An Overview of Digital Watermarking & Data Hiding Techniques for Secure Transmission of Medical Images K. ANUSUDHA Assistant Professor Department of Electronics.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Watermarking Parag Agarwal
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Multiple Image Watermarking Applied to Health Information Management
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Cryptographic Anonymity Project Alan Le
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
(k, n)-Image Reversible Data Hiding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Der-Chyuan Lou and Jiang-Lung Liu,
DONE BY S.MURALIRAJAN M.NIRMAL
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Recent Developments on Multimedia and Secure Networking Technologies
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Chair Professor Chin-Chen Chang Feng Chia University
Dept. of Elec. & Comp. Engineering
A Digital Watermarking Scheme Based on Singular Value Decomposition
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Parag Agarwal Digital Watermarking Parag Agarwal
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Chair Professor Chin-Chen Chang Feng Chia University
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An imperceptible spatial domain color image watermarking scheme
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Department of Computer Science, University of Central Florida ,Orlando
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Presentation transcript:

An Overview of Digital Watermarking & Data Hiding Techniques for Secure Transmission of Medical Images K. ANUSUDHA Assistant Professor Department of Electronics Engineering, Pondicherry University, Pondicherry, India.

Secure Transmission of Medical Images - K.ANUSUDHA Content Research Aim Origin of the Problem Need for Medical Image Security Components of Medical Image Security Digital Watermarking Techniques Data Hiding Techniques Conclusions References Contact info of Presenter 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Secure Transmission of Medical Images - K.ANUSUDHA Research Aim The main focus is to provide secure medical image transaction as the exchange of “medical reference data” done via unsecured open networks leads to the condition of changes to occur in medical images and creates a threat which results in undesirable outcome. 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Secure Transmission of Medical Images - K.ANUSUDHA Origin of the Problem Modern Health care Infrastructure. Easy access of medical information. Maintenance of Electronic Health record. Sheer amount of database. 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Need for Medical Image Security To avoid: False insurance claim. Distribution of famous persons reports to tabloids. Misinterpreted Telediagnosis results. Escaping from crime. 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Components of Medical Image Security CONFIDENTIALITY RELIABILITY AVAILABILITY INTEGRITY AUTHENTICITY 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Digital Watermarking Technique Digital watermarking is a steganographic technique which concentrates on providing authentication, copyright protection and ownership identification. Features: Imperceptible Robust Oblivious/Non-oblivious Payload size 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Secure Transmission of Medical Images - K.ANUSUDHA Classification Domain Spatial Frequency Type of Document Text Image Audio Video Application Source Destination Invisible Visible Human Perception Fragile Robust Private Public 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Secure Transmission of Medical Images - K.ANUSUDHA Relevance Cover Content: Medical Data Secret message: EPR, Doctors ID, Hospital logo, UIN. Domain: Spatial & frequency Types: ROI/RONI based 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Secure Transmission of Medical Images - K.ANUSUDHA Data Hiding Technique Cryptographic techniques can be combined with Digital watermarking to increase the level of security. Features: Key generation Computational efficient 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Secure Transmission of Medical Images - K.ANUSUDHA Performance Metrics Mean Square Error (MSE) Peak Signal to Noise Ratio (PSNR) Image Fidelity (IF) Number of Pixels Change Rate (NPCR) Unified Average Changing intensity (UACI) 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

SELECTIVE PLANE REPLACEMENT SCHEME I SELECTIVE PLANE REPLACEMENT WATERMARKING 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Proposed Block Diagram Embedding Block Medical Image Bit Plane slicing Hospital Logo RSA Encryption Encrypted Hospital Logo LSB plane of medical Image Replacement of the LSB plane of the medical image with the MSB plane Encrypted image embedded into the MSB Plane of Medical Image Reconstruction of the Medical Image Extraction Block Received Medical Image Bit Plane Slicing Extract LSB Plane RSA Decryption Hospital Logo 14-Nov-18 Medical Image Security

Embedding Process - Algorithm Step 1: The input medical image undergoes bit plane slicing. Image is partitioned to eight planes (LSB-MSB). Step 2: Hospital logo is considered as the secret image and is the input for RSA encryption. Step 3: The secret image is then encrypted using the RSA encryption method, C=Me mod n where: C - Encrypted image, M - Secret image e - Public key and n - Multiplicand of prime numbers (p,q) Step 4: The encrypted image bits replaces the MSB plane bits of the Medical image. Step 5: The MSB plane is replaced in place of the LSB plane of the medical image. Step 6: All the planes are reconstructed back to form the Secured Medical image. 14-Nov-18 Medical Image Security

Extraction Process - Algorithm Step 1: The received Medical image is passed on for Bit plane slicing. Step 2: The LSB plane is recovered and applied for RSA decryption. Step 3: The secret message is retrieved from the LSB plane using the RSA decryption method, where M=Cd mod n Where: C - Encrypted Image d - Private Key 14-Nov-18 Medical Image Security

Medical Image Security Simulation Results CT Image (512x 512) Hospital Image (221x228) 14-Nov-18 Medical Image Security

Medical Image Security Simulation Results Bit Plane Slicing of CT image Encrypted Hospital Image Data hided MSB plane of CT Image 14-Nov-18 Medical Image Security

Medical Image Security Simulation Results Reconstructed CT Image Recovered LSB plane Decrypted Hospital logo 14-Nov-18 Medical Image Security

Medical Image Security Performance Analysis 14-Nov-18 Medical Image Security

Medical Image Security Merits of Scheme I Can be applied for all types digital Medical Images. Size of the payload is flexible. ROI of the image is not disturbed. Withstands various attacks. 14-Nov-18 Medical Image Security

STREAM CIPHERED SPREADING WATERMARKING SCHEME II STREAM CIPHERED SPREADING WATERMARKING 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Proposed Block Diagram Embedding Block Medical Image ROI Extraction Secret Key Stream Ciphering Diffie Hellman Algorithm Encrypted ROI Spreading Key generated from the Medical image Watermarked Medical Image Extraction Block Watermarked Medical Image Correlation calculation ROI Extracted Key Generated from the Medical Image Stream Ciphering Diffie Hellman Algorithm Key Secret Key Extracted ROI 14-Nov-18 Medical Image Security

Embedding Process - Algorithms Step 1: ROI portion is extracted from the medical image. Step 2:64 bit - PRNG sequence is generated and the bit stream is divided into groups of eight bits to form eight 8 bit key sequences. Step 3: The ROI portion is divided into 8x8 blocks and each pixel is multiplied with the 8 bit key sequences and encrypted using stream ciphering technique . Step 4: The same 64 bit random binary sequence is used for generating the Diffie Hellman Key generation. Step 5: The key generated by the Diffie Hellman algorithm is added to every encrypted stream ciphered pixel Values thereby the Encrypted portion of ROI is obtained which acts as the Watermark. Step 6: A pseudo random key generated from the medical image is used for spreading the encrypted watermark on to the medical image to generate the watermarked medical image. 14-Nov-18 Medical Image Security

Extraction Process - Algorithms Step 1: The correlation between the received watermarked image and the Pseudo random sequence is calculated. Step 2: The correlation value is used as the threshold for despreading the watermark. Step 3:The obtained watermark is decrypted by the Diffie-Hellman algorithm key and the 64 bit sequence. 14-Nov-18 Medical Image Security

Medical Image Security Simulation Results encrypted ROI MRI Image (512x512) ROI portion of the Cover image Watermarked MRI image Zoomed retrieved ROI from the watermarked Image 14-Nov-18 Medical Image Security

Medical Image Security Performance Analysis 14-Nov-18 Medical Image Security

Medical Image Security Performance Analysis 14-Nov-18 Medical Image Security

Medical Image Security Merits of Scheme II Can be applied for any Medical Image. ROI is ciphered to act as the watermark. Payload size is flexible. Withstands various attacks. 14-Nov-18 Medical Image Security

Secure Transmission of Medical Images - K.ANUSUDHA Key Issues Size of the payload Region based algorithms Withstand all types of Image processing attacks High fidelity 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Secure Transmission of Medical Images - K.ANUSUDHA Conclusion The approach of providing security to medical images by combining Digital watermarking and data hiding techniques is an added feature to the distribution of DICOM standard images. 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Secure Transmission of Medical Images - K.ANUSUDHA References V. Fotopoulos, M. L. Stavrinou, A. N. Skodras, "Medical Image Authentication and Self-Correction through an Adaptive Reversible Watermarking Technique", IEEE Transaction on Bio-Informatics and Bio-Engineering , pp. 1- 5, October 2008. H.-K. Lee, H.-J. Kim, K.-R. Kwon, J. K. Lee, "ROI Medical Image Watermarking Using DWT and Bitplane", ACM Journal on Image Computing, 3-5, October 2005. Cao, F., Huang, H.K. and Zhou, X.Q., “Medical image security in a HIPAA mandated PACS environment. Computerized Medical Imaging and Graphics”, IEEE transaction on Image Processing 27(2-3), pp. 185-196, 2003. Zkou, X.Q., Huang, H.K. and Lou, S.L., “Authenticity and integrity of digital mammography images”. IEEE Transactions on Medical Imaging, 20(8), pp. 784-791, 2001. Chao, H.M., Hsu, C.M. and Miaou, S.G.,”A data-hiding technique with authentication, integration, and confidentiality for electronic patients records”, IEEE Transactions Information Technology in Biomedicine, 6, pp. 46-53, 2002. Wang Yan and Ling-di Ping, “A New Steganography Algorithm Based on Spatial Domain”,Journal on Information Science and Engineering ,vol 6,45-51,2009. Ran –Zan Wang, Chi-Fang Lin, Ja Chen Lin, “Hiding data in images by optimal moderately significant bit replacement” Pattern Recognition, Vol 3, pp 671-683, 2001. Chi-Kwong Chan et al,” Hidden data in images by simple LSB substitution”, Elsevier Pattern Recognition, Vol 37,pp 469-474,2004. Chin Chen Chang et al ,” A watermarking based image ownership and tampering authentication scheme” Pattern recognition letter Vol 27,pp 439-446,2006. Dalel Bouslimi et al, “A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images”, Computer methods and programs in biomedicine, Vol 106, pp 47-54, 2012. Mustafa Ulutas, Guzin Ulutas and Vasif , “Medical Image security and EPR hiding using Shamir’s secret sharing scheme”, ACM Journal of systems and software ,vol 84, pp 341-353,2011. 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Secure Transmission of Medical Images - K.ANUSUDHA Author Contacts K. Anusudha E-mail: anusudhak@yahoo.co.in, anusudha.dee@pondiuni.edu.in Department of Electronics Engineering, Pondicherry University. N. Venkateswaren E-mail: venkateswarann@ssn.edu.in Department of ECE, SSN College of Engineering. 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA

Secure Transmission of Medical Images - K.ANUSUDHA Thank you for your attention!!! 11/14/2018 Secure Transmission of Medical Images - K.ANUSUDHA