Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
ICIT 2013 The 6th International Conference on Information Technology A REVIEW OF REVERSIBLE WATERMARKING PROPERTIES, APPLICATIONS AND TECHNIQUES FOR MEDICAL IMAGES Nuha Omran Abokhdair, Azizah Bt Abdul Manaf Universiti Teknologi Malaysia. 54100 Kuala Lumpur, Malaysia Abo_khdeir@yahoo.com, azizah07@citycampus.utm.my Abstract Medical image watermarking is a special branch of image watermarking. The main use of medical image watermarking is for authentication and tamper detection. In addition, it is used to insert the related electronic patient record (EPR) into the medical image. The objective of this paper is to conduct a research of medical image properties and applications. In addition, some of medical image watermarking schemes are reviewed. These schemes are reversible, i.e. the exact copy of the original image can be recovered. Keywords - Data hiding, ROI-based watermarking, DICOM, EPR, Difference Expansion. 1 INTRODUCTION Nowadays, the distribution and communication of medical information among health care providers and telemedicine systems are becoming increasingly crucial. One of the most significant types of medical information is medical images, where the transmission of medical images over wire and wireless networks is a daily routine in medical life [1]. On the other hand, the distribution of medical images over unsecured network channels, such as internet, produces potential risk of information disclosure to an unauthorized entity, where it is intentional or not intentional. A manipulation of the context of the medical image is a possible consequence of this, which may cause misdiagnosis [1][2]. In order to protect medical images from any unauthorized access, Medical image watermarking is used. The main use of medical image watermarking is for authentication and tamper detection in order to identify the source of the image and to detect and localize any manipulation of the image. In addition, it is used to insert the related electronic patient record (EPR) into the medical image in order to avoid detachment of EPR from its corresponding image [3]. In medical images, even a minor distortion of the image caused by watermarking is prohibited, because this may affect the diagnosis negatively. To overcome this problem, reversible watermarking is used. The main feature of reversible watermarking is that an exact copy of the original image can be recovered, if the watermarked image is considered authentic [4]. In this paper, the following sections are organized as follows; the properties and the applications of medical image watermarking are introduced in section II and section III, respectively. In section IV, an overview of the previous reversible watermarking techniques for medical images is given. 2 PROPERTIES OF MEDICAL IMAGE WATERMARKING In general image watermarking, three main characteristics need to be kept reasonably very high, Transparency, Capacity and Robustness [5]. In medical image watermarking, additional characteristics are required including reversibility, authenticity and complexity. 2.1 Perceptual Transparency The digital watermark should be embedded in the medical image so that it is not noticeable to human perception for confidentiality and secrecy. Although embedding a watermark in the image introduce some noise to the cover image, it is important to minimize its impact on the visual quality of the image [6]. ICIT 2013 The 6th International Conference on Information Technology 2.2 Embedding Capacity Embedding capacity or payload refers to the size of the watermark that can be inserted into the host image [1]. In Medical Image Watermarking, a high embedding capacity is required to provide enough space to insert the EPR, authentication and tamper detection information. 2.3 Robustness Robustness of the watermark is its ability to remain intact if the watermarked image undergoes processing such as scaling and rotation, cropping, filtering, and lossy compression. The watermark should be difficult to destroy without degrading the visual quality of the cover image so as to render it unusable [2][6]. 2.4 Reversibility Reversibility refers to the ability to recover the original cover image perfectly after the marked image passes the authentication process. In Medical Image Watermarking, even a small manipulation of the medical image may lead to wrong diagnosis. Thus, it is essential to recover the original medical image after extracting the watermark from the image [2][6]. 2.5 Authenticity This means only authentic users are able to access the embedded data. Authentic users may include patients, Hospital Information System (HIS) personnel, clinicians and radiologists. To achieve this property, secret keys are used [5]. 2.6 Complexity Computational complexity is the number of operations required to embed and extract the watermark. To save the execution time the watermarking algorithm should be less complex. For telediagnosis, the speed becomes a vital issue if the situation is demands [5]. 3 MEDICAL IMAGE WATERMARKING APPLICATIONS According to the properties of medical image watermarking, one can discover that medical image watermarking techniques are developed based on the applications. Among others, the following applications of medical image watermarking are more common: 3.1 Patient’s private information protection Electronic Patient Record includes the private information of the patient that should be kept confidential and secure. Medical image watermarking is able to ensure the confidentiality of the private patient information by hiding it inside the medical image imperceptibility [3]. 3.2 Authentication and tamper detection In medical image area, it is essential to maintain the integrity and authenticity of the image because any kind of changes to the original image could lead doctors to make erroneous decisions and serve harmful consequences [4]. Authentication watermarking is able to assure that the medical image has not been tampered with by a hostile entity [5]. In order to maintain the integrity of the image, a watermark serves as a signature can be embedded into the image. Thus, if the image is manipulated, it can be easily detected as the pixel value of the embedded data will be changed [7]. 3.3 Teleradiology and teleconference Teleradiology is a technology used to transmit medical information and images into a remote location for diagnosis, consultation, treatment, or academic research by using a communication network such as LAN, WLAN or internet [8]. Therefore, in order secure the connection; watermarking is adopted to insert EPR and authentication code into the medical image, which ensures the confidentiality of the ICIT 2013 The 6th International Conference on Information Technology EPR and the authenticity of the image. It is also save the memory and the bandwidth and can detect any tampering of data [5]. This technique can also be used for teleconference where a team of geographically dispersed radiologists and specialist can discuss and diagnose a medical image in hands. 4 REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUES Medical image watermarking algorithms can be classified into two categories, reversible watermarking and irreversible watermarking. The watermarking techniques that are acceptable for diagnostic analysis are mainly based on reversible watermarking. Therefore, in this paper the focus will be on reversible watermarking. Based on the purpose of the watermarking, watermarking schemes of medical images can be categorized into: 4.1 Data hiding schemes In [9], Lou et al. proposed a multiple-layer data hiding technique for medical image using a reduced difference expansion method to embed the bitstream in the least significant bits (LSBs) of the expanded differences. The proposed technique reduces the value of the expansion difference so that the value of the transformed expansion difference can be close to the original. The pixel pair will not be processed when overflow and underflow problem is encountered. The original image can be restored after extracting the hidden data from the marked image. The experimental results show that the proposed method effectively improves Tian's method [10] in embedding capacity and visual quality and large amount of data can be embedded in a medical image while quality can also be maintained. Al-Qershi and Khoo proposed two reversible schemes based on DE for data hiding in medical images [11]. The first scheme combined Tian’s technique with Chiang’s scheme [10][12], and the second scheme combined Tian’s technique with Alattar’s scheme [13]. To embed the data in the image, the image is divided into blocks of 4×4 pixels each and classified into smooth and non-smooth blocks. The payload is embedded using Tian’s scheme into the non-smooth blocks. The embedding map is compressed and embedded into smooth blocks using Chiang’s scheme. For the second proposed scheme, Alattar’s scheme is used to embed the compressed embedding map. The experimental results obtained show that the two proposed schemes are image dependent. The 2nd proposed scheme is better in terms of hiding capacity, while the 1st proposed scheme has better visual quality. However, the two proposed schemes are not suitable for X-ray images because of the lack of smooth areas. 4.2 Authentication and tamper detection schemes Guo and Zhuang, in [14], presented a lossless watermarking scheme to verify the integrity and authenticity of medical images. In addition, the scheme has the capability of not introducing any embedding distortion in the region of interest (ROI) of a medical image. Difference expansion method is applied for embedding process. The image is divided into quads, where the quad is a vector u= (u0, u1, u2, u3) formed from non-overlap 2х2 adjacent pixel values. Then, a region of embedding, which is represented by a polygon, is chosen intentionally to prevent introducing embedding distortion in the ROI. For each quad u, 3 bit of information is embedded using difference expansion. Experimental results show that this scheme achieves high embedding capacity with low level of distortion. Moreover, Patient’s fingerprint information is embedded into several image slices for enhancing authenticity. However, this scheme is not used to embed temper detection and recovery information, which needs higher embedding capacity. Tan et al. introduced a dual layer reversible watermarking for hiding patient information and tamper detection information, and to ensure authenticity and integrity of the image in [15]. In this technique, the image is divided into 2х2 non-overlapping blocks. One of the pixels of each block is chosen randomly as an estimator. Each one of the other three pixels can carry one bit of the watermark, if the difference between them and the estimator is less than 2, by adding or subscribing the pixel by 2 based on the watermark value (0 or 1). To keep the estimator location secure, it is encrypted using RSA and watermarked into fixed location in the image. In the first layer, patient information, authentication information and the estimators’ locations are embedded. Tamper localization information is embedded in layer 2. To detect tampering locations, the image is divided into 16×16 ICIT 2013 The 6th International Conference on Information Technology non-overlapping pixel blocks and CRC-16 is computed for each block and embedded into its own block. To avoid under and overflow, this scheme shifts pixel values of images by four gray levels values because many modalities produce images that do not utilize the full 16-bit range of pixel values. Theoretically, hiding capacity is 0.75 bpp, however the capacity depends on the pixels that have high correlation. Although this scheme is able to locate tampered area in the image, it cannot recover those locations. In [3], Al-Qershi proposed a reversible ROI based fragile technique to hide patient data, authenticate ROI, and to detect and recover tampered region in DICOM image. ROI is used as a host to embed the patient information and authentication information in it using modified DE (Difference Expansion) proposed by Guo [14]. On the other hand, the watermarking map of the information embedded in the ROI and the compressed version of ROI for tamper recovery are inserted into the RONI of the image using the original DE produced by Tian [10]. However, this scheme can only authenticate ROI. Another hybrid watermarking scheme was proposed by Al-Qershi, in [16], for authenticating DICOM images and hiding the patient data in it. In embedding process, the image is divided into ROI and RONI and then it is divided into blocks of 16х16 pixels. Patient’s data and the hash of ROI are embedded into ROI using modified DE technique, developed by Guo [14], and to extract this watermark, the watermarking map is combined with recovery information and embedded into RONI using three-level DWT technique developed by Kundur [17]. The experimental results show that the scheme has some robustness against certain levels of salt and pepper and cropping noise. To recover the tampered area in the image, the size of the image must be at least 512×512 pixels. In addition, this scheme fulfils reversibility and authenticity requirement for ROI only. Table 1 shows a comparison of the reviewed schemes of reversible medical image watermarking. Table 1. A comparison of medical image watermarking techniques Algorithm Lou et al. [9] Embedding technique Reduced DE ROIBased EPR Hiding Data Hiding/ Authentication Tamper Localization Tamper Recovery Reversible Х х Data Hiding х Х  Х х Data Hiding х х  DE Al-Qershi and Khoo [11] DE Guo and Zhuang [14] Quad of DE   Authentication х х  Tan et al. [15] Random location estimator signal Х  Authentication  х  Performance The PSNR value becomes very low at high embedding capacity 1st scheme better in visual quality. 2nd scheme is better in capacity. Capacity (0.50.7bpp). PSNR up to 37dB The capacity is limited, because the data embedded only on ROE Capacity=74,190 to 581,524 bits PSNR = 34-35dB hiding Al-Qershi and Khoo [3] modified DE + DE   Data Hiding & Authentication capacity up to 0.52    only ROI is authentic hiding capacity= Al-Qershi and Khoo [16] modified DE + DE   Data Hiding & Authentication 0.46– 0.50 bpp   Only ROI robust against certain levels of ICIT 2013 The 6th International Conference on Information Technology salt and pepper and cropping noise 5 CONCLUSION Many medical image watermarking schemes were proposed in the last few years, but few of them were considering the reversibility requirement. In this paper, some of the recent reversible watermarking techniques for medical images are reviewed. The capacity of those techniques need to be increased in order to be able to conceal EPR, authentication information, and tamper detection and recovery information of bigger size of ROI. Additionally, a good trade-off between image quality and capacity would be critical in satisfying the variety of applications in healthcare community. References [1] W. Puech, "Image Encryption and Compression for Medical Image Security " presented at the Image Processing Theory, Tools and Applications, Sousse 2008. [2] L. Eugene Y.S, "11 - Data Security and Protection for Medical Images," in Biomedical Information Technology, F. David Dagan, Ed., ed Burlington: Academic Press, 2008, pp. 249257. [3] O. M. Al-Qershi and B. E. Khoo, "Authentication and Data Hiding Using a Reversible ROI-based Watermarking Scheme for DICOM Images," presented at the Proceedings of International Conference on Medical Systems Engineering (ICMSE), 2009. [4] M. K. Kundu and S. Das, "Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding," presented at the Proceedings of the 2010 20th International Conference on Pattern Recognition, 2010. [5] K. A. Navas and M. Sasikumar, "Survey of Medical Image Watermarking Algorithms," presented at the 4th International conference: Sciences of Electronic, Technologies of Information and Telecommunications, Tunisia, 2007. [6] F. I. Kallel, B. M. Salim and L. JC, "Improved Tian’s Method for Medical Image Reversible Watermarking," GVIP Journal, vol. 7, pp. 1-5, 2007. [7] A. M. Zeki, "Watermarking techniques using intermediate significant bit," Doctor of Philosophy (Computer Science), Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, 2009. [8] Suapang, P. Dejhan, K. Yimmun and Surapun, "Medical Image Archiving, Processing, Analysis and Communication System for Teleradiology," presented at the TENCON 2010 - 2010 IEEE Region 10 Conference Fukuoka 2010. [9] D.-C. Lou, M.-C. Hu and J.-L. Liu, "Multiple layer data hiding scheme for medical images," Comput. Stand. Interfaces, vol. 31, pp. 329-335, 2009. [10] J. Tian, "Reversible data embedding using a difference expansion," Circuits and Systems for Video Technology, IEEE Transactions on, vol. 13, pp. 890-896, 2003. [11] O. M. Al-Qershi and B. E. Khoo, "High capacity data hiding schemes for medical images based on difference expansion," J. Syst. Softw., vol. 84, pp. 105-112, 2011. [12] K.-H. Chiang, K.-C. Chang-Chien, R.-F. Chang and H.-Y. Yen, "Tamper Detection and Restoring System for Medical Images Using Wavelet-based Reversible Data Embedding," Journal of Digital Imaging, vol. 21, pp. 77-90, 2008. ICIT 2013 The 6th International Conference on Information Technology [13] A. M. Alattar, "Reversible watermark using difference expansion of quads," in Acoustics,. Proceedings. (ICASSP '04). IEEE International Conference on, 2004, pp. iii-377-80 vol.3. [14] X. Guo and T.-g. Zhuang, "A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data," Journal of Digital Imaging, vol. 22, pp. 53-64, 2009. [15] C. Tan, et al., "Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability," Journal of Digital Imaging, vol. 24, pp. 528540, 2011. [16] O. Al-Qershi and B. Khoo, "Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images," Journal of Digital Imaging, vol. 24, pp. 114-125, 2011. [17] D. Kundur and D. Hatzinakos, "Digital watermarking for telltale tamper proofing and authentication," Proceedings of the IEEE, vol. 87, pp. 1167-1180, 1999.