Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2011 Jun;24(3):528-40.
doi: 10.1007/s10278-010-9295-4.

Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability

Affiliations

Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability

Chun Kiat Tan et al. J Digit Imaging. 2011 Jun.

Abstract

Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent patient information are transmitted across public networks, such as the Internet. Health mandates such as the Health Insurance Portability and Accountability Act require healthcare providers to adhere to security measures in order to protect sensitive patient information. This paper presents a fully reversible, dual-layer watermarking scheme with tamper detection capability for medical images. The scheme utilizes concepts of public-key cryptography and reversible data-hiding technique. The scheme was tested using medical images in DICOM format. The results show that the scheme is able to ensure image authenticity and integrity, and to locate tampered regions in the images.

PubMed Disclaimer

Figures

Fig. 1.
Fig. 1.
Illustration of embedding and extraction of message. a Embedding b Extracting.
Fig. 2.
Fig. 2.
Illustration of block-by-block CRC embedding.
Fig. 3.
Fig. 3.
Dual-layer watermarking scheme.
Fig. 4.
Fig. 4.
Original image (left column) compared with watermarked images (right column). a Original CT image b watermarked CT image, c original XA image, d Watermarked XA image, e original US image (f) Watermarked US image.
Fig. 5.
Fig. 5.
Test images results using the tamper localization function. a Original mammogram image, b tampered mammogram by adding tumor like feature, c image displaying localization of tampering, d original MR knee image e tampered MR image by modifying femoral cartilage thickness, f image displaying localization of tampering.
Fig. 6.
Fig. 6.
Tamper detection results of tampered XA images.
Fig. 7.
Fig. 7.
An illustration of how the proposed scheme could fit into the overall PACS. This infrastructure is based on the image security system proposed by Cao et al..

References

    1. The Health Insurance Portability and Accountability Act (HIPAA), March 2009. [Online]. Available at: http://www.hhs.gov/ocr/privacy/index.html
    1. Digital Imaging and Communications in Medicine (DICOM), part 15: security profiles ed., National Electrical Manufacturers Association (NEMA), 2001, pS 3.15–2001
    1. Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. Proc IEEE EMBS Information Technology Applications in Biomedicine. Arlington, VA 2000, pp 250–255
    1. Zain JM, Fauzi AM, Aziz AA: Clinical evaluation of watermarked medical images. Proc EMBS 28th Annual International Conference of the IEEE 5459–5462, New York, USA, August 30–Sept. 3, 2006 - PubMed
    1. Wang XY, Feng DG, Lai XJ, Yu HB: Collisions for hash functions MD4, MD5 HAVAL-128 and RIPEMD. Rump session of Crypto’04 and IACR Eprint archive, 2004