Context-based watermarking cum chaotic encryption for medical images in telemedicine applications

被引:23
作者
Dagadu, Joshua C. [1 ]
Li, Jianping [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Int Ctr Wavelet Anal & Its Applicat, Chengdu 611731, Sichuan, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
Telemedicine; Medical image; Watermarking; Chaos-based encryption; Integer wavelet transform; Context; MULTIPLE WATERMARKING; CRYPTO-WATERMARKING; SECURE; SCHEME; AUTHENTICATION; RELIABILITY; EFFICIENT; ROBUST; SYSTEM; MAP;
D O I
10.1007/s11042-018-5725-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a security system for secure transmission of medical images in telemedicine applications. The system couples an IWT-LSB watermarking and an encryption based on random permutation and chaos, to ensure confidentiality, integrity, authentication and nonrepudiation of medical images. We use IWT due to the sensitive nature of medical images and the need to retain diagnostic quality after image reconstruction. During the watermarking phase, the medical image is decomposed into wavelet sub-bands. Electronic patient record and extracted context information are then embedded in the least significant bits of the detail sub-band (host) coefficients. During encryption, the reconstructed watermarked medical image is randomly permuted and the permuted pixels diffused with a chaotic key stream to produce the cipher watermarked image. Experimental results and analyzes show that the system provides sufficient security against various forms of attacks. Furthermore, we propose a security architecture for the system.
引用
收藏
页码:24289 / 24312
页数:24
相关论文
共 58 条
[1]  
Abdel-Nabi H, 2017, INT CONF INFORM COMM, P147, DOI 10.1109/IACS.2017.7921962
[2]  
Abowd GD, 1999, LECT NOTES COMPUT SC, V1707, P304
[3]   Crypto-Watermarking of Transmitted Medical Images [J].
Al-Haj, Ali ;
Mohammad, Ahmad ;
Amer, Alaa' .
JOURNAL OF DIGITAL IMAGING, 2017, 30 (01) :26-38
[4]   Secured Telemedicine Using Region-Based Watermarking with Tamper Localization [J].
Al-Haj, Ali ;
Amer, Alaa' .
JOURNAL OF DIGITAL IMAGING, 2014, 27 (06) :737-750
[5]  
Al-Husainy MAF, 2012, INT J SECUR APPL, V6, P1
[6]   Efficient and robust encryption and watermarking technique based on a new chaotic map approach [J].
AlShaikh, Muath ;
Laouamer, Lamri ;
Nana, Laurent ;
Pascu, Anca Chrisitine .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) :8937-8950
[7]  
Ansari IA, 2016, PATTERN RECOGNITION
[8]  
Ashtiyani M, 2008, 3 INT C INF COMM TEC, P1
[9]   Watermark Compression in Medical Image Watermarking Using Lempel-Ziv-Welch (LZW) Lossless Compression Technique [J].
Badshah, Gran ;
Liew, Siau-Chuin ;
Zain, Jasni Mohd ;
Ali, Mushtaq .
JOURNAL OF DIGITAL IMAGING, 2016, 29 (02) :216-225
[10]   A crypto-watermarking system for ensuring reliability control and traceability of medical images [J].
Bouslimi, Dalel ;
Coatrieux, Gouenou .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2016, 47 :160-169