE Trans. Inf. Theory 58, 782–800 (2003)

    Google Scholar 

  25. Coatrieux, G., Maître, H., Sankur, B., Rolland, Y., Collorec, R.: Relevance of watermarking in medical imaging. In: IEEE EMBS Conference on Information Technology Applications in Biomedicine, pp. 250–255 (2000)

    Google Scholar 

  26. Coatrieux, G., Maître, H., Rolland, Y.: Tatouage d’images médicales: perception d’une marque. In: SETIT (2003)

    Google Scholar 

  27. Coatrieux, G., Puentes, J., Lecornu, L., Cheze Le Rest, C., Roux, C.: Compliant secured specialized electronic patient record platform. In: 1st International Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2), pp. 156–159 (2006)

    Google Scholar 

  28. Coatrieux, G., Le Guillou, C., Cauvin, J.M., Roux, C.: Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans. Inf. Technol. Biomed. 13(2), 158–165 (2009)

    Article  Google Scholar 

  29. Coatrieux, G., Huang, H., Shu, H., Roux, C., Luo, L.: A watermarking based medical image integrity control system and an image moment signature for tampering characterization. IEEE J. Biomed. Health Inform. 17(6), 1057–1067 (2013)

    Article  Google Scholar 

  30. Cox, I., Miller, M., Bloom, J., Honsinger, C.: Digital Watermarking, vol. 53. Springer, Berlin (2002)

    Google Scholar 

  31. Cox, I., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  32. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Los Altos (2007)

    Google Scholar 

  33. Daemen, J., Rijmen, V.: AES Proposal: The Rijndael Block Cipher. Technical report, Proton World Int.1, Katholieke Universiteit Leuven, ESAT-COSIC, Belgique (2002)

    Google Scholar 

  34. David, S., Mendelson, M.: RSNA Image Share 2012. In: SIIM (2012)

    Google Scholar 

  35. De Moor, G.: Standardisation in health care informatics and telematics in Europe: CEN TC 251 activities. Stud. Health Technol. Inform. 6, 1–13 (1993)

    Google Scholar 

  36. De Vleeschouwer, C., Delaigle, J., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia 5(1), 97–105 (2003)

    Article  Google Scholar 

  37. Décret n 2010-1229 du 19 octobre 2010 relatif à la télémédecine

    Google Scholar 

  38. Devlin, B., Cote, L.: Data warehouse: from architecture to implementation. Addison-Wesley Longman Publishing Co., Amsterdam (1996)

    Google Scholar 

  39. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol, Version 1.2 (2008)

    Google Scholar 

  40. Diebold, F.: A Personal Perspective on the Origin(s) and Development of ‘Big Data’: The Phenomenon, the Term, and the Discipline. Sage, London (2012)

    Google Scholar 

  41. Dusserre, L. and Allaërt, F.A. and Quantin, C.: Pmsi et déontologie. Le Pmsi: questions juridiques et éthiques. In: Actes du colloque Information Médicale, Secret et droits d’accès des acteurs, pp. 75–79 (1991)

    Google Scholar 

  42. Eastlake III, D., Jones, P.: Us secure hash algorithm 1 (sha1). Technical report, RFC 3174 (Informational) (2001)

    Google Scholar 

  43. Eskicioglu, A., Fisher, P.: Image quality measures and their performance. IEEE Trans. Commun. 43(12), 2959–2965 (1995)

    Article  Google Scholar 

  44. Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007(1), 1–15 (2007)

    Article  Google Scholar 

  45. Franco-Contreras, J., Coatrieux, G., Cuppens, F., Roux, C., Cuppens-Boulahia, N.: Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. Inf. Forensics Secur. 9(3), 397–410 (2014)

    Article  Google Scholar 

  46. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)

    Book  MATH  Google Scholar 

  47. Fridrich, J., Goljan, M.: Protection of digital images using self embedding. In: Symposium on Content Security and Data Hiding in Digital Media (1999)

    Google Scholar 

  48. Fridrich, J., Goljan, J., Du, R.: Invertible authentication. In: Proceedings of International Conference SPIE, Security and Watermarking of Multimedia Content, pp. 197–208 (2001)

    Google Scholar 

  49. Fung, C., Gortan, A., Godoy, Jr., W.: A review study on image digital watermarking. In: The Tenth International Conference on Networks (ICN 2011), pp. 24–28 (2011)

    Google Scholar 

  50. Furon, T., Bas, P.: Broken arrows. EURASIP J. Inf. Secur. 2008, 3 (2008)

    Google Scholar 

  51. Guru, J., Damecha, H.: Digital watermarking classification: a survey. Int. J. Comput. Sci. Trends Technol. 2, 8–13

    Google Scholar 

  52. Herrera-Joancomartí, J., Katzenbeisser, S., Megías, J., Minguillón, D., Pommer, A., Steinebach, M., Uhl, A.: ECRYPT European network of excellence in cryptology. First summary report on hybrid systems, D.WVL.5 (2005)

    Google Scholar 

  53. Honsinger, C., Jones, P., Rabbani, M., Stoffel, J.: Lossless recovery of an original image containing embedded data. US Patent application, Docket No.: 77102/E-D (1999)

    Google Scholar 

  54. Hwang, H., Kim, H., Sachnev, V., Joo, S.: Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting. KSII Trans. Internet Inf. Syst. 4, 655 (2010)

    Google Scholar 

  55. Katzenbeisser, S., Petitcolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston (2000)

    Google Scholar 

  56. Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Electronic Imaging ’99. Security and Watermarking of Multimedia Contents, vol. 3657 (1999)

    Google Scholar 

  57. Lashkari, A., Towhidi, F., Hosseini, R.: Wired equivalent privacy (WEP). In: International Conference on Future Computer and Communication (ICFCC), pp. 492–495 (2009)

    Google Scholar 

  58. Légifrance: Loi n 2002-303 du 4 mars 2002. http://www.legifrance.gouv.fr/affichTexte.do? (2002)

  59. Liu, K.: Human visual system based watermarking for color images. In: Fifth International Conference on Information Assurance and Security (IAS), vol. 2, pp. 623–626. IEEE, New York (2009)

    Google Scholar 

  60. Loytynoja, M., Cvejic, N., Lahetkangas, E., Seppanen, T.: Audio encryption using fragile watermarking. In: Proc. IEEE Int. Conference on Information, Communications and Signal Processing, pp. 881—885 (2005)

    Google Scholar 

  61. Lee, H., Kim, H., Kwon, K., Lee, J.: Digital watermarking of medical image using ROI information. In: Proc. IEEE Int. Workshop Healthcom, pp. 404–407 (2005)

    Google Scholar 

  62. Lee, S., Yoo, C., Kalker, T.: Reversible image watermarking based on integer-to-integer wavelet transform information forensics and security. IEEE Trans. Inf. Forensics Secur. 2(3), 321–330 (2007)

    Article  Google Scholar 

  63. Li, Q., Cox, I.: Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking. IEEE Trans. Inf. Forensics Secur. 2(2), 127–139 (2007)

    Article  Google Scholar 

  64. Liew, S.C., Zain, J.M.: Reversible tamper localization and recovery watermarking scheme with secure hash. Eur. J. Sci. Res. 49(2), 249–264 (2011)

    Google Scholar 

  65. Manasrah, T., Al-Haj, A.: Management of medical images using wavelets-based multi-watermarking algorithm. In: International Conference on Innovations in Information Technology, pp. 697–701 (2008)

    Google Scholar 

  66. Meerwald, P., Uhl, A.: Survey of wavelet-domain watermarking algorithms. In: Photonics West 2001-Electronic Imaging. International Society for Optics and Photonics, pp. 505–516 (2001)

    Google Scholar 

  67. Memon, N., Wong, P.: A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10, 643–649 (2001)

    Article  MATH  Google Scholar 

  68. Menezes, A.J., Van Oorshot, P., Vanstone, S.: Handbook of Applied Crytography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  69. Mintzer, F., Lotspiech, J., Morimoto, N.: Safeguarding digital library contents and users: digital watermarking. D-Lib Mag. (1997)

    Google Scholar 

  70. Ni, Z., Shi, Y., Ansari, N., Wei, S.: Reversible data hiding. Proc. IEEE Int. Symp. Circuits Syst. 2, 912–915 (2003)

    Google Scholar 

  71. Paillier-99, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT), vol. 1592, pp. 223–238 (1999)

    Google Scholar 

  72. Pan, W., Coatrieux, G., Montagner, J., Cuppens, N., Cuppens, F., Roux, C.: Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking. Lecture Notes in Computer Science, vol. 5939, pp. 153–162. Springer, Heidelberg (2009)

    Google Scholar 

  73. Pan, W., Coatrieux, G., Montagner, J., Cuppens, N., Cuppens, F., Roux, C.: Reversible watermarking based on invariant image classification and dynamical error histogram shifting. In: Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 4477–4480 (2011)

    Google Scholar 

  74. Pérez-González, F., Mosquera, C., Barni, M., Abrardo, A.: Rational dither modulation: a high-rate data-hiding method invariant to gain attacks. IEEE Trans. Signal Process. 53(10), 3960–3975 (2005)

    Article  MathSciNet  Google Scholar 

  75. Piva, A., Barni, M., Bartolini, F., De Rosa, A.: Data hiding technologies for digital radiography. Proc. IEE Vision Image Signal Process. 152(5), 604–610 (2005)

    Article  Google Scholar 

  76. Puech, W., Rodrigues, J.: A new crypto-watermarking method for medical images safe transfer. In: Proc. of the 12th European Signal Processing Conference (EUSIPCO’04), pp. 1481–1484 (2004)

    Google Scholar 

  77. Puech, W., Chaumont, M., Strauss, O.: A reversible data hiding method for encrypted images. In: SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, p. 68191E (2008)

    Google Scholar 

  78. Quantin, C., Jaquet-Chiffelle, D., Coatrieux, G., Benzenine, E., Allaert, F.: Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records. Int. J. Med. Inform. 80(2), e6–11 (2011)

    Article  Google Scholar 

  79. Rajendra-Acharya, U., Acharya, D., Subbanna Bhat, P., Niranjan, U.: Compact storage of medical images with patient information. IEEE Trans. Inf. Technol. Biomed. 5(4), 320–323 (2001)

    Article  Google Scholar 

  80. Rajendra-Acharya, U., Niranjan, U., Iyengar, S., Kannathal, N., Min, L.: Simultaneous storage of patient information with medical images in the frequency domain. Comput. Methods Programs Biomed. 76, 13–19 (2004)

    Article  Google Scholar 

  81. Rao, K., Yip, P.: Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic, San Diego (1990)

    Book  MATH  Google Scholar 

  82. Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B.: A provably secure anonymous buyer–seller watermarking protocol. IEEE Trans. Inf. Forensics Secur. 5(4), 920–931 (2010)

    Article  Google Scholar 

  83. Rodrigues, J., Puech, W., Fiorio, C.: Lossless crypto-data hiding in medical images without increasing the original image size. In: 2nd International Conference on Advances in Medical Signal and Information Processing, pp. 358–365 (2004)

    Google Scholar 

  84. Sachnev, V., Kim, H., Nam, J., Suresh, S., Shi, Y.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuit Syst. Video Technol. 19(7), 989–999 (2009)

    Article  Google Scholar 

  85. Schmitz, R., Li, S., Grecos, C., Zhang, X.: A new approach to commutative watermarking encryption. In: 13th Joint IFIP TC6 and TC11 Conf. Communications and Multimedia Security (2012)

    Google Scholar 

  86. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. International Thomson Publishing, Paris (1997)

    MATH  Google Scholar 

  87. Shih, F.: Digital Watermarking and Steganography: Fundamentals and Techniques. CRC Press, Boca Raton (2012)

    Google Scholar 

  88. Singh, J., Dubey, A.: MPEG-2 video watermarking using quantization index modulation. In: IEEE 4th International Conference on Internet Multimedia Services Architecture and Application(IMSAA), pp. 1–6 (2010)

    Google Scholar 

  89. Singhal, N., Lee, Y., Kim, C., Lee, S.: Robust image watermarking based on local Zernike moments. In: IEEE 9th Workshop on Multimedia Signal Processing, pp. 401–404 (2007)

    Google Scholar 

  90. Smith, S.W.: The discrete fourier transform, Chap. 8 In: The Scientist and Engineer’s Guide to Digital Signal Processing, 2nd edn. California Technical Publishing, San Diego (1999)

    Google Scholar 

  91. Snyder, A., Weaver, A.: The e-logistics of securing distributed medical data. In: Proceedings of IEEE International Conference on Industrial Informatics (INDIN 2003), pp. 207–216. IEEE, New York (2003)

    Google Scholar 

  92. Subramanyam, A., Emmanuel, S., Kankanhalli, M.: Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans. Multimedia 14(3), 703–716 (2012)

    Article  Google Scholar 

  93. Tian, J.: Reversible data embedding using a difference expansion,. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  94. Watson, A.B.: DCT quantization matrices optimized for individual images. In: Human Vision, Visual Processing, and Digital Display IV (SPIE’1993), vol. 1913, pp. 202–216 (1993)

    Google Scholar 

  95. Xuan, G., Chen, J., Zhu, J., Shi, Y., Ni, Z., Su, W.: Lossless data hiding based on integer wavelet transform. In: Proc. MMSP, pp. 312–315 (2002)

    Google Scholar 

  96. Xuan, G., Yao, Q., Yang, C., Gao, J.: Lossless data hiding using histogram shifting method based on integer wavelets. IWDW 2006. Lecture Notes in Computer Science, vol. 4283, pp. 323–332. Springer, Heidelberg (2006)

    Google Scholar 

  97. Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)

    Article  Google Scholar 

  98. Zhu, X.: A new spatial perceptual mask for image watermarking. In: 19th International Conference on Pattern Recognition (ICPR), pp. 1–4. IEEE, New York (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dalel Bouslimi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Bouslimi, D., Coatrieux, G. (2015). Encryption and Watermarking for medical Image Protection. In: Gkoulalas-Divanis, A., Loukides, G. (eds) Medical Data Privacy Handbook. Springer, Cham. https://doi.org/10.1007/978-3-319-23633-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23633-9_19

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23632-2

  • Online ISBN: 978-3-319-23633-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics