DOI QR코드

DOI QR Code

Watermark Authentication Cryptography for Medical Image Security

의료영상 보안을 위한 워터마크 인증 암호화 기법

  • Cho, Young-bok (Department of Computer Science, Chungbuk National University) ;
  • Woo, Sung-Hee (Department of Medical Information&Engineering, Korea National University Transportation) ;
  • Lee, Sang-Ho (Department of Computer Science, Chungbuk National University)
  • Received : 2016.11.29
  • Accepted : 2016.12.08
  • Published : 2017.04.30

Abstract

In this paper, we preserve the transparency of digital contents by compressing and storing the medical image for a certain period so as to be safe and robust against various attacks of medical images. The proposed algorithm generates an encrypted image authentication code that extracts the feature value of the original image and combines it with the user's information. in order to extract hidden data, the authentication code is first decrypts the encrypted medical image and extracts the hidden data using the spatial characteristics of image. The proposed algorithm guarantees integrity when comparing extracted authentication code and newly generated authentication code for image authentication after directly inserting it into content itself through watermarking. We have proved various security of attack of image data and proved that the certification rate is improved to 98.4%.

제안 논문에서는 의료영상의 다양한 공격에 안전하고 견고하도록 의료 영상을 일정기간 압축 저장해 디지털 콘텐츠에 투명성을 유지한다. 제안논문은 오리지널 영상의 특징 값을 추출하고 사용자의 정보와 결합해서 암호화된 영상 인증코드를 생성한다. 인증코드는 은닉된 데이터를 추출하기 위해 먼저 암호화된 의료영상을 복호화하고 영상의 공간 특성을 이용해 은닉데이터를 추출한다. 따라서 워터마킹을 통해 콘텐츠 자체에 직접 삽입 후 영상의 인증을 위해 추출된 인증코드와 새로 생성된 인증코드의 비교를 수행해 무결성을 보장하고 영상자료의 다양한 공격 안전함을 증명하고 인증률도 98.4%로 향상됨을 증명하였다.

Keywords

References

  1. G. T. Oh, Y. B. Lee and S. J. Yeon, "Security Mechanism for Medical Image Information on PACS Using Invisible Watermark," in Proceedings of the International Conference on High Performance Computing for Computational Science 2004, pp. 315-324, 2004.
  2. E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations using semi-fragile watermarks," in Proceedings of the Electronic Imaging. International Society for Optics and Photonics, pp. 152-163, 2003.
  3. M. Awrangjeb, "An Overview of Reversible Data Hiding," in Proceedings of the Sixth International Conference on Computer and Information Technology, pp.75-79, 2003.
  4. X. Q. Zhou, H. K. Huang and S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Transactions on Medical Imaging, vol. 20, no. 8, pp. 784- 791, Aug. 2001. https://doi.org/10.1109/42.938246
  5. K. F. Li, T. S. Chen and S. C. Wu, "Image tamper detection and recovery system based on discrete wavelet transform," in Proceedings of the IEEE Pacific Rim Conference, vol. 1, no. 8, pp.164-167, 2001.
  6. I. J. Cox, M. l. Miller and J. A. Bloom, "Watermarking applications and their Properties," in Proceedings of the Information Technology:Coding and Computing 2000, pp. 6-10, 2000.
  7. J. J. Eggers, J. K. Su, and B. Girod, "Performance of a practical blind watermarking scheme," in Proceedings of the Photonics West 2001-Electronic Imaging, vol. 4314, pp. 594-605, 2001.
  8. S. Milani, M, Fontani., P. Bestagini, M. Barni, A. Piva, M. Tagliasacchi, and S. Tubaro, "An overview on video forensics," in Proceeding of Signal Proceedings Conference, pp. 1229-1233, 2012.
  9. S.Y Tak, J.M Ban, S Lew, W.J Lee, B.R Lee and H.CKang, "A Study on an Image Stabilization in Moving Vehicle," International Journal of The Institute of Electronics Engineers, vol. 49, no. 4, pp. 95-104, Jun. 2012.
  10. S. D. Lin, and Z. L Yang, "Hierarchical Fragile Watermarking Scheme for Image Authentication," International Journal of Intelligent Automation & Soft Computing, vol. 17, no.2 , pp. 245-255, Mar. 2011. https://doi.org/10.1080/10798587.2011.10643146
  11. R. Amirtharajan, and J. B. B. Rayappan, "Brownian motion of binary and gray-binary and gray bits in image for stego," International Journal of Applied Sciences, vol.12, no.5, pp. 428-439, May. 2012. https://doi.org/10.3923/jas.2012.428.439
  12. M. U. Celik, G. Sharma, A. M. Tekalp and E. Saber, "Lossless generalized-LSB data embedding," IEEE Transactions on Image Processing, vol.14, no.2, pp.253- 266, Feb. 2005. https://doi.org/10.1109/TIP.2004.840686
  13. S. Lee, C. D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Transactions on Information Forensics and Security, vol.2, no.3, pp.321- 330, Sept. 2007. https://doi.org/10.1109/TIFS.2007.905146
  14. H. J. Kim, S. Xiang and I. K. Yeo. "Robustness analysis of patchwork watermarking schemes," in Digital Audio Watermarking Techniques and Technologies:Applications and Benchmarks. IGI Global, pp. 172-186, 2008.