Secure Exchange of Medical Images Via Extended Visual Cryptography
Medical image security is acquiring its importance to preserve the integrity and confidentiality of information (medical data) from malicious users given its importance in timely and successful diagnosis. In this context, several techniques have been developed to protect medical images, such as encryption, data hiding, image tagging, application of Hash algorithms, etc. This paper proposes a technique to cipher medical images by adding the metadata inside a cover image, based on extended visual cryptography as well as the inclusion of a Hash-like function to verify the integrity of the image and the metadata once they are recovered. The method proposed in this work is implemented using medical images with a grayscale resolution of [0,4095] that is a depth of 12 bits/pixel and color images with 24 bits/pixel depth. Experimental results prove the effectiveness of the proposed method in the task of secure exchange of medical images by allowing higher hiding capability, lower distortion in the visual quality of the image with the hidden medical data, as well as a means to verify the integrity of the sent data, compared to state-of-the-art.
National Electrical Manufacturers Association. DICOM Security [Internet]. DICOM Digital Imaging and Communication in Medicine; 2019. Available from: https://www.dicomstandard.org/using/security
Coatrieux G, Quantin C, Montagner J, Fassa M, et al. Watermarking medical images with anonymous patient identification to verify authenticity. Stud Health Technol Inform [Internet]. 2008;136:667-672. Available from: https://pubmed.ncbi.nlm.nih.gov/18487808/
Qasim AF, Meziane F, Aspin R. Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev [Internet]. 2018;27:45–60. Available from: https://doi.org/10.1016/j.cosrev.2017.11.003
Mousavi SM, Naghsh A, Abu-Bakar SAR. Watermarking Techniques used in Medical Images: a Survey. J Digit Imaging [Internet]. 2014;27(6):714–729. Available from: https://doi.org/10.1007/s10278-014-9700-5
Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano-Miyake M, Perez-Meana H. Improving the management of medical imaging by using robust and secure dual watermarking. Biomed Signal Process Control [Internet]. 2020;56:101695. Available from: https://doi.org/10.1016/j.bspc.2019.101695
Mirsky Y, Mahler T, Shelef I, Elovici Y. CT-GAN: malicious tampering of 3D medical imagery using deep learning. In: Proceedings of the 28th USENIX Conference on Security Symposium [Internet]. Santa Clara, CA; 2019:461-478. Available from: https://doi.org/10.48550/arXiv.1901.03597
Stallings W. Cryptography and network security: Principles and practice [Internet]. New York: Prentice Hall; 2011. 719p. Available from: http://pozi.omsu.ru/docs/docs/stallings.pdf
Medina Velandia LN. Criptografía y mecanismos de seguridad [Internet]. Bogotá: Fundación Universitaria del Área Andina; 2017. 141p. Available from: https: //digitk.areandina.edu.co/handle/areandina/1423
Blackledge J, Bezobrazov S, Tobin P, Zamora F. Cryptography using evolutionary computing. In: 24th IET Irish Signals and Systems Conference (ISSC 2013) [Internet]. Letterkenny: Institution of Engineering and Technology; 2013:1-8. Available from: https://doi.org/10.1049/ic.2013.0029
Diffie W, Hellman M. New directions in cryptography. Secure communications and asymmetric cryptosystems. IEEE Trans Inf Theory [Internet]. 1976;22(6):644-654. Available from: https://doi.org/10.1109/TIT.1976.1055638
Menezes AJ, van Oorschot PC, Vanstone SA. Handbook of Applied Cryptography [Internet]. Boca Raton: CRC press; 2018. 810p. Available form: https://doi.org/10.1201/9780429466335
Naor M, Shamir A. Visual cryptography. In: De Santis A (eds). EUROCRYPT'94. EUROCRYPT 1994. Lecture Notes in Computer Science, vol 950 [Internet]. Berlin: Springer; 1994:1-12. Available from: https://doi.org/10.1007/BFb0053419
Olvera-Martinez L, Jimenez-Borgonio T, Frias-Carmona T, Abarca-Rodriguez M, et al. First SN P visual cryptographic circuit with astrocyte control of structural plasticity for security applications. Neurocomputing [Internet]. 2021;457(7):67–73. Available from: https://doi.org/10.1016/j.neucom.2021.05.057
Morkel T, Eloff J, Olivier M. An overview of image steganography. In: Eloff JHP, Labuschagne L, Eloff MM, Venter HS (eds). Proceedings of the ISSA 2005 New Knowledge Today Conference [Internet]. Pretoria: ISSA; 2005. 1–11p. http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/098_Article.pdf
Cox IJ, Pakura G, Sheel M. Information Transmission and Steganography. In: Barni M, Cox I, Kalker T, Kim HJ (eds). Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710 [Internet]. Siena, Itlay: Springer; 2005. 15-17. Available from: https://doi.org/10.1007/11551492_2
Wu X, Qiao T, Chen Y, Xu M, et al. Sign steganography revisited with robust domain selection. Signal Process [Internet]. 2022;196:108522. Available from: https://doi.org/10.1016/j.sigpro.2022.108522
Yousefi Valandar M, Ayubi P, Jafari Barani M, Yosefnezhad Irani B. A chaotic video steganography technique for carrying different types of secret messages. J Inf Secur Appl [Internet]. 2022;66:103160. Available from: https://doi.org/10.1016/j.jisa.2022.103160
Vinothkanna R. A secure steganography creation algorithm for multiple file formats. J Innov Image Process [Internet]. 2019;1(01):20–30. Available from: https://doi.org/10.36548/jiip.2019.1.003
Gupta A, Goyal A, Bhushan B. Information Hiding Using Least Significant Bit Steganography and Cryptography. Int J Mod Educ Comput Sci [Internet]. 2012;4(6):27–34. Available from: https://doi.org/10.5815/ijmecs.2012.06.04
Dhiman K, Kasana SS. Extended visual cryptography techniques for true color images. Comput Electr Eng [Internet]. 2018;70:647-658. Available from: https://doi.org/10.1016/j.compeleceng.2017.09.017
Maurya R, Kannojiya AK, Rajitha B. An Extended Visual Cryptography Technique for Medical Image Security. In: 2020 2nd Int Conf on Innov Mech for Ind App (ICIMIA) [Internet]. Bangalore, India: IEEE; 2020: 415-421. Available from: https://doi.org/10.1109/ICIMIA48430.2020.9074910
Omari AH, Al-Kasasbeh BM, Al-Qutaish RE, Muhairat MI. A new cryptographic algorithm for the real time applications. In: Zaharim A, Mastorakis N, Gonos I (eds). Proceedings of the 7th WSEAS international conference on Information security and privacy [Internet]. Cairo, Egypt; World Scientific and Engineering Academy and Society (WSEAS). 2008: 33–38. Available from: https://dl.acm.org/doi/10.5555/1576645.1576651
Schneier B. Applied Cryptography [Internet]. Indianapolis: John Wiley & Sons; 1996. 784p. Available from: https://www.schneier.com/ books/applied-cryptography/
Horé A, Ziou D. Image Quality Metrics: PSNR vs. SSIM. 20th Int Conf on Pat Rec [Internet]. Istanbul, Turkey; IEEE. 2010: 2366-2369. Available from: https://doi.org/10.1109/ICPR.2010.579.
Sara U, Akter M, Uddin MS. Image Quality Assessment through FSIM, SSIM, MSE and PSNR-A Comparative Study. J Comput Commun [Internet]. 2019;7(3):8-18. Available from: https://doi.org/10.4236/jcc.2019.73002
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process [Internet]. 2004;13(4):600-612. Available from: https://doi.org/10.1109/TIP.2003.819861
Copyright (c) 2022 Luis Angel Olvera-Martinez, Manuel Cedillo-Hernandez, Carlos Adolfo Diaz-Rodriguez, Enrique Tonatiuh Jimenez-Borgonio
This work is licensed under a Creative Commons Attribution 4.0 International License.
Upon acceptance of an article in the RMIB, corresponding authors will be asked to fulfill and sign the copyright and the journal publishing agreement, which will allow the RMIB authorization to publish this document in any media without limitations and without any cost. Authors may reuse parts of the paper in other documents and reproduce part or all of it for their personal use as long as a bibliographic reference is made to the RMIB and a copy of the reference is sent. However written permission of the Publisher is required for resale or distribution outside the corresponding author institution and for all other derivative works, including compilations and translations.