CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Secure Sharing of Medical Information in Watermarked Image through Telemedicine using PKI Technique

by Ishwarya V, Thamarai Selvan T
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 101 - Number 2
Year of Publication: 2014
Authors: Ishwarya V, Thamarai Selvan T
10.5120/17658-8473

Ishwarya V, Thamarai Selvan T . Secure Sharing of Medical Information in Watermarked Image through Telemedicine using PKI Technique. International Journal of Computer Applications. 101, 2 ( September 2014), 14-18. DOI=10.5120/17658-8473

@article{ 10.5120/17658-8473,
author = { Ishwarya V, Thamarai Selvan T },
title = { Secure Sharing of Medical Information in Watermarked Image through Telemedicine using PKI Technique },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 101 },
number = { 2 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume101/number2/17658-8473/ },
doi = { 10.5120/17658-8473 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:30:37.783175+05:30
%A Ishwarya V
%A Thamarai Selvan T
%T Secure Sharing of Medical Information in Watermarked Image through Telemedicine using PKI Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 101
%N 2
%P 14-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is the fundamental requirement for an information society in the distributed network environment. A watermark is a secret message that is embedded into a cover message. Digital watermarks are used to verify the authenticity of the carrier signal for the identity of the owners. In order to provide data integrity, confidentiality and authentication various techniques are available like cryptography, steganography and watermarking. To protect the patient information in telemedicine, watermarking is mainly used. Patient information is embedded within the cover medical image. Digital Imaging & Communications in Medicine is an universal standard of communication for secured medical images. In the proposed technique, to provide authentication the hash value will be generated using SHA and the Huffman compression algorithm(R-S vector) will be used to shrink the size of an image. With the patient information the medical image is protected through Public key cryptography in a secure manner. Compared to the previous system, the proposed technique is more efficient. The original image is completely restored without any loss at the receiver side. The patient information is hidden (protected) from the hackers during transmission.

References
  1. Mohamed M. Abd-Eldayem. A Proposed Security Technique Based On watermarking and Encryption for Digital Imaging and communications in medicine, Egyptian Information Journal,2012.
  2. Planitz, B. M. , Maeder, A. J. :" A Study of Block-Based Medical Image Watermarking Using Perceptual Similarity Metric", In: Proceedings in DICTA 2005, p. 70 ,2005.
  3. M. Naor, B. Pinkas," Visual authentication and identification", Lecture Notes in Computer Science, vol 1294, pp. 322,1997.
  4. Xiaoqing Tan, Qiong Zhang," A Kind of Verifiable Visual Cryptography Scheme", International Conference on Emerging Intelligent Data and Web Technologies,2013.
  5. R. G. van Schyndel, A. Z. Tirkel, and I. D. Svalbe, "Key independent watermark detection,"in Proc. IEEE Int. Conf: Multimedia Computing and Systems, Florence, Italy, pp. 580-585,1999.
  6. J. J. Eggers, J. K. Su, and B. Girod, "Public key watermarking by eigenvectors of linear transforms," in Proc. Eur. Signal Processing Conf:, Tampere, Finland, Sept. 2000.
  7. Coatrieux G, Lecornu L " A review of image watermarking applications in healthcare". Proceedings of the 28th Annual International Conference of the IEEE: Engineering in Medicine and Biology Society,EMBS ,2006.
  8. Memon N. Watermarking of medical images for content authentication and copyright protection. PhD thesis, Pakistan: Faculty of Computer Science and Engineering, GIK Institute of Engineering Sciences and Technology; May 2010.
  9. Zain J M, Baldwin L P, Clarke M ,"Reversible watermarking for authentication of DICOM images",Proc. 26th Annu. Int. Conf. Eng. Med. Biol. Soc. (EMBC 2004) 2: 3237–3240,2009
  10. P. Wong, "A Public Key Watermark for Image Verification and Authentication,"Proceedings of ICIP'98, pp. 425-429, 1998.
  11. Zhou X Q, Huang H K, "Authenticity and integrity of digital mammography images", IEEE Trans. Med. Imag. 20(no. 8): 784–791,2001.
  12. B. Mathon, ''Development of safe watermarking methods for tracing of multimedia contents'', International thesis cotutelle, University of Grenoble and of Louvain, 2011.
  13. C. S. Woo, J. Du, and B. Pham, Multiple watermark method for privacy control and tamper detection in medical images, WDIC2005 pages, Australia,February, pp. 59–64,2005.
  14. L. O. M. Kobayashi, S. S. Furuie, and P. S. L. M. Barreto, Providing Integrity and Authenticity in DICOM Images: A Novel Approach, IEEE Trans Inform Technol Biomed, 2009.
  15. F. Hartung and B. Girod, "Fast public-key watermarking of compressed video," In Proc. Of the IEEE Intl. Conf on Image Processing 1997, vol. 1, pp. 528-531, October 1997.
  16. H. M. Chao, C. M. Hsu, S. G. Miaou, "A Data Hiding Technique With authentication,Integration, and Con_dentiality for Electronic Patient Records", IEEE Transactions on Information Technology in Bio-medicine, Vol. 6, No. 1, pp. 46-53, March 2002.
  17. S. G. Miaou, C. M. Hsu, Y. S. Tsai, H. M. Chao, "A Secure Data Hiding Technique with Heterogenous Data Combining Capability for Electronic Patient Records",Proceedings of IEEE International Conference in Medicine and Biology Society (EMBC'00), Chicago, USA, Vol. 1, pp. 280-283, 2000.
  18. A. Kannammal, S. Subha Rani, K. Pavithra, "Authentication of DICOM medical images using independent component analysis (ICA)", Int J Med Eng Inform 4 ,2012.
  19. Dariusz Bogumi," An asymmetric image watermarking scheme resistant against geometrical distortions" Elsevier B. V. 2005.
  20. B. Nassir, R. Latif, A. Toumanari," Secure transmission of medical images by watermarking technique"IEEE 2012.
  21. M. Kutter, "Digital ImageWatermarking: Hiding Information in Images", PhD thesis,University of Rhode Island, Kingston, USA, 1999.
  22. C. -T. Hsu, J. -L. Wu, "Hidden Digital Wateramrks in Images", IEEE Transactions on Image Processing, Vol. 8, pp. 58-68, 1999.
  23. G. -J. Yu, "Digital Image Watermarking for Copyright Protection and Authentication", PhD Thesis, National Central University, Taiwan, R. O. C, 2001.
  24. Memon N, Gilani S. Adaptive data hiding scheme for medical images using integer wavelet transform. In: IEEE international conference on emerging technologies, Islamabad, Pakistan; 2009. p. 221–4.
  25. Bouslimi D, Coatrieux G, Roux C. A joint encryption/watermarking algorithm for verifying the reliability of medical images:application to echographic images. Comput Methods Programs Biomed 2012;106(1):47–54.
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking Medical images Digital Imaging and Communications in Medicine Public key cryptography the proposed method.