A lossless watermarking scheme for enhancing security of medical data in PACS

被引:12
作者
Guo, XT [1 ]
Zhuang, TG [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Biomed Engn, Shanghai 200030, Peoples R China
来源
MEDICAL IMAGING 2003: PACS AND INTEGRATED MEDICAL INFORMATION SYSTEMS: DESIGN AND EVALUATION | 2003年 / 5033卷
关键词
watermarking; fingerprint; security; image authenticity and integrity; PACS; DICOM;
D O I
10.1117/12.480450
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a lossless watermarking scheme, in a sense that the original image can be exactly recovered from the watermarked one, with the purpose of verifying the integrity and authenticity of medical images in PACS. Our embedding method includes imposing invertible modulations that induce low distortion level, as well as losslessly compressing the status of the original image and carrying such information in the watermarked image. Digital signature of the whole image is embedded for verifying the integrity of the image. An identifier also presented in electronic patient record (EPR) is embedded for verifying the authenticity by simultaneously processing of the watermarked image and the EPR. Combining with fingerprint system, patient's fingerprint information is further embedded into several image slices and then extracted for verifying the authenticity. No visual quality degradation is detected in the watermarked image.
引用
收藏
页码:350 / 359
页数:10
相关论文
共 15 条
  • [1] Compact storage of medical images with patient information
    Acharya, UR
    Anand, D
    Bhat, PS
    Niranjan, UC
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2001, 5 (04): : 320 - 323
  • [2] A data-hiding technique with authentication, integration, and confidentiality for electronic patient records
    Chao, HM
    Hsu, CM
    Miaou, SG
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2002, 6 (01): : 46 - 53
  • [3] COATRIEUX G, 2001, SPIE C, V4314, pR3
  • [4] WRITING ON DIRTY PAPER
    COSTA, MHM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (03) : 439 - 441
  • [5] Goljan M., 2001, 4 INF HID WORKSH PIT
  • [6] Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    Holliman, M
    Memon, N
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) : 432 - 441
  • [7] Hu HB, 1998, P ANN INT IEEE EMBS, V20, P1315, DOI 10.1109/IEMBS.1998.747120
  • [8] A new algorithm for N-dimensional Hilbert scanning
    Kamata, S
    Eason, RO
    Bandou, Y
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (07) : 964 - 973
  • [9] COMPRESSION OF 2-DIMENSIONAL DATA
    LEMPEL, A
    ZIV, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1986, 32 (01) : 2 - 8
  • [10] Information hiding - A survey
    Petitcolas, FAP
    Anderson, RJ
    Kuhn, MG
    [J]. PROCEEDINGS OF THE IEEE, 1999, 87 (07) : 1062 - 1078