1
|
Nguyen XV, Petscavage-Thomas JM, Straus CM, Ikuta I. Cybersecurity in radiology: Cautionary Tales, Proactive Prevention, and What to do When You Get Hacked. Curr Probl Diagn Radiol 2024:S0363-0188(24)00122-1. [PMID: 39003122 DOI: 10.1067/j.cpradiol.2024.07.010] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/10/2024] [Accepted: 07/08/2024] [Indexed: 07/15/2024]
Abstract
To improve awareness and understanding of cybersecurity threats to radiology practice and better equip healthcare practices to manage cybersecurity risks associated with medical imaging, this article reviews topics related to cybersecurity in healthcare, with emphasis on common vulnerabilities in radiology operations. This review is intended to assist radiologists and radiology administrators who are not information technology specialists to attain an updated overview of relevant cybersecurity concepts and concerns relevant to safe and effective practice of radiology and provides a succinct reference for individuals interested in learning about imaging-related vulnerabilities in healthcare settings. As cybersecurity incidents have become increasingly common in healthcare, we first review common cybersecurity threats in healthcare and provide updates on incidence of healthcare data breaches, with emphasis on the impact to radiology. Next, we discuss practical considerations on how to respond to a healthcare data breach, including notification and disclosure requirements, and elaborate on a variety of technical, organizational, and individual actions that can be adopted to minimize cybersecurity risks applicable to radiology professionals and administrators. While emphasis is placed on specific vulnerabilities within radiology workflow, many of the preventive or mitigating strategies are also relevant to cybersecurity within the larger digital healthcare arena. We anticipate that readers, upon completing this review article, will gain a better appreciation of cybersecurity issues relevant to radiology practice and be better equipped to mitigate cybersecurity risks associated with medical imaging.
Collapse
Affiliation(s)
- Xuan V Nguyen
- Department of Radiology, The Ohio State University College of Medicine, 396 W. 12th Ave. Suite 486, Columbus, OH 43210 USA.
| | - Jonelle M Petscavage-Thomas
- Department of Radiology, Penn State Hershey Medical Center, Hershey, Pennsylvania. 500 University Dr. HG300B, Hershey, PA 17033 USA
| | - Christopher M Straus
- Department of Radiology, University of Chicago Medicine, Billings Hospital P220, 5841 South Maryland Ave. MC2026, Chicago, IL 60637 USA
| | - Ichiro Ikuta
- Department of Radiology, Mayo Clinic Arizona, 5777 E. Mayo Blvd., Phoenix, AZ 85054 USA
| |
Collapse
|
2
|
Mehrabi M, Zarei V, Ghanbari M. A Highly Robust Medical Image Watermarking Method for Medical Real-time Applications. JOURNAL OF MEDICAL SIGNALS & SENSORS 2023; 13:199-207. [PMID: 37622044 PMCID: PMC10445676 DOI: 10.4103/jmss.jmss_15_22] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/01/2022] [Revised: 09/15/2022] [Accepted: 03/14/2023] [Indexed: 08/26/2023]
Abstract
Background Watermarking such as other security concepts is an ongoing challenging research issue, especially for medical images, to protect patient privacy. Medical images need to be shared and transferred between hospitals and specialists as quickly as possible for better diagnosis. Fast and simple watermarking is needed as well as the robust transferring of channel noise, such as salt and pepper noise and robust cropping that may occur from specialists and signature encryption for patient privacy. Methods In this article, a highly robust and simple watermarking method is introduced. The proposed method has very low computational complexity and at the same time, it is very robust to interference and uses simple computations such as (XORs) Exclusive ORs and rotations that can be done in real-time. The proposed method uses a combination of hidden neighboring signature information, Sudoku permutation, and noise pre-processing to achieve high robustness against salt and pepper noise and cropping. Simple signature encryption is also used. Results The proposed method is examined in different medical image datasets. The experimental results indicate the proposed watermarking system is robust to salt and pepper noise density of up to 90% and about 70% cropping. The number of computations including encryption is five XOR per pixel and a rotation per block of signature size. Conclusion A novel method for medical image watermarking is presented. The proposed method is in the spatial domain, has encryption, and uses only XOR computation. The proposed method is highly robust to noise and cropping which is necessary for medical uses. The proposed method can be used efficiently for real-time watermarking for medical and nonmedical image datasets.
Collapse
Affiliation(s)
- Mahdi Mehrabi
- Department of Computer Engineering, Shiraz Branch, Islamic Azad University, Shiraz, Iran
| | - Vahdi Zarei
- Department of Computer Engineering, Shiraz Branch, Islamic Azad University, Shiraz, Iran
| | - Mohammad Ghanbari
- School of Computer Science and Electronic Engineering University of Essex Colchester, UK
| |
Collapse
|
3
|
Gull S, Parah SA. Advances in medical image watermarking: a state of the art review. MULTIMEDIA TOOLS AND APPLICATIONS 2023:1-41. [PMID: 37362709 PMCID: PMC10161187 DOI: 10.1007/s11042-023-15396-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/07/2022] [Revised: 02/21/2023] [Accepted: 04/18/2023] [Indexed: 06/28/2023]
Abstract
Watermarking has been considered to be a potent and persuasive gizmo for its application in healthcare setups that work online, especially in the current COVID-19 scenario. The security and protection of medical image data from various manipulations that take place over the internet is a topic of concern that needs to be addressed. A detailed review of security and privacy protection using watermarking has been presented in this paper. Watermarking of medical images helps in the protection of image content, authentication of Electronic Patient Record (EPR), and integrity verification. At first, we discuss the various prerequisites of medical image watermarking systems, followed by the classification of Medical Image Watermarking Techniques (MIWT) that include state-of-the-art. We have classified MIWT's into four broader classes for providing better understanding of medical image watermarking. The existing schemes have been presented along with their cons so that the reader may be able to grasp the shortcomings of the technique in order to develop novel techniques proving the inevitability of the presented review. Further, various evaluation parameters along with potential challenges pertaining to medical image watermarking systems have been discussed to provide a deep insight into this research area.
Collapse
Affiliation(s)
- Solihah Gull
- Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006 India
| | - Shabir A. Parah
- Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006 India
| |
Collapse
|
4
|
An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and Otsu threshold segmentation. Comput Biol Med 2022; 146:105542. [PMID: 35483228 DOI: 10.1016/j.compbiomed.2022.105542] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/15/2022] [Revised: 04/08/2022] [Accepted: 04/17/2022] [Indexed: 11/22/2022]
Abstract
This paper proposes an efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic systems and Otsu threshold segmentation. In our method, first, the stereoscopic medical image is divided into the image top, middle, and lower parts. Moreover, each part is divided into background areas and regions of interest utilizing Otsu threshold segmentation, increasing about 40% the encryption efficiency when the background area is discarded. Second, compared with existing chaotic systems, the proposed coupled chaotic system has better ergodicity and randomness, with all NIST SP800-22 test data exceeding 0.01. Third, we develop a robust watermarking algorithm based on forwarding Meyer wavelet transform and singular value decomposition. Furthermore, the watermark algorithm embedded the two-dimensional code doctor-patient information in the region of interest. Finally, the experimental results demonstrate that the proposed algorithm has appealing encryption and watermark performance, the histogram and scatter graphs are governed by approximately uniform distribution, the NPCR and UACI of plaintext sensitivity and the key sensitivity are close to 99.6094% and 33.4635%, affording robustness to noise and clipping attacks.
Collapse
|
5
|
Nagm A, Safy Elwan M. Protection of the patient data against intentional attacks using a hybrid robust watermarking code. PeerJ Comput Sci 2021; 7:e400. [PMID: 33834095 PMCID: PMC8022583 DOI: 10.7717/peerj-cs.400] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/14/2020] [Accepted: 01/29/2021] [Indexed: 06/12/2023]
Abstract
The security of patient information is important during the transfer of medical data. A hybrid spatial domain watermarking algorithm that includes encryption, integrity protection, and steganography is proposed to strengthen the information originality based on the authentication. The proposed algorithm checks whether the patient's information has been deliberately changed or not. The created code is distributed at every pixel of the medical image and not only in the regions of non-interest pixels, while the image details are still preserved. To enhance the security of the watermarking code, SHA-1 is used to get the initial key for the Symmetric Encryption Algorithm. The target of this approach is to preserve the content of the image and the watermark simultaneously, this is achieved by synthesizing an encrypted watermark from one of the components of the original image and not by embedding a watermark in the image. To evaluate the proposed code the Least Significant Bit (LSB), Bit2SB, and Bit3SB were used. The evaluation of the proposed code showed that the LSB is of better quality but overall the Bit2SB is better in its ability against the active attacks up to a size of 2*2 pixels, and it preserves the high image quality.
Collapse
Affiliation(s)
- Ahmad Nagm
- Computer Engineering, Cairo Higher Institute for Engineering, Computer Science and Management, Cairo, Egypt
| | - Mohammed Safy Elwan
- Electrical Engineering, Egyptian Academy of Engineering and Advanced Technology, Cairo, Egypt
| |
Collapse
|
6
|
Yaoting WMD, Huihui CMD, Ruizhong YMD, Jingzhi LMDP, Ji-Bin LMD, Chen L, Chengzhong PMD. Point-of-Care Ultrasound: New Concepts and Future Trends. ADVANCED ULTRASOUND IN DIAGNOSIS AND THERAPY 2021. [DOI: 10.37015/audt.2021.210023] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022] Open
|
7
|
Cybersecurity in PACS and Medical Imaging: an Overview. J Digit Imaging 2020; 33:1527-1542. [PMID: 33123867 PMCID: PMC7728878 DOI: 10.1007/s10278-020-00393-3] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/02/2020] [Revised: 06/22/2020] [Accepted: 09/30/2020] [Indexed: 10/26/2022] Open
Abstract
This article provides an overview on the literature published on the topic of cybersecurity for PACS (Picture Archiving and Communications Systems) and medical imaging. From a practical perspective, PACS specific security measures must be implemented together with the measures applicable to the IT infrastructure as a whole, in order to prevent incidents such as PACS systems exposed to access from the Internet. Therefore, the article first offers an overview of the physical, technical and organizational mitigation measures that are proposed in literature on cybersecurity in healthcare information technology in general, followed by an overview on publications discussing specific cybersecurity topics that apply to PACS and medical imaging and present the "building blocks" for a secure PACS environment available in the literature. These include image de-identification, transport security, the selective encryption of the DICOM (Digital Imaging and Communications in Medicine) header, encrypted DICOM files, digital signatures and watermarking techniques. The article concludes with a discussion of gaps in the body of published literature and a summary.
Collapse
|
8
|
Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano-Miyatake M, Perez-Meana H. Improving the management of medical imaging by using robust and secure dual watermarking. Biomed Signal Process Control 2020. [DOI: 10.1016/j.bspc.2019.101695] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
9
|
An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 2020. [DOI: 10.1016/j.bspc.2019.101665] [Citation(s) in RCA: 43] [Impact Index Per Article: 10.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
|
10
|
High capacity reversible data hiding with interpolation and adaptive embedding. PLoS One 2019; 14:e0212093. [PMID: 30840659 PMCID: PMC6402661 DOI: 10.1371/journal.pone.0212093] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/28/2017] [Accepted: 01/07/2019] [Indexed: 11/19/2022] Open
Abstract
A new Interpolation based Reversible Data Hiding (IRDH) scheme is reported in this paper. For different applications of an IRDH scheme to the digital image, video, multimedia, big-data and biological data, the embedding capacity requirement usually varies. Disregarding this important consideration, existing IRDH schemes do not offer a better embedding rate-distortion performance for varying size payloads. To attain this varying capacity requirement with our proposed adaptive embedding, we formulate a capacity control parameter and propose to utilize it to determine a minimum set of embeddable bits in a pixel. Additionally, we use a logical (or bit-wise) correlation between the embeddable pixel and estimated versions of an embedded pixel. Thereby, while a higher range between an upper and lower limit of the embedding capacity is maintained, a given capacity requirement within that limit is also attained with a better-embedded image quality. Computational modeling of all new processes of the scheme is presented, and performance of the scheme is evaluated with a set of popular test-images. Experimental results of our proposed scheme compared to the prominent IRDH schemes have recorded a significantly better-embedding rate-distortion performance.
Collapse
|
11
|
A Robust Multi-Watermarking Algorithm for Medical Images Based on DTCWT-DCT and Henon Map. APPLIED SCIENCES-BASEL 2019. [DOI: 10.3390/app9040700] [Citation(s) in RCA: 41] [Impact Index Per Article: 8.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
To resolve the contradiction between existing watermarking methods—which are not compatible with the watermark’s ability to resist geometric attacks—and robustness, a robust multi-watermarking algorithm suitable for medical images is proposed. First, the visual feature vector of the medical image was obtained by dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT) to perform multi-watermark embedding and extraction. Then, the multi-watermark was preprocessed using the henon map chaotic encryption technology to strengthen the security of watermark information, and combined with the concept of zero watermark to make the watermark able to resist both conventional and geometric attacks. Experimental results show that the proposed algorithm can effectively extract watermark information; it implements zero watermarking and blind extraction. Compared with existing watermark technology, it has good performance in terms of its robustness and resistance to geometric attacks and conventional attacks, especially in geometric attacks.
Collapse
|
12
|
Nipanikar S, Hima Deepthi V. A Multiple Criteria-Based Cost Function Using Wavelet and Edge Transformation for Medical Image Steganography. JOURNAL OF INTELLIGENT SYSTEMS 2018. [DOI: 10.1515/jisys-2016-0095] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022] Open
Abstract
Abstract
With the ever-increasing need for concealing messages within cover media like image, video, and audio, numerous attempts have been developed for steganography. Most of the steganographic techniques perform their embedding operation on the cover image without selecting a better location. The right selection of location for embedding the information can lead to high imperceptibility and robustness. Accordingly, in this paper, we develop a new cost function for estimating the cost of every pixel to identify the good location to embed the message data. The proposed cost estimation procedure utilizes multiple parameters like wavelet coefficient, edge transformation, and pixel intensity. The proposed cost matrix is then utilized to embed the message data into the cover media using an embedding integer. The proposed steganographic technique is experimented with two magnetic resonance brain images, and the results are analyzed with the peak-to-peak signal-to-noise ratio (PSNR) and mean square error. The robustness analysis ensured that the proposed steganographic technique outperforms the existing methods by reaching the maximum PSNR of 72.74 dB.
Collapse
|
13
|
Neville CW. Telehealth: A Balanced Look at Incorporating This Technology Into Practice. SAGE Open Nurs 2018; 4:2377960818786504. [PMID: 33415198 PMCID: PMC7774340 DOI: 10.1177/2377960818786504] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/25/2018] [Revised: 05/30/2018] [Accepted: 06/10/2018] [Indexed: 11/16/2022] Open
Abstract
This article explores the use of telehealth and the ability to provide health care to patients through interactive technology and telecommunication tools. The use of telehealth continues to grow, reaching multiple medical specialties and providing care to a greater population of patients. The purpose of this article is to increase the knowledge of telehealth, identify positive outcomes associated with telehealth as well as potential barriers, and evaluate the benefits against the downfalls to determine whether the positive outcomes outweigh the barriers.
Collapse
|
14
|
Ulutas G, Ustubioglu A, Ustubioglu B, V Nabiyev V, Ulutas M. Medical Image Tamper Detection Based on Passive Image Authentication. J Digit Imaging 2018; 30:695-709. [PMID: 28484919 DOI: 10.1007/s10278-017-9961-x] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022] Open
Abstract
Telemedicine has gained popularity in recent years. Medical images can be transferred over the Internet to enable the telediagnosis between medical staffs and to make the patient's history accessible to medical staff from anywhere. Therefore, integrity protection of the medical image is a serious concern due to the broadcast nature of the Internet. Some watermarking techniques are proposed to control the integrity of medical images. However, they require embedding of extra information (watermark) into image before transmission. It decreases visual quality of the medical image and can cause false diagnosis. The proposed method uses passive image authentication mechanism to detect the tampered regions on medical images. Structural texture information is obtained from the medical image by using local binary pattern rotation invariant (LBPROT) to make the keypoint extraction techniques more successful. Keypoints on the texture image are obtained with scale invariant feature transform (SIFT). Tampered regions are detected by the method by matching the keypoints. The method improves the keypoint-based passive image authentication mechanism (they do not detect tampering when the smooth region is used for covering an object) by using LBPROT before keypoint extraction because smooth regions also have texture information. Experimental results show that the method detects tampered regions on the medical images even if the forged image has undergone some attacks (Gaussian blurring/additive white Gaussian noise) or the forged regions are scaled/rotated before pasting.
Collapse
Affiliation(s)
- Guzin Ulutas
- Computer Engineering Department, Karadeniz Technical University, Trabzon, Turkey.
| | - Arda Ustubioglu
- Computer Engineering Department, Karadeniz Technical University, Trabzon, Turkey
| | - Beste Ustubioglu
- Computer Engineering Department, Karadeniz Technical University, Trabzon, Turkey
| | - Vasif V Nabiyev
- Computer Engineering Department, Karadeniz Technical University, Trabzon, Turkey
| | - Mustafa Ulutas
- Computer Engineering Department, Karadeniz Technical University, Trabzon, Turkey
| |
Collapse
|
15
|
Turuk M, Dhande A. A Novel Texture-Quantization-Based Reversible Multiple Watermarking Scheme Applied to Health Information System. J Digit Imaging 2017; 31:167-177. [PMID: 28971250 DOI: 10.1007/s10278-017-0024-0] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022] Open
Abstract
The recent innovations in information and communication technologies have appreciably changed the panorama of health information system (HIS). These advances provide new means to process, handle, and share medical images and also augment the medical image security issues in terms of confidentiality, reliability, and integrity. Digital watermarking has emerged as new era that offers acceptable solutions to the security issues in HIS. Texture is a significant feature to detect the embedding sites in an image, which further leads to substantial improvement in the robustness. However, considering the perspective of digital watermarking, this feature has received meager attention in the reported literature. This paper exploits the texture property of an image and presents a novel hybrid texture-quantization-based approach for reversible multiple watermarking. The watermarked image quality has been accessed by peak signal to noise ratio (PSNR), structural similarity measure (SSIM), and universal image quality index (UIQI), and the obtained results are superior to the state-of-the-art methods. The algorithm has been evaluated on a variety of medical imaging modalities (CT, MRA, MRI, US) and robustness has been verified, considering various image processing attacks including JPEG compression. The proposed scheme offers additional security using repetitive embedding of BCH encoded watermarks and ADM encrypted ECG signal. Experimental results achieved a maximum of 22,616 bits hiding capacity with PSNR of 53.64 dB.
Collapse
Affiliation(s)
- Mousami Turuk
- Pune Institute of Computer Technology, Sr. No 27, Pune-Satara Road, Behind Bharati Vidyapeeth, Dhankawadi, Pune, Maharashtra, 411043, India.
| | - Ashwin Dhande
- Pune Institute of Computer Technology, Sr. No 27, Pune-Satara Road, Behind Bharati Vidyapeeth, Dhankawadi, Pune, Maharashtra, 411043, India
| |
Collapse
|
16
|
Badshah G, Liew SC, Zain JM, Ali M. Watermark Compression in Medical Image Watermarking Using Lempel-Ziv-Welch (LZW) Lossless Compression Technique. J Digit Imaging 2017; 29:216-25. [PMID: 26429361 DOI: 10.1007/s10278-015-9822-4] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/01/2022] Open
Abstract
In teleradiology, image contents may be altered due to noisy communication channels and hacker manipulation. Medical image data is very sensitive and can not tolerate any illegal change. Illegally changed image-based analysis could result in wrong medical decision. Digital watermarking technique can be used to authenticate images and detect as well as recover illegal changes made to teleradiology images. Watermarking of medical images with heavy payload watermarks causes image perceptual degradation. The image perceptual degradation directly affects medical diagnosis. To maintain the image perceptual and diagnostic qualities standard during watermarking, the watermark should be lossless compressed. This paper focuses on watermarking of ultrasound medical images with Lempel-Ziv-Welch (LZW) lossless-compressed watermarks. The watermark lossless compression reduces watermark payload without data loss. In this research work, watermark is the combination of defined region of interest (ROI) and image watermarking secret key. The performance of the LZW compression technique was compared with other conventional compression methods based on compression ratio. LZW was found better and used for watermark lossless compression in ultrasound medical images watermarking. Tabulated results show the watermark bits reduction, image watermarking with effective tamper detection and lossless recovery.
Collapse
Affiliation(s)
- Gran Badshah
- Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang (UMP), Tun Razak Highway, 26300, Gambang Kuantan, Pahang, Malaysia.
| | - Siau-Chuin Liew
- Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang (UMP), Tun Razak Highway, 26300, Gambang Kuantan, Pahang, Malaysia
| | - Jasni Mohd Zain
- Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang (UMP), Tun Razak Highway, 26300, Gambang Kuantan, Pahang, Malaysia
| | - Mushtaq Ali
- Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang (UMP), Tun Razak Highway, 26300, Gambang Kuantan, Pahang, Malaysia
| |
Collapse
|
17
|
Turuk MP, Dhande AP. A Novel Reversible Multiple Medical Image Watermarking for Health Information System. J Med Syst 2016; 40:269. [DOI: 10.1007/s10916-016-0608-0] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/14/2016] [Accepted: 09/13/2016] [Indexed: 11/28/2022]
|
18
|
Abstract
Telemedicine is a booming healthcare practice that has facilitated the exchange of medical data and expertise between healthcare entities. However, the widespread use of telemedicine applications requires a secured scheme to guarantee confidentiality and verify authenticity and integrity of exchanged medical data. In this paper, we describe a region-based, crypto-watermarking algorithm capable of providing confidentiality, authenticity, and integrity for medical images of different modalities. The proposed algorithm provides authenticity by embedding robust watermarks in images' region of non-interest using SVD in the DWT domain. Integrity is provided in two levels: strict integrity implemented by a cryptographic hash watermark, and content-based integrity implemented by a symmetric encryption-based tamper localization scheme. Confidentiality is achieved as a byproduct of hiding patient's data in the image. Performance of the algorithm was evaluated with respect to imperceptibility, robustness, capacity, and tamper localization, using different medical images. The results showed the effectiveness of the algorithm in providing security for telemedicine applications.
Collapse
|
19
|
Al-Dmour H, Al-Ani A. Quality optimized medical image information hiding algorithm that employs edge detection and data coding. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2016; 127:24-43. [PMID: 27000287 DOI: 10.1016/j.cmpb.2016.01.011] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/20/2015] [Revised: 01/09/2016] [Accepted: 01/11/2016] [Indexed: 06/05/2023]
Abstract
OBJECTIVES The present work has the goal of developing a secure medical imaging information system based on a combined steganography and cryptography technique. It attempts to securely embed patient's confidential information into his/her medical images. METHODS The proposed information security scheme conceals coded Electronic Patient Records (EPRs) into medical images in order to protect the EPRs' confidentiality without affecting the image quality and particularly the Region of Interest (ROI), which is essential for diagnosis. The secret EPR data is converted into ciphertext using private symmetric encryption method. Since the Human Visual System (HVS) is less sensitive to alterations in sharp regions compared to uniform regions, a simple edge detection method has been introduced to identify and embed in edge pixels, which will lead to an improved stego image quality. In order to increase the embedding capacity, the algorithm embeds variable number of bits (up to 3) in edge pixels based on the strength of edges. Moreover, to increase the efficiency, two message coding mechanisms have been utilized to enhance the ±1 steganography. The first one, which is based on Hamming code, is simple and fast, while the other which is known as the Syndrome Trellis Code (STC), is more sophisticated as it attempts to find a stego image that is close to the cover image through minimizing the embedding impact. The proposed steganography algorithm embeds the secret data bits into the Region of Non Interest (RONI), where due to its importance; the ROI is preserved from modifications. RESULTS The experimental results demonstrate that the proposed method can embed large amount of secret data without leaving a noticeable distortion in the output image. The effectiveness of the proposed algorithm is also proven using one of the efficient steganalysis techniques. CONCLUSION The proposed medical imaging information system proved to be capable of concealing EPR data and producing imperceptible stego images with minimal embedding distortions compared to other existing methods. In order to refrain from introducing any modifications to the ROI, the proposed system only utilizes the Region of Non Interest (RONI) in embedding the EPR data.
Collapse
Affiliation(s)
- Hayat Al-Dmour
- School of Electrical, Mechanical and Mechatronic Systems, Faculty of Engineering and Information Technology, University of Technology Sydney, NSW 2007, Australia.
| | - Ahmed Al-Ani
- School of Electrical, Mechanical and Mechatronic Systems, Faculty of Engineering and Information Technology, University of Technology Sydney, NSW 2007, Australia.
| |
Collapse
|
20
|
Karakış R, Güler I, Çapraz I, Bilir E. A novel fuzzy logic-based image steganography method to ensure medical data security. Comput Biol Med 2015; 67:172-83. [PMID: 26555746 DOI: 10.1016/j.compbiomed.2015.10.011] [Citation(s) in RCA: 34] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/24/2015] [Revised: 09/14/2015] [Accepted: 10/19/2015] [Indexed: 11/19/2022]
Abstract
This study aims to secure medical data by combining them into one file format using steganographic methods. The electroencephalogram (EEG) is selected as hidden data, and magnetic resonance (MR) images are also used as the cover image. In addition to the EEG, the message is composed of the doctor׳s comments and patient information in the file header of images. Two new image steganography methods that are based on fuzzy-logic and similarity are proposed to select the non-sequential least significant bits (LSB) of image pixels. The similarity values of the gray levels in the pixels are used to hide the message. The message is secured to prevent attacks by using lossless compression and symmetric encryption algorithms. The performance of stego image quality is measured by mean square of error (MSE), peak signal-to-noise ratio (PSNR), structural similarity measure (SSIM), universal quality index (UQI), and correlation coefficient (R). According to the obtained result, the proposed method ensures the confidentiality of the patient information, and increases data repository and transmission capacity of both MR images and EEG signals.
Collapse
Affiliation(s)
- R Karakış
- Department of Electronics and Computer Education, Faculty of Technical Education, Cumhuriyet University, Sivas, Turkey.
| | - I Güler
- Department of Electronics and Computer Education, Faculty of Technical Education, Gazi University, 06500, Teknikokullar, Ankara, Turkey.
| | - I Çapraz
- Department of Neurology, Faculty of Medical, Gazi University, Besevler, Ankara, Turkey.
| | - E Bilir
- Department of Neurology, Faculty of Medical, Gazi University, Besevler, Ankara, Turkey.
| |
Collapse
|
21
|
Aherrahrou N, Tairi H. PDE based scheme for multi-modal medical image watermarking. Biomed Eng Online 2015; 14:108. [PMID: 26608730 PMCID: PMC4660816 DOI: 10.1186/s12938-015-0101-x] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/11/2015] [Accepted: 11/11/2015] [Indexed: 11/20/2022] Open
Abstract
Background This work deals with copyright protection of digital images, an issue that needs protection of intellectual property rights. It is an important issue with a large number of medical images interchanged on the Internet every day. So, it is a challenging task to ensure the integrity of received images as well as authenticity. Digital watermarking techniques have been proposed as valid solution for this problem. Methods It is worth mentioning that the Region Of Interest (ROI)/Region Of Non Interest (RONI) selection can be seen as a significant limitation from which suffers most of ROI/RONI based watermarking schemes and that in turn affects and limit their applicability in an effective way. Generally, the ROI/RONI is defined by a radiologist or a computer-aided selection tool. And thus, this will not be efficient for an institute or health care system, where one has to process a large number of images. Therefore, developing an automatic ROI/RONI selection is a challenge task. The major aim of this work is to develop an automatic selection algorithm of embedding region based on the so called Partial Differential Equation (PDE) method. Thus avoiding ROI/RONI selection problems including: (1) computational overhead, (2) time consuming, and (3) modality dependent selection. Results The algorithm is evaluated in terms of imperceptibility, robustness, tamper localization and recovery using MRI, Ultrasound, CT and X-ray grey scale medical images. From experimental results that we have conducted on a database of 100 medical images of four modalities, it can be inferred that our method can achieve high imperceptibility, while showing good robustness against attacks. Furthermore, the experiment results confirm the effectiveness of the proposed algorithm in detecting and recovering the various types of tampering. The highest PSNR value reached over the 100 images is 94,746 dB, while the lowest PSNR value is 60,1272 dB, which demonstrates the higher imperceptibility nature of the proposed method. Moreover, the Normalized Correlation (NC) between the original watermark and the corresponding extracted watermark for 100 images is computed. We get a NC value greater than or equal to 0.998. This indicates that the extracted watermark is very similar to the original watermark for all modalities. Conclusion The key features of our proposed method are to (1) increase the robustness of the watermark against attacks; (2) provide more transparency to the embedded watermark. (3) provide more authenticity and integrity protection of the content of medical images. (4) provide minimum ROI/RONI selection complexity.
Collapse
Affiliation(s)
- N Aherrahrou
- LIIAN, Department of Informatics, University Sidi Mohamed Ben Abdellah, Fez, Morocco.
| | - H Tairi
- LIIAN, Department of Informatics, University Sidi Mohamed Ben Abdellah, Fez, Morocco.
| |
Collapse
|
22
|
Nyeem H, Boles W, Boyd C. Content-independent embedding scheme for multi-modal medical image watermarking. Biomed Eng Online 2015; 14:7. [PMID: 25649491 PMCID: PMC4417312 DOI: 10.1186/1475-925x-14-7] [Citation(s) in RCA: 15] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/04/2014] [Accepted: 12/26/2014] [Indexed: 11/26/2022] Open
Abstract
Background As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow significantly. Such use of medical images raises serious concerns for their continuous security protection, which digital watermarking has shown great potential to address. Methods We present a content-independent embedding scheme for medical image watermarking. We observe that the perceptual content of medical images varies widely with their modalities. Recent medical image watermarking schemes are image-content dependent and thus they may suffer from inconsistent embedding capacity and visual artefacts. To attain the image content-independent embedding property, we generalise RONI (region of non-interest, to the medical professionals) selection process and use it for embedding by utilising RONI’s least significant bit-planes. The proposed scheme thus avoids the need for RONI segmentation that incurs capacity and computational overheads. Results Our experimental results demonstrate that the proposed embedding scheme performs consistently over a dataset of 370 medical images including their 7 different modalities. Experimental results also verify how the state-of-the-art reversible schemes can have an inconsistent performance for different modalities of medical images. Our scheme has MSSIM (Mean Structural SIMilarity) larger than 0.999 with a deterministically adaptable embedding capacity. Conclusions Our proposed image-content independent embedding scheme is modality-wise consistent, and maintains a good image quality of RONI while keeping all other pixels in the image untouched. Thus, with an appropriate watermarking framework (i.e., with the considerations of watermark generation, embedding and detection functions), our proposed scheme can be viable for the multi-modality medical image applications and distant medical services such as teleradiology and eHealth.
Collapse
Affiliation(s)
- Hussain Nyeem
- Department of Electronics and Communication Engineering, Khulna University of Engineering and Technology (KUET), 9203, Khulna, Bangladesh.
| | - Wageeh Boles
- School of Electrical Eng. & Computer Science, Queensland University of Technology (QUT), Brisbane, 4001, Queensland, Australia.
| | - Colin Boyd
- School of Electrical Eng. & Computer Science, Queensland University of Technology (QUT), Brisbane, 4001, Queensland, Australia. .,Department of Telematics, Norwegian University of Science and Technology (NTNU), 7491, Trondheim, Norway.
| |
Collapse
|
23
|
Viswanathan P, Krishna PV. A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security Issues of Teleradiology. IEEE J Biomed Health Inform 2014; 18:753-64. [DOI: 10.1109/jbhi.2013.2281322] [Citation(s) in RCA: 43] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
|
24
|
Shen H, Ma D, Zhao Y, Sun H, Sun S, Ye R, Huang L, Lang B, Sun Y. MIAPS: a web-based system for remotely accessing and presenting medical images. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2013; 113:266-283. [PMID: 24183386 DOI: 10.1016/j.cmpb.2013.09.008] [Citation(s) in RCA: 9] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/18/2013] [Revised: 08/12/2013] [Accepted: 09/12/2013] [Indexed: 06/02/2023]
Abstract
MIAPS (medical image access and presentation system) is a web-based system designed for remotely accessing and presenting DICOM image. MIAPS is accessed with web browser through the Internet. MIAPS provides four features: DICOM image retrieval, maintenance, presentation and output. MIAPS does not intent to replace sophisticated commercial and open source packages, but it provides a web-based solution for teleradiology and medical image sharing. The system has been evaluated by 39 hospitals in China for 10 months.
Collapse
Affiliation(s)
- Hualei Shen
- State Key Laboratory of Software Development Environment, School of Computer Science and Engineering, Beihang University, Beijing, China
| | | | | | | | | | | | | | | | | |
Collapse
|
25
|
Das S, Kundu MK. Effective management of medical information through ROI-lossless fragile image watermarking technique. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2013; 111:662-675. [PMID: 23816251 DOI: 10.1016/j.cmpb.2013.05.027] [Citation(s) in RCA: 19] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/09/2012] [Revised: 04/26/2013] [Accepted: 05/26/2013] [Indexed: 06/02/2023]
Abstract
In this article, we have proposed a blind, fragile and Region of Interest (ROI) lossless medical image watermarking (MIW) technique, providing an all-in-one solution tool to various medical data distribution and management issues like security, content authentication, safe archiving, controlled access retrieval, and captioning. The proposed scheme combines lossless data compression and encryption technique to embed electronic health record (EHR)/DICOM metadata, image hash, indexing keyword, doctor identification code and tamper localization information in the medical images. Extensive experiments (both subjective and objective) were carried out to evaluate performance of the proposed MIW technique. The findings offer suggestive evidence that the proposed MIW scheme is an effective all-in-one solution tool to various issues of medical information management domain. Moreover, given its relative simplicity, the proposed scheme can be applied to the medical images to serve in many medical applications concerned with privacy protection, safety, and management.
Collapse
Affiliation(s)
- Sudeb Das
- Machine Intelligence Unit, Indian Statistical Institute, 203 B. T. Road, Kolkata-108, West Bengal, India.
| | | |
Collapse
|
26
|
A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud. COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE 2013; 2013:516465. [PMID: 23970943 PMCID: PMC3732617 DOI: 10.1155/2013/516465] [Citation(s) in RCA: 41] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/15/2013] [Accepted: 06/04/2013] [Indexed: 12/03/2022]
Abstract
Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)—Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.
Collapse
|