Author : Jyoti 1
Date of Publication :22nd February 2018
Abstract: Medical images can be intentionally or unintentionally manipulated both within the secure medical system environment and outside, as images are viewed, extracted and transmitted. Many organisations have invested heavily in Picture Archiving and Communication Systems (PACS), which are intended to facilitate data security. However, it is common for images, and records, to be extracted from these for a wide range of accepted practices, such as external second opinion, transmission to another care provider, patient data request, etc. Therefore, confirming trust within medical imaging workflows has become essential. Digital watermarking has been recognised as a promising approach for ensuring the authenticity and integrity of medical images. Authenticity refers to the ability to identify the information origin and prove that the data relates to the right patient. Integrity means the capacity to ensure that the information has not been altered without authorisation. This paper presents a survey of medical images watermarking and offers an evident scene for concerned researchers by analysing the robustness and limitations of various existing approaches. This includes studying the security levels of medical images within PACS system, clarifying the requirements of medical images watermarking and defining the purposes of watermarking approaches when applied to medical images
Reference :
-
- M. Fontani, A. De Rosa, R. Caldelli, F. Filippini, A. Piva, M. Consalvo, Reversible watermarking for image integrity verification in hierarchical pacs, in: Proceed- ings of the 12th ACM workshop on Multimedia and security, 2010, pp. 161– 168.
- N.A. Memon, A. Chaudhry, M. Ahmad, Z.A. Keerio, Hybrid watermarking of medical images for ROI authentication and recovery, Int. J. Comput. Math. 88 (2011) 2057–2071.
- S.C. Liew, J.M. Zain, Tamper localization and lossless recovery watermarking scheme, in: Software Engineering and Computer Systems, Springer, 2011, pp. 555–566.
- M.L. Richardson, M.S. Frank, E.J. Stern, Digital image manipulation: What constitutes acceptable alteration of a radiologic image?, AJR. Am. J. Roentgenol. 164 (1995) 228–229.
- H. Nyeem, W. Boles, C. Boyd, A review of medical image watermarking require- ments for teleradiology, J. Digit. Imaging 26 (2013) 326–343.
- G. Coatrieux, M. Lamard, W. Daccache, J. Puentes, C. Roux, A low distorsion and reversible watermark: Application to angiographic images of the retina, in: Engineering in Medicine and Biology Society, 2005. IEEE-EMBS 2005. 27th Annual International Conference of the, 2005, pp. 2224–2227.
- K. Pushpala, R. Nigudkar, A novel watermarking technique for medical image authentication, in: Computers in Cardiology, IEEE, 2005, pp. 683–686.
- L.O.M. Kobayashi, S.S. Furuie, P.S.L.M. Barreto, Providing integrity and authen- ticity in DICOM images: A novel approach, IEEE Trans. Inf. Technol. Biomed. 13 (2009) 582–589.
- J. Bernarding, A. Thiel, A. Grzesik, A JAVAbased DICOM server with integration of clinical findings and DICOM-conform data encryption, Int. J. Med. Inform. 64 (2001) 429–438.
- J. Guru, H. Damecha, Digital watermarking classification: A survey, Int. J. Comput. Sci. Trends Technol. 5 (2014) 8–13.
- A. Tareef, A. Al-Ani, H. Nguyen, Y.Y. Chung, A novel tamper detection-recovery and watermarking system for medical image authentication and EPR hiding, in: Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE, 2014, pp. 5554–5557.
- S.M. Mousavi, A. Naghsh, S. Abu-Bakar, Watermarking techniques used in medical images: A survey, J. Digit. Imaging 27 (2014) 714–729.
- C. Fung, A. Gortan, W.G. Junior, A review study on image digital watermarking, in: The Tenth International Conference on Networks, 2011, pp. 24–28
- R. Ridzoň, D. Levický, Z. KlenoviÄová, Attacks on watermarks and adjusting PSNR for watermarks application, in: Radioelektronika 2004: 14th Interna- tional Czech-Slovak Scientific Conference, 2004, pp. 27–28.
- S. Voloshynovskiy, S. Pereira, V. Iquise, T. Pun, Attack modelling: Towards a second generation watermarking benchmark, Signal Process. 81 (2001) 1177– 1214.
- M. Durvey, D. Satyarthi, A review paper on digital watermarking, International Journal of Emerging Trends & Technology in Computer Science, vol. 3, pp. 99– 105, 2014.
- P. Arya, D.S. Tomar, D. Dubey, A review on different digital watermarking techniques, Int. J. Signal Process. Image Process. Pattern Recognit. 8 (2015) 129– 136.
- M. Abdullatif, A.M. Zeki, J. Chebil, T.S. Gunawan, Properties of digital image watermarking, in: Signal Processing and its Applications (CSPA), 2013 IEEE 9th International Colloquium on, 2013, pp. 235–240.
- R. Patel, P. Bhatt, A review paper on digital watermarking and its techniques, Int. J. Comput. Appl. 110 (2015) 10–13.