A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images

被引:82
作者
Bouslimi, Dalel [1 ]
Coatrieux, Gouenou [1 ]
Cozic, Michel [2 ]
Roux, Christian [1 ]
机构
[1] Telecom Bretagne, INSERM, Latim U1101, Inst Mines Telecom, F-29238 Brest, France
[2] MED e COM, F-29470 Plougastel Daoulas, France
来源
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE | 2012年 / 16卷 / 05期
关键词
Block cipher; encryption; medical image security; quantization index modulation (QIM); stream cipher; watermarking; REVERSIBLE WATERMARKING;
D O I
10.1109/TITB.2012.2207730
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a joint encryption/watermarking system for the purpose of protecting medical images. This system is based on an approach which combines a substitutive watermarking algorithm, the quantization index modulation, with an encryption algorithm: a stream cipher algorithm (e.g., the RC4) or a block cipher algorithm (e.g., the AES in cipher block chaining (CBC) mode of operation). Our objective is to give access to the outcomes of the image integrity and of its origin even though the image is stored encrypted. If watermarking and encryption are conducted jointly at the protection stage, watermark extraction and decryption can be applied independently. The security analysis of our scheme and experimental results achieved on 8-bit depth ultrasound images as well as on 16-bit encoded positron emission tomography images demonstrate the capability of our system to securely make available security attributes in both spatial and encrypted domains while minimizing image distortion. Furthermore, by making use of the AES block cipher in CBC mode, the proposed system is compliant with or transparent to the DICOM standard.
引用
收藏
页码:891 / 899
页数:9
相关论文
共 22 条
  • [11] Reversible Watermarking for Knowledge Digest Embedding and Reliability Control in Medical Images
    Coatrieux, Gouenou
    Le Guillou, Clara
    Cauvin, Jean-Michel
    Roux, Christian
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2009, 13 (02): : 158 - 165
  • [12] Daemen J., 2002, Technical Report
  • [13] Lian SG, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, P1523
  • [14] Commutative encryption and watermarking in video compression
    Lian, Shiguo
    Liu, Zhongxuan
    Ren, Zhen
    Wang, Haila
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2007, 17 (06) : 774 - 778
  • [15] Pan W, 2011, IEEE ENG MED BIO, P4477, DOI 10.1109/IEMBS.2011.6091110
  • [16] Pan W, 2010, LECT NOTES COMPUT SC, V5939, P153
  • [17] Security of lattice-based data hiding against the known message attack
    Perez-Freire, Luis
    Perez-Gonzalez, Fernando
    Furon, Teddy
    Comesana, Pedro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (04) : 421 - 439
  • [18] Puech W., 2004, 2004 12th European Signal Processing Conference (EUSIPCO), P1481
  • [19] Rodrigues J. M., 2004, P 2 INT C ADV MED SI, P358
  • [20] Schneier B., 1997, Applied Cryptography: Protocols, Algorithms, V2a