Introducing keytagging, a novel technique for the protection of medical image-based tests

https://doi.org/10.1016/j.jbi.2015.05.002Get rights and content
Under an Elsevier user license
open archive

Highlights

  • Associates information to the image without any distortion.

  • Enables authentication, traceability, private captioning, tamper control and location.

  • High robustness (NHD  0.3%) to medical image processing for capacities ⩽1 kb.

  • Compatible with JPEG2000 and DICOM.

  • Able to perform information association-retrieval in 30, 90 ms.

Abstract

This paper introduces keytagging, a novel technique to protect medical image-based tests by implementing image authentication, integrity control and location of tampered areas, private captioning with role-based access control, traceability and copyright protection. It relies on the association of tags (binary data strings) to stable, semistable or volatile features of the image, whose access keys (called keytags) depend on both the image and the tag content. Unlike watermarking, this technique can associate information to the most stable features of the image without distortion. Thus, this method preserves the clinical content of the image without the need for assessment, prevents eavesdropping and collusion attacks, and obtains a substantial capacity-robustness tradeoff with simple operations. The evaluation of this technique, involving images of different sizes from various acquisition modalities and image modifications that are typical in the medical context, demonstrates that all the aforementioned security measures can be implemented simultaneously and that the algorithm presents good scalability. In addition to this, keytags can be protected with standard Cryptographic Message Syntax and the keytagging process can be easily combined with JPEG2000 compression since both share the same wavelet transform. This reduces the delays for associating keytags and retrieving the corresponding tags to implement the aforementioned measures to only 30 and 90ms respectively. As a result, keytags can be seamlessly integrated within DICOM, reducing delays and bandwidth when the image test is updated and shared in secure architectures where different users cooperate, e.g. physicians who interpret the test, clinicians caring for the patient and researchers.

Keywords

DICOM
Distortion
Keytagging
Privacy
Security

Cited by (0)