Skip to main content

Region-Based Selective Encryption for Medical Imaging

  • Conference paper
Frontiers in Algorithmics (FAW 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4613))

Included in the following conference series:

Abstract

The confidential access to medical images becomes significant in recent years. In this paper, we propose two types of region-based selective encryption schemes to achieve secure access for medical images. The first scheme randomly flips a subset of the bits belonging to the coefficients in a Region of Interest inside of several wavelet sub-bands, which is performed in compression domain but only incurs little loss on compression efficiency. The second scheme employs AES to encrypt a certain region’s data in the code-stream. The size of encrypted bit-stream is not changed and there is no compression overhead generated in the second scheme. Moreover, both of two schemes support backward compatibility so that an encryption-unaware format-compliant player can play the encrypted bit-stream directly without any crash.

This work was partially supported by the Korea Science and Engineering Foundation(KOSEF) grant funded by the Korea government(MOST) (No. R01-2006-00-10260-0), and the MIC of Korea, under the ITRC support program supervised by the IITA(IITA-2006-C1090-0603-0026).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ando, K., Watanabe, O., Kiya, H.: Partial-scambling of images encoded by JPEG2000. The Institute of Electronics Information and communication engineers transactions 11(2), 282–290 (2002)

    Google Scholar 

  2. Bradley, P.A., Stentiford, F.W.M.: JPEG2000 and region of interest coding. Digital Image Computing Techniques and Applications(DICTA) (2002)

    Google Scholar 

  3. Engel, D., Uhl, A.: Lightweight JPEG2000 encryption with anisotropic wavelet packets. In: International Conference on Multimedia & Expo, pp. 2177–2180 (2006)

    Google Scholar 

  4. Grosbois, R., Gerbolot, P., Ebrahimi, T.: Authentication and access control in the JPEG2000 compressed domain. In: Processing SPIE 46th annual Meeting, Applications of Digital Image Processing XXIV, pp. 95–104 (2001)

    Google Scholar 

  5. Kockerbauer, T., Kumar, M., Uhl, A.: Lightweight JPEG 2000 confidentiality for mobile environments. In: Proceedings of the IEEE International Conference on Multimedia and Expo(ICME), pp. 1495–1498. IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  6. Lian, S., Sun, J., Zhang, D., Wang, Z.: A selective image encryption scheme based on JPEG2000 codec. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3332, pp. 65–72. Springer, Heidelberg (2004)

    Google Scholar 

  7. Moccagatta, L., Soudagar, S., Liang, J., Chen, H.: Error-resilient coding in JPEG2000 and MPEG-4. IEEE Journal on Selected Areas in Communications 18(6), 899–914 (2000)

    Article  Google Scholar 

  8. Norcen, R., Uhl, A.: Selective encryption of the JPEG 2000 bitstream. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 194–204. Springer, Heidelberg (2003)

    Google Scholar 

  9. Norcen, R., Uhl, A.: Encryption of wavelet-coded imagery using random permutations. In: International Conference on Image Processing(ICIP), pp. 3431–3434 (2004)

    Google Scholar 

  10. Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data - efficiency and security. ACM Multimedia Systems (Special issue on Multimedia Security), pp. 279–287 (2003)

    Google Scholar 

  11. Taubman, D.: High performance scalable image compression with EBCOT. IEEE Transactions On Image Processing 9(7), 1158–1170 (2000)

    Article  Google Scholar 

  12. Taubman, D., Marcellin, M.: JPEG2000 image compression fundamentals, standards and practice. Kluwer Academic Publishers, Boston (2002)

    Google Scholar 

  13. Uehara, T., Safavi-Naini, R., Ogunbona, P.: Securing wavelet compression with random permutations. In: IEEE Pacific Rim Conference on Multimedia, pp. 332–335. IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  14. Unser, M., Aldroubi, A.: A review of wavelets in biomedical applications. In: Proceeding IEEE, vol. 84, pp. 626–638. IEEE Computer Society Press, Los Alamitos (1996)

    Google Scholar 

  15. Wen, J., Severa, M., Zeng, W.: A format-compliant configurable encryption framework for access control of video. IEEE Trans. 12(6), 545–557 (2002)

    Google Scholar 

  16. Zeng, W., Yu, H., Lin, C.: Multimedia security technologies for digital rights management. Elsevier, Amsterdam (2006)

    Google Scholar 

  17. ISO/IEC 15444-1: Information technology-JPEG2000 image coding system-Part 1: Core Coding System (2000)

    Google Scholar 

  18. JJ2000 - Java implementation of JPEG2000, http://jpeg2000.epfl.ch/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Franco P. Preparata Qizhi Fang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ou, Y., Sur, C., Rhee, K.H. (2007). Region-Based Selective Encryption for Medical Imaging. In: Preparata, F.P., Fang, Q. (eds) Frontiers in Algorithmics. FAW 2007. Lecture Notes in Computer Science, vol 4613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73814-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73814-5_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73813-8

  • Online ISBN: 978-3-540-73814-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics