Authentication and Data Hiding Using a Reversible ROI-based Watermarking Scheme for DICOM Images

In recent years image watermarking has become an important research area in data security, confidentiality and image integrity. Many watermarking techniques were proposed for medical images. However, medical images, unlike most of images, require extreme care when embedding additional data within them because the additional information must not affect the image quality and readability. Also the medical records, electronic or not, are linked to the medical secrecy, for that reason, the records must be confidential. To fulfill those requirements, this paper presents a lossless watermarking scheme for DICOM images. The proposed a fragile scheme combines two reversible techniques based on difference expansion for patient's data hiding and protecting the region of interest (ROI) with tamper detection and recovery capability. Patient's data are embedded into ROI, while recovery data are embedded into region of non-interest (RONI). The experimental results show that the original image can be exactly extracted from the watermarked one in case of no tampering. In case of tampered ROI, tampered area can be localized and recovered with a high quality version of the original area.




References:
[1] D. Anand and U. C. Niranjan, "Watermarking medical images with
patient information," in Proc. 20th Annual International Conference of
the IEEE Engineering in Medicine and Biology Society, 1998, pp. 703-
706.
[2] M. Awrangjeb, "An Overview of Reversible Data Hiding," in The 6th
International Conference on Computer and Information Technology
(ICCIT-03), 2003, pp. 75-79
[3] X. Luo, Q. Cheng, and J. Tan, "A Lossless Data Embedding Scheme for
Medical Images in Application of e-Diagnosis," in Proc.25" Annual
International Conference of the IEEE EMBS, 2003, pp. 852-855.
[4] G. Coatrieux and L. Lecornu, "A Review of Image Watermarking
Applications in Healthcare," in Proc. 28th Annual International
Conference of the IEEE : Engineering in Medicine and Biology
Society, EMBS '06. , 2006, pp. 4691-4694.
[5] J. M. Zain, L. P. Baldwin, and M. Clarke, "Reversible watermarking for
authentication of DICOM images," in Proc. 26th Annual International
Conference of the IEEE Engineering in Medicine and Biology Society,
2004, pp. 3237 - 3240.
[6] J. M. Zain and C. M., "Reversible Region of Non-Interest (RONI)
Watermarking for Authentication of DICOM Images," International
Journal of Computer Science and Network Security, vol. 7, pp. 19-28,
2007.
[7] J. M. Zain and A. R. M. Fauzi, "Medical Image Watermarking with
Tamper Detection and Recovery" in Proc. 28th IEEE EMBS Annual
International Conference, 2006, pp. 3270-3273.
[8] J. M. Zain and A. R. M. Fauzi, "Evaluation of Medical Image
Watermarking with Tamper Detection and Recovery (AW-TDR)," in
The 29th Annual International Conference of the IEEE EMBS, 2007,
pp. 5661-5664.
[9] R.-C. Ra├║l, F.-U. Claudia, and T.-B. Gershom de J., "Data Hiding
Scheme for Medical Images," in Proc. 17th International Conference
on Electronics, Communications and Computers CONIELECOMP '07
2007, pp. 32-37.
[10] A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, "A medical image
watermarking scheme based on wavelet transform," in Proc. 25" Annual
Intemational Conference of the IEEE Engineering in Medicine and
Biology Society, 2003, pp. 856 - 859
[11] A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, "A Multiple
Watermarking Scheme Applied to Medical Image Management," in
Proc. 26th Annual International Conference of the IEEE EMBS, 2004,
pp. 3241- 3244.
[12] A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, "Multiple Digital
Watermarking Applied to Medical Imaging," in Proc. 2005 IEEE
Engineering in Medicine and Biology 27th Annual Conference, 2005,
pp. 3444 - 3447.
[13] A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, "Secure and
efficient health data management through multiple watermarking on
medical images" Medical and Biological Engineering and Computing,
vol. 44, pp. 619-631, 2006.
[14] A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, "Multiple Image
Watermarking Applied to Health Information Management," IEEE
Transactions on Information Technology in Biomedicine, vol. 10, pp.
722- 732, 2006.
[15] M. Li, R. Poovendran, and S. Narayanan, "Protecting patient privacy
against unauthorized release of medical images in a group
communication environment," Computerized Medical Imaging and
Graphics, vol. 29, pp. 367-383, 2005.
[16] J. H. K. Wu, R.-F. Chang, C.-J. Chen, C.-L. Wang, T.-H. Kuo, W. K.
Moon, and D.-R. Chen, "Tamper Detection and Recovery for Medical
Images Using Near-lossless Information Hiding Technique" Journal of
Digital Imaging, vol. 21, pp. 59-76, 2008.
[17] C.-S. Woo, J. Du, and B. Pham, "Multiple Watermark Method for
Privacy Control and Tamper Detection in Medical Images," in Proc.
APRS Workshop on Digital Image Computing Pattern Recognition and
Imaging for Medical Applications, 2005, pp. 43-48.
[18] J. Tian, "Reversible Data Embedding Using a Difference Expansion,"
IEEE Transactions on Circuits and Systems for Video Technology, vol.
13, pp. 890-896, 2003.
[19] X. Guo and T.-g. Zhuang, "A Region-Based Lossless Watermarking
Scheme for Enhancing Security of Medical Data," Journal of Digital
Imaging, vol. 0, pp. 1-12, 2007.
[20] K.-H. Chiang, K.-C. Chang-Chien, R.-F. Chang, and H.-Y. Yen,
"Tamper Detection and Restoring System for Medical Images Using
Wavelet-based Reversible Data Embedding," Journal of Digital
Imaging, vol. 21, pp. 77-90, 2008.