Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

1. Introduction

verfasst von : Rohit Thanki, Surekha Borra

Erschienen in: Medical Imaging and its Security in Telemedicine Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter presents the basic background of a medical imaging and its types. The requirements of security of medical images along with various types of data hiding techniques and the motivation are given in this chapter.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Strzelecki M (2013) Medical imaging. Biomedical Engineering, Institute of Electronics, Technical University of Lodz, Poland Strzelecki M (2013) Medical imaging. Biomedical Engineering, Institute of Electronics, Technical University of Lodz, Poland
2.
Zurück zum Zitat Thanki R, Borra S, Dey N, Ashour A (2018) Medical imaging and its objective quality assessment: an introduction. In: Classification in BioApps. Springer, Cham, pp 3–32CrossRef Thanki R, Borra S, Dey N, Ashour A (2018) Medical imaging and its objective quality assessment: an introduction. In: Classification in BioApps. Springer, Cham, pp 3–32CrossRef
3.
Zurück zum Zitat Rao K, Rao V (2006) Medical image processing. In: Proceedings of workshop on medical image processing and applications Rao K, Rao V (2006) Medical image processing. In: Proceedings of workshop on medical image processing and applications
4.
Zurück zum Zitat American Hospital Association (2015) The promise of telehealth for hospitals, health systems, and their communities, Trend Watch. American Hospital Association, Chicago, IL American Hospital Association (2015) The promise of telehealth for hospitals, health systems, and their communities, Trend Watch. American Hospital Association, Chicago, IL
5.
Zurück zum Zitat Yassin N (2015) Digital watermarking for telemedicine applications: a review. Int J Comput Appl 129(17):30–37 Yassin N (2015) Digital watermarking for telemedicine applications: a review. Int J Comput Appl 129(17):30–37
10.
Zurück zum Zitat Ruotsalainen P (2010) Privacy and security in teleradiology. Eur J Radiol 73:31–35CrossRef Ruotsalainen P (2010) Privacy and security in teleradiology. Eur J Radiol 73:31–35CrossRef
11.
Zurück zum Zitat Baur H, Engelmann U, Saurbier F, Schroter A, Baur U, Menizer H (1997) How to deal with security issues in teleradiology. Comput Methods Prog Biomed 53:1–8CrossRef Baur H, Engelmann U, Saurbier F, Schroter A, Baur U, Menizer H (1997) How to deal with security issues in teleradiology. Comput Methods Prog Biomed 53:1–8CrossRef
12.
Zurück zum Zitat Epstein M, Pasieka M, Lord W, Wong S, Mankovich N (1998) Security for the digital information age of medicine: issues, applications and implementation. J Digit Imaging 11:33–44CrossRef Epstein M, Pasieka M, Lord W, Wong S, Mankovich N (1998) Security for the digital information age of medicine: issues, applications and implementation. J Digit Imaging 11:33–44CrossRef
13.
Zurück zum Zitat Dey N, Ashour A, Chakraborty S, Banerjee S, Gospodinova E, Gospodinov M, Hassanien AE (2017) Watermarking in biomedical signal processing. In: Intelligent techniques in signal processing for multimedia security. Springer International Publishing, Cham, pp 345–369CrossRef Dey N, Ashour A, Chakraborty S, Banerjee S, Gospodinova E, Gospodinov M, Hassanien AE (2017) Watermarking in biomedical signal processing. In: Intelligent techniques in signal processing for multimedia security. Springer International Publishing, Cham, pp 345–369CrossRef
14.
Zurück zum Zitat Nyeem H, Boles W, Boyd C (2013) A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326–343CrossRef Nyeem H, Boles W, Boyd C (2013) A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326–343CrossRef
15.
Zurück zum Zitat Paar C, Pelzl J (2010) Hash functions: understanding cryptography. Springer, Berlin Heidelberg, pp 293–317MATH Paar C, Pelzl J (2010) Hash functions: understanding cryptography. Springer, Berlin Heidelberg, pp 293–317MATH
16.
Zurück zum Zitat Voloshynovskiy S, Koval O, Beekhof F, Pun T (2009) Conception and limits of robust perceptual hashing: towards side information assisted hash functions. In: Media forensics and security Voloshynovskiy S, Koval O, Beekhof F, Pun T (2009) Conception and limits of robust perceptual hashing: towards side information assisted hash functions. In: Media forensics and security
18.
Zurück zum Zitat Xiaoyun D, Xuejia L, Hongbo Y (2004) Collisions for hash functions MD4, MD5, HAVAL-128, and RIPEMD Xiaoyun D, Xuejia L, Hongbo Y (2004) Collisions for hash functions MD4, MD5, HAVAL-128, and RIPEMD
20.
Zurück zum Zitat Kalker T (2001) Issues with digital watermarking and perceptual hashing. Proc SPIE 4518:189CrossRef Kalker T (2001) Issues with digital watermarking and perceptual hashing. Proc SPIE 4518:189CrossRef
21.
Zurück zum Zitat Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R (2000) Relevance of watermarking in medical imaging. In: Proceedings of information technology applications in biomedicine, pp. 250–255 Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R (2000) Relevance of watermarking in medical imaging. In: Proceedings of information technology applications in biomedicine, pp. 250–255
22.
Zurück zum Zitat Zhou XQ, Huang HK, Lou SL (2000) Secure method for sectional image archiving and transmission. In: Medical imaging 2000: PACS design and evaluation: engineering and clinical issues, pp. 390–399 Zhou XQ, Huang HK, Lou SL (2000) Secure method for sectional image archiving and transmission. In: Medical imaging 2000: PACS design and evaluation: engineering and clinical issues, pp. 390–399
23.
Zurück zum Zitat Thanki R, Borra S, Borisagar KR (2018) A hybrid watermarking technique for copyright protection of medical signals in teleradiology, Handbook of research on information security in biomedical signal. IGI Global, pp 320–349 Thanki R, Borra S, Borisagar KR (2018) A hybrid watermarking technique for copyright protection of medical signals in teleradiology, Handbook of research on information security in biomedical signal. IGI Global, pp 320–349
24.
Zurück zum Zitat Liew S, Zain J (2010) Experiment of tamper detection and recovery watermarking in PACS. Second international conference on computer research and development, pp. 387–390 Liew S, Zain J (2010) Experiment of tamper detection and recovery watermarking in PACS. Second international conference on computer research and development, pp. 387–390
25.
Zurück zum Zitat Que D, Wen X, Chen B (2009) PACS model based on digital watermarking and its Core algorithms. In: MIPPR 2009 – medical imaging, parallel processing of images, and optimization techniques: 6th international symposium on multispectral image processing and pattern recognition Que D, Wen X, Chen B (2009) PACS model based on digital watermarking and its Core algorithms. In: MIPPR 2009 – medical imaging, parallel processing of images, and optimization techniques: 6th international symposium on multispectral image processing and pattern recognition
26.
Zurück zum Zitat Borra S, Lakshmi HR, Dey N, Ashour AS, Shid F (2017) Digital image watermarking tools: state-of-the-art. In: Information technology and intelligent transportation systems: proceedings of the 2nd international conference on information technology and intelligent transportation systems, Xi’an, China, vol 296, p 450 Borra S, Lakshmi HR, Dey N, Ashour AS, Shid F (2017) Digital image watermarking tools: state-of-the-art. In: Information technology and intelligent transportation systems: proceedings of the 2nd international conference on information technology and intelligent transportation systems, Xi’an, China, vol 296, p 450
27.
Zurück zum Zitat Thanki RM, Kothari AM (2016) Digital watermarking: technical art of hiding. Intelligent analysis of multimedia information, p 431 Thanki RM, Kothari AM (2016) Digital watermarking: technical art of hiding. Intelligent analysis of multimedia information, p 431
28.
Zurück zum Zitat Borra S, Swamy GN (2013) Sensitive digital image watermarking for copyright protection. Int J Netw Secur 15(2):113–121 Borra S, Swamy GN (2013) Sensitive digital image watermarking for copyright protection. Int J Netw Secur 15(2):113–121
29.
Zurück zum Zitat Borra S, Swamy GN (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci 9(3):312–317 Borra S, Swamy GN (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci 9(3):312–317
30.
Zurück zum Zitat Borra S, Swamy GN (2011) A spatial domain public image watermarking. Int J Secur Its Appl 5(1):1–12 Borra S, Swamy GN (2011) A spatial domain public image watermarking. Int J Secur Its Appl 5(1):1–12
31.
Zurück zum Zitat Borra S, Swamy G, Rao KS (2010) A multiple watermarking technique for images based on visual cryptography. Comput Appl 1:77–81 Borra S, Swamy G, Rao KS (2010) A multiple watermarking technique for images based on visual cryptography. Comput Appl 1:77–81
32.
Zurück zum Zitat Borra S, Swamy G, Rao KS, Kumar AR (2009) A watermarking technique based on visual cryptography. J Inf Assur Secur 4(6):470–473 Borra S, Swamy G, Rao KS, Kumar AR (2009) A watermarking technique based on visual cryptography. J Inf Assur Secur 4(6):470–473
33.
Zurück zum Zitat Lakshmi HR, Borra S (2016) Asynchronous implementation of reversible image watermarking using mousetrap pipelining. In: Advance computing (IACC), 2016 I.E. 6th international conference on, IEEE, pp 529–533 Lakshmi HR, Borra S (2016) Asynchronous implementation of reversible image watermarking using mousetrap pipelining. In: Advance computing (IACC), 2016 I.E. 6th international conference on, IEEE, pp 529–533
34.
Zurück zum Zitat Borra S, Lakshmi HR (2015) Visual cryptography based lossless watermarking for sensitive images. In: International conference on swarm, evolutionary, and memetic computing. Springer, Cham, pp 39–39 Borra S, Lakshmi HR (2015) Visual cryptography based lossless watermarking for sensitive images. In: International conference on swarm, evolutionary, and memetic computing. Springer, Cham, pp 39–39
35.
Zurück zum Zitat Gavini NS, Borra S (2014) Lossless watermarking technique for copyright protection of high resolution images. In: Region 10 symposium, 2014 IEEE. IEEE, pp 73–78 Gavini NS, Borra S (2014) Lossless watermarking technique for copyright protection of high resolution images. In: Region 10 symposium, 2014 IEEE. IEEE, pp 73–78
36.
Zurück zum Zitat Borra S, Swamy GN (2012) A semi-blind image watermarking based on discrete wavelet transform and secret sharing. In: Communication, information & computing technology (ICCICT), 2012, International conference on. IEEE, pp 1–5 Borra S, Swamy GN (2012) A semi-blind image watermarking based on discrete wavelet transform and secret sharing. In: Communication, information & computing technology (ICCICT), 2012, International conference on. IEEE, pp 1–5
37.
Zurück zum Zitat Borra S, Swamy G, Reddy KRL (2012) A novel copyright protection scheme based on visual secret sharing. In: Computing communication & networking technologies (ICCCNT), 2012 3rd international conference on. IEEE, pp 1–5 Borra S, Swamy G, Reddy KRL (2012) A novel copyright protection scheme based on visual secret sharing. In: Computing communication & networking technologies (ICCCNT), 2012 3rd international conference on. IEEE, pp 1–5
38.
Zurück zum Zitat Borra S, Swamy GN (2012) Digital image ownership verification based on spatial correlation of colors. In: IET conference on image processing, UK, pp. 1–5 Borra S, Swamy GN (2012) Digital image ownership verification based on spatial correlation of colors. In: IET conference on image processing, UK, pp. 1–5
39.
Zurück zum Zitat Chao H, Hsu C, Miaou S (2002) A data hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6:46–53CrossRef Chao H, Hsu C, Miaou S (2002) A data hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6:46–53CrossRef
40.
Zurück zum Zitat Fallahpour M, Megias D, Ghanbari M (2009) High capacity, reversible data hiding in medical images. In: 16th IEEE international conference on image processing (ICIP), pp. 4241–4244 Fallahpour M, Megias D, Ghanbari M (2009) High capacity, reversible data hiding in medical images. In: 16th IEEE international conference on image processing (ICIP), pp. 4241–4244
41.
Zurück zum Zitat Das S, Kundu M (2012) Effective management of medical information through a novel blind watermarking technique. J Med Syst 36(5):3339–3351CrossRef Das S, Kundu M (2012) Effective management of medical information through a novel blind watermarking technique. J Med Syst 36(5):3339–3351CrossRef
42.
Zurück zum Zitat Cheung S, Chiu D, Ho C (2008) The use of digital watermarking for intelligence multimedia document distribution. J Theoret Appl Electron Commer Res 3:103–118CrossRef Cheung S, Chiu D, Ho C (2008) The use of digital watermarking for intelligence multimedia document distribution. J Theoret Appl Electron Commer Res 3:103–118CrossRef
43.
Zurück zum Zitat Zhou W, Rockwood T, Sagetong P (2002) Non-repudiation oblivious watermarking scheme for secure digital video distribution. In: IEEE workshop on multimedia signal processing, pp. 343–346 Zhou W, Rockwood T, Sagetong P (2002) Non-repudiation oblivious watermarking scheme for secure digital video distribution. In: IEEE workshop on multimedia signal processing, pp. 343–346
44.
Zurück zum Zitat Fan Z, Hongbin Z (2004) Digital watermarking capacity and reliability. In: Proceedings of IEEE international conference on e-commerce technology, pp. 295–298 Fan Z, Hongbin Z (2004) Digital watermarking capacity and reliability. In: Proceedings of IEEE international conference on e-commerce technology, pp. 295–298
45.
Zurück zum Zitat Yu N, Cao l FW, Li X (2003) Practical analysis of watermarking capacity. Int Conf Commun Technol 2:1872–1877 Yu N, Cao l FW, Li X (2003) Practical analysis of watermarking capacity. Int Conf Commun Technol 2:1872–1877
46.
Zurück zum Zitat Wang Z, Bovik A (2004) Universal image quality index. J IEEE Signal Process Lett 9(3):84–88 Wang Z, Bovik A (2004) Universal image quality index. J IEEE Signal Process Lett 9(3):84–88
47.
Zurück zum Zitat Chakraborty S, Chatterjee S, Dey N, Ashour AS, Hassanien AE (2017) Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking. In: Intelligent techniques in signal processing for multimedia security. Springer International Publishing, Cham, pp 133–149CrossRef Chakraborty S, Chatterjee S, Dey N, Ashour AS, Hassanien AE (2017) Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking. In: Intelligent techniques in signal processing for multimedia security. Springer International Publishing, Cham, pp 133–149CrossRef
48.
Zurück zum Zitat Parah SA, Sheikh JA, Dey N, Bhat GM (2017) Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption. J Glob Inf Manag (JGIM) 25(4):80–102CrossRef Parah SA, Sheikh JA, Dey N, Bhat GM (2017) Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption. J Glob Inf Manag (JGIM) 25(4):80–102CrossRef
49.
Zurück zum Zitat Roy S, Pal A (2017) A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling. Multimed Tools Appl 76(3):3577–3616CrossRef Roy S, Pal A (2017) A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling. Multimed Tools Appl 76(3):3577–3616CrossRef
50.
Zurück zum Zitat Thakkar F, Srivastava V (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools Appl., Springer 76(3):3669–3697CrossRef Thakkar F, Srivastava V (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools Appl., Springer 76(3):3669–3697CrossRef
51.
Zurück zum Zitat Nagpal S, Bhushan S, Mahajan M (2016) An enhanced digital image watermarking scheme for medical images using neural network, DWT, and RSA. Int J Mod Edu Comput Sci 8(4):46–56CrossRef Nagpal S, Bhushan S, Mahajan M (2016) An enhanced digital image watermarking scheme for medical images using neural network, DWT, and RSA. Int J Mod Edu Comput Sci 8(4):46–56CrossRef
52.
Zurück zum Zitat Kishore P, Rao M, Prasad C, Kumar D (2016) Medical image watermarking: run through review. ARPN J Eng Appl Sci 11(5):2882–2899 Kishore P, Rao M, Prasad C, Kumar D (2016) Medical image watermarking: run through review. ARPN J Eng Appl Sci 11(5):2882–2899
53.
Zurück zum Zitat Mahmood A (2015) Adaptive approaches for medical imaging security. Ph.D. thesis, University of Guelph, Canada Mahmood A (2015) Adaptive approaches for medical imaging security. Ph.D. thesis, University of Guelph, Canada
54.
Zurück zum Zitat Singh A (2015) Some new techniques of improved wavelet domain watermarking for medical images. Ph.D. Thesis, NIT Kurukshetra Singh A (2015) Some new techniques of improved wavelet domain watermarking for medical images. Ph.D. Thesis, NIT Kurukshetra
55.
Zurück zum Zitat Venkatram N, Reddy L, Kishore P (2014, August) Blind medical image watermarking with LWT-SVD for telemedicine applications. WSEAS Trans Signal Process 10:288–300 Venkatram N, Reddy L, Kishore P (2014, August) Blind medical image watermarking with LWT-SVD for telemedicine applications. WSEAS Trans Signal Process 10:288–300
56.
Zurück zum Zitat Pal A, Dey N, Samanta S, Das A, Chaudhuri S (2013) A hybrid reversible watermarking technique for color biomedical images. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp. 1–6 Pal A, Dey N, Samanta S, Das A, Chaudhuri S (2013) A hybrid reversible watermarking technique for color biomedical images. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp. 1–6
57.
Zurück zum Zitat Dey N, Biswas D, Roy A, Das A, Chaudhuri S (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th international conference on intelligent systems design and applications (ISDA), pp. 680–685 Dey N, Biswas D, Roy A, Das A, Chaudhuri S (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th international conference on intelligent systems design and applications (ISDA), pp. 680–685
58.
Zurück zum Zitat Dey N, Das P, Roy A, Das A, Chaudhuri S (2012) DWT-DCT-SVD based intravascular ultrasound video watermarking. In: 2012 world congress on information and communication technologies (WICT), pp. 224–229 Dey N, Das P, Roy A, Das A, Chaudhuri S (2012) DWT-DCT-SVD based intravascular ultrasound video watermarking. In: 2012 world congress on information and communication technologies (WICT), pp. 224–229
59.
Zurück zum Zitat Rathi S, Inamdar V (2012) Medical images authentication through watermarking preserving ROI. Health Inf An Int J 1(1):27–42 Rathi S, Inamdar V (2012) Medical images authentication through watermarking preserving ROI. Health Inf An Int J 1(1):27–42
Metadaten
Titel
Introduction
verfasst von
Rohit Thanki
Surekha Borra
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-93311-5_1