Secure Exchange of Medical Images Via Extended Visual Cryptography

Authors

  • Luis Angel Olvera-Martinez Instituto Politecnico Nacional- Escuela Superior de Ingenieria Mecanica y Electrica (ESIME), México https://orcid.org/0000-0002-9289-5037
  • Manuel Cedillo-Hernandez Instituto Politecnico Nacional- Escuela Superior de Ingenieria Mecanica y Electrica (ESIME), México https://orcid.org/0000-0002-9149-9841
  • Carlos Adolfo Diaz-Rodriguez Instituto Politecnico Nacional- Escuela Superior de Ingenieria Mecanica y Electrica (ESIME), México
  • Enrique Tonatiuh Jimenez-Borgonio Instituto Politecnico Nacional- Escuela Superior de Ingenieria Mecanica y Electrica (ESIME), México https://orcid.org/0000-0002-3467-5861

DOI:

https://doi.org/10.17488/RMIB.43.2.5

Keywords:

DICOM imaging, visual cryptography, information security, circular shifting, least significant bit replacement

Abstract

Medical image security is acquiring its importance to preserve the integrity and confidentiality of information (medical data) from malicious users given its importance in timely and successful diagnosis. In this context, several techniques have been developed to protect medical images, such as encryption, data hiding, image tagging, application of Hash algorithms, etc. This paper proposes a technique to cipher medical images by adding the metadata inside a cover image, based on extended visual cryptography as well as the inclusion of a Hash-like function to verify the integrity of the image and the metadata once they are recovered. The method proposed in this work is implemented using medical images with a grayscale resolution of [0,4095] that is a depth of 12 bits/pixel and color images with 24 bits/pixel depth. Experimental results prove the effectiveness of the proposed method in the task of secure exchange of medical images by allowing higher hiding capability, lower distortion in the visual quality of the image with the hidden medical data, as well as a means to verify the integrity of the sent data, compared to state-of-the-art.

Downloads

Download data is not yet available.

References

National Electrical Manufacturers Association. DICOM Security [Internet]. DICOM Digital Imaging and Communication in Medicine; 2019. Available from: https://www.dicomstandard.org/using/security

Coatrieux G, Quantin C, Montagner J, Fassa M, et al. Watermarking medical images with anonymous patient identification to verify authenticity. Stud Health Technol Inform [Internet]. 2008;136:667-672. Available from: https://pubmed.ncbi.nlm.nih.gov/18487808/

Qasim AF, Meziane F, Aspin R. Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev [Internet]. 2018;27:45–60. Available from: https://doi.org/10.1016/j.cosrev.2017.11.003

Mousavi SM, Naghsh A, Abu-Bakar SAR. Watermarking Techniques used in Medical Images: a Survey. J Digit Imaging [Internet]. 2014;27(6):714–729. Available from: https://doi.org/10.1007/s10278-014-9700-5

Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano-Miyake M, Perez-Meana H. Improving the management of medical imaging by using robust and secure dual watermarking. Biomed Signal Process Control [Internet]. 2020;56:101695. Available from: https://doi.org/10.1016/j.bspc.2019.101695

Mirsky Y, Mahler T, Shelef I, Elovici Y. CT-GAN: malicious tampering of 3D medical imagery using deep learning. In: Proceedings of the 28th USENIX Conference on Security Symposium [Internet]. Santa Clara, CA; 2019:461-478. Available from: https://doi.org/10.48550/arXiv.1901.03597

Stallings W. Cryptography and network security: Principles and practice [Internet]. New York: Prentice Hall; 2011. 719p. Available from: http://pozi.omsu.ru/docs/docs/stallings.pdf

Medina Velandia LN. Criptografía y mecanismos de seguridad [Internet]. Bogotá: Fundación Universitaria del Área Andina; 2017. 141p. Available from: https: //digitk.areandina.edu.co/handle/areandina/1423

Blackledge J, Bezobrazov S, Tobin P, Zamora F. Cryptography using evolutionary computing. In: 24th IET Irish Signals and Systems Conference (ISSC 2013) [Internet]. Letterkenny: Institution of Engineering and Technology; 2013:1-8. Available from: https://doi.org/10.1049/ic.2013.0029

Diffie W, Hellman M. New directions in cryptography. Secure communications and asymmetric cryptosystems. IEEE Trans Inf Theory [Internet]. 1976;22(6):644-654. Available from: https://doi.org/10.1109/TIT.1976.1055638

Menezes AJ, van Oorschot PC, Vanstone SA. Handbook of Applied Cryptography [Internet]. Boca Raton: CRC press; 2018. 810p. Available form: https://doi.org/10.1201/9780429466335

Naor M, Shamir A. Visual cryptography. In: De Santis A (eds). EUROCRYPT'94. EUROCRYPT 1994. Lecture Notes in Computer Science, vol 950 [Internet]. Berlin: Springer; 1994:1-12. Available from: https://doi.org/10.1007/BFb0053419

Olvera-Martinez L, Jimenez-Borgonio T, Frias-Carmona T, Abarca-Rodriguez M, et al. First SN P visual cryptographic circuit with astrocyte control of structural plasticity for security applications. Neurocomputing [Internet]. 2021;457(7):67–73. Available from: https://doi.org/10.1016/j.neucom.2021.05.057

Morkel T, Eloff J, Olivier M. An overview of image steganography. In: Eloff JHP, Labuschagne L, Eloff MM, Venter HS (eds). Proceedings of the ISSA 2005 New Knowledge Today Conference [Internet]. Pretoria: ISSA; 2005. 1–11p. http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/098_Article.pdf

Cox IJ, Pakura G, Sheel M. Information Transmission and Steganography. In: Barni M, Cox I, Kalker T, Kim HJ (eds). Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710 [Internet]. Siena, Itlay: Springer; 2005. 15-17. Available from: https://doi.org/10.1007/11551492_2

Wu X, Qiao T, Chen Y, Xu M, et al. Sign steganography revisited with robust domain selection. Signal Process [Internet]. 2022;196:108522. Available from: https://doi.org/10.1016/j.sigpro.2022.108522

Yousefi Valandar M, Ayubi P, Jafari Barani M, Yosefnezhad Irani B. A chaotic video steganography technique for carrying different types of secret messages. J Inf Secur Appl [Internet]. 2022;66:103160. Available from: https://doi.org/10.1016/j.jisa.2022.103160

Vinothkanna R. A secure steganography creation algorithm for multiple file formats. J Innov Image Process [Internet]. 2019;1(01):20–30. Available from: https://doi.org/10.36548/jiip.2019.1.003

Gupta A, Goyal A, Bhushan B. Information Hiding Using Least Significant Bit Steganography and Cryptography. Int J Mod Educ Comput Sci [Internet]. 2012;4(6):27–34. Available from: https://doi.org/10.5815/ijmecs.2012.06.04

Dhiman K, Kasana SS. Extended visual cryptography techniques for true color images. Comput Electr Eng [Internet]. 2018;70:647-658. Available from: https://doi.org/10.1016/j.compeleceng.2017.09.017

Maurya R, Kannojiya AK, Rajitha B. An Extended Visual Cryptography Technique for Medical Image Security. In: 2020 2nd Int Conf on Innov Mech for Ind App (ICIMIA) [Internet]. Bangalore, India: IEEE; 2020: 415-421. Available from: https://doi.org/10.1109/ICIMIA48430.2020.9074910

Omari AH, Al-Kasasbeh BM, Al-Qutaish RE, Muhairat MI. A new cryptographic algorithm for the real time applications. In: Zaharim A, Mastorakis N, Gonos I (eds). Proceedings of the 7th WSEAS international conference on Information security and privacy [Internet]. Cairo, Egypt; World Scientific and Engineering Academy and Society (WSEAS). 2008: 33–38. Available from: https://dl.acm.org/doi/10.5555/1576645.1576651

Schneier B. Applied Cryptography [Internet]. Indianapolis: John Wiley & Sons; 1996. 784p. Available from: https://www.schneier.com/ books/applied-cryptography/

Horé A, Ziou D. Image Quality Metrics: PSNR vs. SSIM. 20th Int Conf on Pat Rec [Internet]. Istanbul, Turkey; IEEE. 2010: 2366-2369. Available from: https://doi.org/10.1109/ICPR.2010.579.

Sara U, Akter M, Uddin MS. Image Quality Assessment through FSIM, SSIM, MSE and PSNR-A Comparative Study. J Comput Commun [Internet]. 2019;7(3):8-18. Available from: https://doi.org/10.4236/jcc.2019.73002

Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process [Internet]. 2004;13(4):600-612. Available from: https://doi.org/10.1109/TIP.2003.819861

Downloads

Published

2022-08-23

How to Cite

Olvera-Martinez, L. A., Cedillo-Hernandez, M., Diaz-Rodriguez, C. A., & Jimenez-Borgonio, E. T. (2022). Secure Exchange of Medical Images Via Extended Visual Cryptography. Revista Mexicana De Ingenieria Biomedica, 43(2), 64–77. https://doi.org/10.17488/RMIB.43.2.5

Issue

Section

Research Articles

Dimensions Citation

Most read articles by the same author(s)