DICOM imaging watermarking for hiding medical reports
- PDF / 1,926,450 Bytes
- 14 Pages / 595.276 x 790.866 pts Page_size
- 51 Downloads / 193 Views
ORIGINAL ARTICLE
DICOM imaging watermarking for hiding medical reports Mohamed Boussif 1
&
Noureddine Aloui 2 & Adnene Cherif 1
Received: 30 August 2019 / Accepted: 8 September 2020 # International Federation for Medical and Biological Engineering 2020
Abstract Medical confidentiality is an essential duty in the medical profession. In this paper, we introduce a novel robust blind watermarking method for securing the medical report in a DICOM (Digital Imaging and Communications in Medicine) imaging. The insertion of each bit is done in the subtraction of adjacent DC coefficients of the FFT (fast Fourier transformation) using a key kw. Each bit of the watermark is eXORed with a bit generated by a proposed system which generates a bit sequence in function of the key kw. The proposed method has the features of having better security, invisibility, and robustness. Experimental results show that it is robust to single, double, and triple attacks and that it has better robustness than recently proposed watermarking schemes. Keywords Imaging watermarking . FFT . Subtraction . Data security
1 Introduction With the technology and communication, a lot of secret medical data are exchanged or archived without any security system, especially medical reports which contain personal information about patients’ disease. DICOM is the standard used in medicine for the coding and transmission between doctors of medical imaging. In our context, the DICOM imaging is just a cover for the report and it does not contain any information about the patient’s diseases. So, in this paper, we proposed to blindly hide secret reports in a DICOM imaging using a novel proposed robust watermarking method. Image watermarking algorithms have been suggested by several researchers. In [1], Z. Kricha et al. proposed an image watermarking algorithm using quantification index modulation by improving the extraction process. However, the common problem of the QIM (quantification index modulation) is its sensibility to gain attacks. H. Sadreazami et al. [2] presented a new multiplicative
* Mohamed Boussif [email protected] Noureddine Aloui [email protected] 1
Physics Department, University of Tunis El-Manar, Sciences Faculty of Tunis, El Manar, 2092 Tunis, PB, Tunisia
2
Centre for Research on Microelectronics & Nanotechnology, Sousse Technology Park, Sousse, Tunisia
image watermarking algorithm in the contourlet coefficients by taking into account the local statistical properties and interscale dependencies. It is robust against signal processing attacks, but the robustness against geometric attacks is limited. H. Reza Shahdoosti et al. [3] developed a new image watermarking algorithm in the DFT (discrete Fourier transform) and ripplet II transforms. This method is robust to majority types of attacks but it applied two transforms the DFT and the ripplet II which make the speed of insertion and extraction slow. B. Ahmaderaghi et al. [4] proposed a blind image watermarking algorithm in the DST (discrete shearlet transform) coefficie
Data Loading...