Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32578
A Lossless Watermarking Based Authentication System For Medical Images

Authors: Samia Boucherkha, Mohamed Benmohamed


In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to fragile watermarking since it is the usual scheme for authentication.We then analyze the requirements for image authentication and integrity in medical imagery, and we show finally that invertible schemes are the best suited for this particular field. A well known authentication method is studied. This technique is then adapted here for interleaving patient information and message authentication code with medical images in a reversible manner, that is using lossless compression. The resulting scheme enables on a side the exact recovery of the original image that can be unambiguously authenticated, and on the other side, the patient information to be saved or transmitted in a confidential way. To ensure greater security the patient information is encrypted before being embedded into images.

Keywords: Medical Imaging, Invertible Watermarking, Authentication, Integrity.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2564


1] P. Campisi, D. Kundur, D. Hatzinakos and A.Neri, ''Compressive Data Hiding: An Unconventional Approach for Improved Colour Image Coding,''EURASIP Journal on Applied Signal Processing, special issue on Emerging Applications of Multimedia Data Hiding, vol. no. 2, pp. 152-163, February 2002.
[2] G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, R. Collorec, ''Relevance of Watermarking in Medical Imaging'', in Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine, Arlington, USA, p. 250-255, Nov. 2000.
[3] J. Fridrich et al, Lossless Data Embedding for All Image Formats, Proc. SPIE Photonics West, Security and Watermarking of Multimedia Contents, pp. 572-583, 2002.
[4] J. Fridrich, M. Goljan and R. Du, Invertible Authentication, Proc. SPIE Photonics West, vol. 3971, Security and Watermarking of Multimedia Contents III, pp. 197-208, 2001.
[5] J. Fridrich, M. Goljan, and R. Du. ''Invertible Authentication Watermark for JPEG Images.'' ITCC 2001, Las Vegas, Nevada, April 2-4, 2001.
[6] F. Hartung and M. Kutter, ''Multimedia watermarking techniques,'' Proceedings of the IEEE, vol. 87, no. 7,pp. 1079-1107, July 1999.
[7] C.-S. Lu, H.-Y.M. Liao and C.-J. Sze, ''Combined Watermarking for Image Authentication and Protection,'' Proc. IEEE Int. Conf. on Multimedia and Expo, vol.3, pp. 1415-1418, August 2000.
[8] A. J. Menezes, P. C. Van Oorschot, S. A. Vanstone, "Handbook of Applied Cryptography", CRC Press, 1997.
[9] Juan RHMA, Perez-Gonzalez F: DCT-Domain Watermarking Techniques for Still images: Detector Performance Analysis and a New Structure. IEEE Transactions on Image Processing 2000, 9:55-68.
[10] http://