Professional Documents
Culture Documents
Abstract—Rapid advancements in information and to achieve confidentiality, and by using digital signatures to
communication technologies facilitated sharing of digital medical provide authenticity and integrity [1, 2]. However, with
images in telemedicine applications. However, due to the encryption only it is impossible to monitor how a legitimate
sensitivity of medical images, their security has become a user handles the content after decryption, thus making it
challenging requirement that must be addressed. In this paper, a possible to illegally redistribute or manipulate the content. An
simple and efficient joint reversible data hiding and encryption alternative technology that seems to complement the
algorithm is proposed for watermarking medical images while cryptographic techniques to fulfill the security needs of
providing high embedding capacity. The proposed algorithm medical image security is data hiding.
combines reversible data hiding techniques with standard
encryption techniques in order to provide the needed security of Data hiding, or watermarking, is a valuable technique that
transmitted and stored medical images. The algorithm utilizes has gained wide spread attention and significance, especially
substitution-based encryption and transposition-based with the rapid evolution of multimedia and communication
encryption to achieve high degree of entropy in the encrypted technologies [3, 4, 5]. A large number of schemes have been
watermarked images. The operation of the algorithm is based on proposed in the literature to provide different applications with
dividing the original medical image randomly into two halves, security services such as copyright protection and
each of which is assigned a different watermark. One of the authentication, broadcast monitoring, covert communication,
watermarks is embedded before encryption and the other medical diagnosis, and law enforcement. The security
watermark is embedded after encryption. Aside from providing
performance of each application is a tradeoff between three
high entropy, the proposed algorithm provides relatively high
embedding capacity because of the existence of two watermarks,
watermarking performance requirements: imperceptibility,
while keeping low computational complexity. embedding capacity, and robustness against any external
attacks. In this paper, our interest has been in reversible data
hiding (RDH) which allows complete watermark extraction
and exact cover image restoration, thus ensuring image
Keywords— medical images; watermarking; cryptography; authenticity and integrity of the original cover images [6 - 11].
partial encryption; histogram shifting; reversible data hiding. Since medical images are sensitive to any modification or
tampering, reversible data hiding has been chosen over
I. INTRODUCTION irreversible data hiding to guarantee exact recovery of the
To provide safe transmission of medical images, there original image after watermark extraction.
exists some security requirements that must be met. These In this paper, an algorithm based on reversible data hiding
requirements are confidentiality, authenticity, and integrity. and cryptography is proposed. The algorithm merges
Confidentiality states that only authorized users have access to watermarking and encryption techniques by dividing the image
the exchanged image, authenticity allows verification of the into two halves with equal sizes. Each half is assigned a
origin and owner of the exchanged image, and integrity ensures different watermark: one is embedded before encryption and
that the exchanged image has not been modified or tampered the other is embedded after encryption. Different encryption
with. Cryptographic techniques can be used to provide the standards have been used to embed the watermarks in the two
stated security requirements by scrambling the medical image halves. The proposed algorithm embeds two different
803
2017 8th International Conference on Information Technology (ICIT)
of the original and shifted histograms of the CT image is
shown Fig. 4.
Cover Image
Preprocessing:
Division and random
selection
Extraction of
the first 34 First Half Second Half
LSB
Shift the
Total histogram to the Spatial Peak Scan this half to
payload left or right by 1 Domain Point find peakpt and
to embed the Hiding Key Zero zeropt
data Point
Width Height
Combine
Processed Image
Watermarked
Encrypted Image
804
2017 8th International Conference on Information Technology (ICIT)
Preprocessing:
Division and random selection
Reshape
domain Key width of wm
watermark
Second Half
LSB Decryption
Encryption
Substitution Key
Combine
processed image
Original Recovered
Image
805
2017 8th International Conference on Information Technology (ICIT)
decrypting the image while leaving the spatial domain
watermark embedded in the decrypted image. Finally, at the
third stage where the image is completely recovered. The
comparison of the quality degradation of these three stages
versus the original image are listed in Table 2, along with the
actual embedded payload size in each domain represented by
bpp values. As can be noticed that the PSNR values of the
directly decrypted image are lower than the PSNR values of the
partial decrypted watermarked image in which the encrypted
domain watermark is extracted. The infinite value of the
(a). (b). restored image PSNR indicates that the cover image is
completely restored. Note that the embedding capacity in the
tables below, denoted by bpp value, is not the maximum
available capacity, instead they are the actual embedded
payload that achieved that PSNR value.
TABLE 2. The PSNR values at the three different stages for the CT 512
(c). (d). image.
Fig. 3. (a) CT medical image; (b). Encrypted watermarked CT image; (c). Decrypted Image
Spatial domain watermark; (d). Encrypted domain watermark. Directly Decrypted Watermarked Restored
With Partial
Image Image
Watermark
Spatial Encrypted Spatial
PSNR PSNR PSNR
Embedded Embedded Embedded
(db) (db) (db)
bpp bpp bpp
56.5958 0.2811 0.1140 58.8066 0.2811
58
TABLE 1. Maximum Embedding capacity of the CT512 image provided by
the proposed algorithm.
57
Max # of Max
Operating Peak Zero
embeddable bits capacity
56
Domain point point
(bits) (bpp)
0.6040
55
Spatial Domain 0 254 79,162
0.05 0.1 0.2 0.3 0.4 0.5 0.6
Encrypted Domain 0 254 79,322 0.6050
Embedding Capacity (bpp)
806
2017 8th International Conference on Information Technology (ICIT)
different and essential role in the watermarking and extraction REFERENCES
process. The keys and the different actions made possible by
[1] Stallings, W., Cryptography and Network Security—Principles and
each key are described as follows: Practice. Englewood Cliffs, NJ: Prentice-Hall, 2016.
a. The Spatial domain hiding key: this key is used to [2] Ali Al-Haj, Gheith Abandah, and Noor Hussein, “Crypto-based
algorithms for secured medical image transmission”, IET Information
extract the watermark embedded in the spatial domain of the Security, 9(6), pp. 365-373, Nov. 2015.
first half (before encryption).
[3] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital
b. The Encrypted domain hiding key: this key is used to Watermarking and Steganography, 2nd ed. San Francisco, CA: Morgan
Kaufmann, 2007.
extract the watermark embedded in the encrypted half.
[4] Ali Al-Haj (Editor) Advanced Techniques in Multimedia Watermarking:
c. The first half encryption key: this key is used in Image, Video and Audio Applications, IGI Global, USA, April 2010.
encrypting and decrypting the first half. It can be the key of a [5] Ali Al-Haj, et al. “A Unified Approach Towards Multimedia
standard encryption standard, such as AES or RC4, or the key Watermarking”, Book Chapter in Advanced Techniques in Multimedia
Watermarking: Image, Video and Audio Applications, (Ed.) Ali M. Al-
of a permutation-based encryption method. Haj, IGI Global, USA, pp. 228-253, 2010.
d. The second half encryption key: this key is used in [6] J. Tian, “Reversible data embedding using a difference expansion,”
encrypting and decrypting the second half, and in the proposed IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,
Aug. 2003.
algorithm this key is assigned to the permutation encryption
method. [7] W. Hong, T.-S. Chen, Y.-P. Chang, and C.-W. Shiu, “A high capacity
reversible data hiding scheme using orthogonal projection and prediction
The four different keys produce sixteen distinct cases. This error modification,” Signal Processing, vol. 90, pp. 2911–2922, 2010.
will lead to different actions in the extraction phase. For [8] C.-C. Chang, C.-C. Lin, and Y.-H. Chen, “Reversible data-embedding
scheme using differences between original and predicted pixel values,”
example, if the user is a database administrator, then his only IET Inform. Security, vol. 2, no. 2, pp. 35–46, 2008.
concern would be to ensure image authenticity and integrity
[9] L. Luo et al., “Reversible image watermarking using interpolation
without the need to reveal the content of the image. Similarly, technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–
if the content owner does not trust the service provider, then we 193, Mar. 2010.
can give the user the encrypted domain hiding key only. This [10] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal
will enable the user to manipulate the encrypted data while Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
keeping the plain content unrevealed. In this case, the [11] Z. Zhao,H. Luo, Z.-M. Lu, and J.-S. Pan, “Reversible data hiding based
administrator will be able to extract the encrypted domain on multilevel histogram modification and sequential recovery,” AEU-
watermark and the image will still be encrypted. The user will International Journal of Electronics and Communications, vol. 65, no.
10, pp. 814–826, 2011.
authenticate the image without having any knowledge about
[12] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE
the original image. Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362,
Mar.2006..
IV. CONCLUSIONS
In this paper, we presented a simple and an efficient joint
reversible data hiding and encryption system for medical
images with high embedding capacity. The algorithm is based
on combining the reversible data hiding techniques with
standard encryption standard to provide image security at
different stages, and to guarantee the blindness of extraction at
the same time. The algorithm employs two types of
encryptions: substitution-based encryption and transposition-
based encryption. This provides full encryption of the cover
image while maintaining high degree of entropy in the
encrypted image. Performance of the algorithm was tested
using medical images of different modalities. The achieved
results demonstrate the effectiveness of combining data hiding
techniques and cryptography to provide different security
services to medical images exchanged between healthcare
entities.
807