Research Article
BibTex RIS Cite

TIBBİ GÖRÜNTÜLERİN GÜVENLİĞİ İÇİN İLGİ OLMAYAN BÖLGELERDE KENAR TABANLI DAMGALAMA

Year 2021, Volume: 8 Issue: 14, 154 - 168, 30.06.2021

Abstract

Son yıllarda, hastaların kişisel kayıtlarının güvenliği, tıbbi görüntülerde damgalama teknikleri kullanılarak sağlanmaktadır. Damgalama işleminin tanı ve tedaviyi etkilememesi için gizleme işlemi görüntülerdeki ilgi olmayan bölgelerde gerçekleştirilmelidir. Bu çalışmada, tıbbi görüntülerin dosya başlık kısmında yer alan hasta kişisel bilgileri ve radyoloji raporlarından oluşan gizli mesajı saldırılara karşı koruyan kör olmayan kenar tabanlı damgalama sistemi önerilmektedir. AES-256 ile şifrelenen gizli mesaj, taşıyıcı görüntülerin histogram istatistiği yöntemiyle tespit edilen ilgi olmayan bölgelerdeki piksellere yerleştirilerek görüntüye dönüştürülmüştür. Mesaj ve taşıyıcı görüntülerin Ayrık Dalgacık Dönüşümü ve Tekil Değer Ayrışımıyla bulunan tekil değerleri birleştirilerek damgalama gerçekleştirilmiştir. Çalışmada 402944 bit veri gizlenmesi sonrasında sinyalin tepe değerinin gürültüye oranı 68,33 dB olarak bulunmuştur. Medikal görüntü güvenliği için önerilen ilgi olmayan bölgelerde kenar tabanlı damgalama tekniği yüksek kapasiteli, farkedilmez ve saldırılara karşı dayanıklıdır.

References

  • [1] Karakış R, Güler İ, Çapraz İ, Bilir E. A novel fuzzy logic-based image steganography method to ensure medical data security. Computers in Biology and Medicine 2015; 67: 172-183. [2] Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R. Relevance of watermarking in medical ımaging, ınformation technology applications in biomedicine. Proceedings. 2000 IEEE EMBS International Conference on, 2000; 250-255.
  • [3] Nyeem H, Boles W, Boyd, C. A Review of Medical Image Watermarking Requirements for Teleradiology, J. Digit. Imaging 2013; 26: 326-343.
  • [4] Coatrieux G, Lecornu L, Sankur B, Roux C. A Review of Image Watermarking Applications in Healthcare. Engineering in Medicine and Biology Society 2006, EMBS '06. 28th Annual International Conference of the IEEE 2006; 4691-4694.
  • [5] Haidekker M. Image Storage, Transport, and Compression. Wiley-IEEE Press, Edition. 2001; 1: 386-412.
  • [6] Kuang L-Q, Zhang Y, Han X. Watermarking Image Authentication in Hospital Information System. Information Engineering and Computer Science 2009. ICIECS 2009; 1-4.
  • [7] Navas KA, Sasikumar M. Survey of Medical Image Watermarking Algorithms. SETIT 2007 4rth International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, TUNISIA 2007; 1-6.
  • [8] Karakis R, Guler I. Steganography and Medical Data Security, Cryptographic and Information Security Approaches for Images and Videos (Ed. S. Ramakrishnan, CRC Press, ISBN 9781138563841; 2018.
  • [9] Golpira H, Danyali H. Reversible blind watermarking for medical images based on wavelet histogram shifting. IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) 2010; 31–36.
  • [10] Fallahpour M, Megias D, Ghanbari M. Reversible and high-capacity data hiding in medical images. Image Processing, IET 2011; 5 (2): 190-197.
  • [11] Raul R-C, Claudia F-U, Trinidad-Bias GJ. Data Hiding Scheme for Medical Images. Electronics, Communications and Computers, 2007. CONIELECOMP '07. 17th International Conference on, 2007; 32-37.
  • [12] Ravali K, Kumar AP, Asadi S. Carrying Digital Watermarking for Medical Images using Mobile Devices, IJCSET 2011; 1(7): 366-369.
  • [13] Joshi I, Pawar VN. Secure Medical Image Watermarking. International Journal of Research in Advent Technology 2014; 2(42): 266-42.
  • [14] Mavudila R, Masmoudi Lh, Cherkaoui M, Hamri M, Hassanain N. Medical Image Watermarking Based on M-band Wavelet Transform. International Journal of Modern Engineering Research (IJMER) 2012; 2(4): 2711-2718.
  • [15] Giakoumaki A, Perakis K, Banitsas K, Giokas K, Tachakra S, Koutsouris D. Using Digital Watermarking to Enhance Security in Wireless Medical Image Transmission. Telemedicine and E-Health 2010; 16(3): 306-313.
  • [16] Jiao S, Goutte R. Secure Transfer of Identification Information in Medical Images by Steganocryptography. Int. J. Communications, Network and System Sciences 2010; 3: 801-804.
  • [17] Giakoumaki A, Pavlopoulos S, Koutsouris D. Secure and efficient health data management through multiple watermarking on medical images. Med Bio Eng Comput 2006; 44: 619-631.
  • [18] Nambakhsh MS, Ahmadian A, Zaidi H (2011). A contextual based double watermarking of PET images by patient ID and ECG signal. Computer Methods and Programs in Biomedicine 2011; 104 (3): 418-425.
  • [19] Nambakhsh MS, Ahmadian A, Ghavami M, Dilmaghani RS, Karimi-Fard S. A Novel Blind Watermarking of ECG Signals on Medical Images Using EZW Algorithm. Proceedings of the 28th IEEE-EMBS Annual International Conference New York City, USA, 2006; 3274-3277.
  • [20] Acharya UR, Niranjan UC, Iyengar SS, Kannathal N, Min LC. Simultaneous Storage of Patient Information with Medical Images in the Frequency Domain. Computer Methods and Programs in Biomedicine 2004; 76(1): 13-19.
  • [21] Üstübioğlu A, Ulutaş G, Üstübioğlu B. Watermarking medical images with IDWT-FWHT. 2018 26th Signal Processing and Communications Applications Conference (SIU), Izmir, 2018,1-4.
  • [22] Bamal R, Kasana SS. Dual hybrid medical watermarking using walsh-slantlet transform. Multimed Tools Appl 2019; 78:17899-17927.
  • [23] Zermi N, Khaldi A, Kafi R, Kahlessenane F, Euschi, S. A DWT-SVD based robust digital watermarking for medical image security. Forensic Science International 2021; 320: 110691.
  • [24] Fares K, Khaldi A, Redouane K, Salah E, DCT & DWT based watermarking scheme for medical information security. Biomedical Signal Processing and Control 2021; 66: 102403.
  • [25] Karakis R, Gurkahraman K, Cigdem B, Oztoprak I, Topaktas AS. Hiding Patient Information into Magnetic Resonance Images Using DNA Based Wavelet Transform. The Conferences of International Journal of Arts & Sciences’ (IJAS) Montreal-Canada, Academic Journal of Science, CD-ROM. ISSN: 2165-6282., 2018; 08 (02): 161-170.
  • [26] Karakis R, Gurkahraman K, Cigdem B, Oztoprak I, Topaktas AS. Evaluation of Segmented Brain Regions for Medical Image Steganography. Journal of the Faculty of Engineering and Architecture of Gazi University 2021, Accepted.
  • [27] Gonzales R, Woods RE. Digital Image Processing, Pearson Prentice Hall, USA, 2008.
  • [28] Desai SS, Chavan MS. Comparative Analysis of Singular Value Decomposition (SVD) and Wavelet Difference Reduction (WDR) based Image Compression. International Journal of Engineering Research and Technology 2017; 10(1): 491-496.

EDGE-BASED WATERMARKING IN REGIONS OF NONE INTEREST FOR THE SECURITY OF MEDICAL IMAGES

Year 2021, Volume: 8 Issue: 14, 154 - 168, 30.06.2021

Abstract

References

  • [1] Karakış R, Güler İ, Çapraz İ, Bilir E. A novel fuzzy logic-based image steganography method to ensure medical data security. Computers in Biology and Medicine 2015; 67: 172-183. [2] Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R. Relevance of watermarking in medical ımaging, ınformation technology applications in biomedicine. Proceedings. 2000 IEEE EMBS International Conference on, 2000; 250-255.
  • [3] Nyeem H, Boles W, Boyd, C. A Review of Medical Image Watermarking Requirements for Teleradiology, J. Digit. Imaging 2013; 26: 326-343.
  • [4] Coatrieux G, Lecornu L, Sankur B, Roux C. A Review of Image Watermarking Applications in Healthcare. Engineering in Medicine and Biology Society 2006, EMBS '06. 28th Annual International Conference of the IEEE 2006; 4691-4694.
  • [5] Haidekker M. Image Storage, Transport, and Compression. Wiley-IEEE Press, Edition. 2001; 1: 386-412.
  • [6] Kuang L-Q, Zhang Y, Han X. Watermarking Image Authentication in Hospital Information System. Information Engineering and Computer Science 2009. ICIECS 2009; 1-4.
  • [7] Navas KA, Sasikumar M. Survey of Medical Image Watermarking Algorithms. SETIT 2007 4rth International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, TUNISIA 2007; 1-6.
  • [8] Karakis R, Guler I. Steganography and Medical Data Security, Cryptographic and Information Security Approaches for Images and Videos (Ed. S. Ramakrishnan, CRC Press, ISBN 9781138563841; 2018.
  • [9] Golpira H, Danyali H. Reversible blind watermarking for medical images based on wavelet histogram shifting. IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) 2010; 31–36.
  • [10] Fallahpour M, Megias D, Ghanbari M. Reversible and high-capacity data hiding in medical images. Image Processing, IET 2011; 5 (2): 190-197.
  • [11] Raul R-C, Claudia F-U, Trinidad-Bias GJ. Data Hiding Scheme for Medical Images. Electronics, Communications and Computers, 2007. CONIELECOMP '07. 17th International Conference on, 2007; 32-37.
  • [12] Ravali K, Kumar AP, Asadi S. Carrying Digital Watermarking for Medical Images using Mobile Devices, IJCSET 2011; 1(7): 366-369.
  • [13] Joshi I, Pawar VN. Secure Medical Image Watermarking. International Journal of Research in Advent Technology 2014; 2(42): 266-42.
  • [14] Mavudila R, Masmoudi Lh, Cherkaoui M, Hamri M, Hassanain N. Medical Image Watermarking Based on M-band Wavelet Transform. International Journal of Modern Engineering Research (IJMER) 2012; 2(4): 2711-2718.
  • [15] Giakoumaki A, Perakis K, Banitsas K, Giokas K, Tachakra S, Koutsouris D. Using Digital Watermarking to Enhance Security in Wireless Medical Image Transmission. Telemedicine and E-Health 2010; 16(3): 306-313.
  • [16] Jiao S, Goutte R. Secure Transfer of Identification Information in Medical Images by Steganocryptography. Int. J. Communications, Network and System Sciences 2010; 3: 801-804.
  • [17] Giakoumaki A, Pavlopoulos S, Koutsouris D. Secure and efficient health data management through multiple watermarking on medical images. Med Bio Eng Comput 2006; 44: 619-631.
  • [18] Nambakhsh MS, Ahmadian A, Zaidi H (2011). A contextual based double watermarking of PET images by patient ID and ECG signal. Computer Methods and Programs in Biomedicine 2011; 104 (3): 418-425.
  • [19] Nambakhsh MS, Ahmadian A, Ghavami M, Dilmaghani RS, Karimi-Fard S. A Novel Blind Watermarking of ECG Signals on Medical Images Using EZW Algorithm. Proceedings of the 28th IEEE-EMBS Annual International Conference New York City, USA, 2006; 3274-3277.
  • [20] Acharya UR, Niranjan UC, Iyengar SS, Kannathal N, Min LC. Simultaneous Storage of Patient Information with Medical Images in the Frequency Domain. Computer Methods and Programs in Biomedicine 2004; 76(1): 13-19.
  • [21] Üstübioğlu A, Ulutaş G, Üstübioğlu B. Watermarking medical images with IDWT-FWHT. 2018 26th Signal Processing and Communications Applications Conference (SIU), Izmir, 2018,1-4.
  • [22] Bamal R, Kasana SS. Dual hybrid medical watermarking using walsh-slantlet transform. Multimed Tools Appl 2019; 78:17899-17927.
  • [23] Zermi N, Khaldi A, Kafi R, Kahlessenane F, Euschi, S. A DWT-SVD based robust digital watermarking for medical image security. Forensic Science International 2021; 320: 110691.
  • [24] Fares K, Khaldi A, Redouane K, Salah E, DCT & DWT based watermarking scheme for medical information security. Biomedical Signal Processing and Control 2021; 66: 102403.
  • [25] Karakis R, Gurkahraman K, Cigdem B, Oztoprak I, Topaktas AS. Hiding Patient Information into Magnetic Resonance Images Using DNA Based Wavelet Transform. The Conferences of International Journal of Arts & Sciences’ (IJAS) Montreal-Canada, Academic Journal of Science, CD-ROM. ISSN: 2165-6282., 2018; 08 (02): 161-170.
  • [26] Karakis R, Gurkahraman K, Cigdem B, Oztoprak I, Topaktas AS. Evaluation of Segmented Brain Regions for Medical Image Steganography. Journal of the Faculty of Engineering and Architecture of Gazi University 2021, Accepted.
  • [27] Gonzales R, Woods RE. Digital Image Processing, Pearson Prentice Hall, USA, 2008.
  • [28] Desai SS, Chavan MS. Comparative Analysis of Singular Value Decomposition (SVD) and Wavelet Difference Reduction (WDR) based Image Compression. International Journal of Engineering Research and Technology 2017; 10(1): 491-496.
There are 27 citations in total.

Details

Primary Language Turkish
Subjects Engineering
Journal Section Makaleler
Authors

Rukiye Karakış 0000-0002-1797-3461

Kali Gurkahraman 0000-0002-0697-125X

Publication Date June 30, 2021
Submission Date April 18, 2021
Published in Issue Year 2021 Volume: 8 Issue: 14

Cite

APA Karakış, R., & Gurkahraman, K. (2021). TIBBİ GÖRÜNTÜLERİN GÜVENLİĞİ İÇİN İLGİ OLMAYAN BÖLGELERDE KENAR TABANLI DAMGALAMA. Adıyaman Üniversitesi Mühendislik Bilimleri Dergisi, 8(14), 154-168.
AMA Karakış R, Gurkahraman K. TIBBİ GÖRÜNTÜLERİN GÜVENLİĞİ İÇİN İLGİ OLMAYAN BÖLGELERDE KENAR TABANLI DAMGALAMA. Adıyaman Üniversitesi Mühendislik Bilimleri Dergisi. June 2021;8(14):154-168.
Chicago Karakış, Rukiye, and Kali Gurkahraman. “TIBBİ GÖRÜNTÜLERİN GÜVENLİĞİ İÇİN İLGİ OLMAYAN BÖLGELERDE KENAR TABANLI DAMGALAMA”. Adıyaman Üniversitesi Mühendislik Bilimleri Dergisi 8, no. 14 (June 2021): 154-68.
EndNote Karakış R, Gurkahraman K (June 1, 2021) TIBBİ GÖRÜNTÜLERİN GÜVENLİĞİ İÇİN İLGİ OLMAYAN BÖLGELERDE KENAR TABANLI DAMGALAMA. Adıyaman Üniversitesi Mühendislik Bilimleri Dergisi 8 14 154–168.
IEEE R. Karakış and K. Gurkahraman, “TIBBİ GÖRÜNTÜLERİN GÜVENLİĞİ İÇİN İLGİ OLMAYAN BÖLGELERDE KENAR TABANLI DAMGALAMA”, Adıyaman Üniversitesi Mühendislik Bilimleri Dergisi, vol. 8, no. 14, pp. 154–168, 2021.
ISNAD Karakış, Rukiye - Gurkahraman, Kali. “TIBBİ GÖRÜNTÜLERİN GÜVENLİĞİ İÇİN İLGİ OLMAYAN BÖLGELERDE KENAR TABANLI DAMGALAMA”. Adıyaman Üniversitesi Mühendislik Bilimleri Dergisi 8/14 (June 2021), 154-168.
JAMA Karakış R, Gurkahraman K. TIBBİ GÖRÜNTÜLERİN GÜVENLİĞİ İÇİN İLGİ OLMAYAN BÖLGELERDE KENAR TABANLI DAMGALAMA. Adıyaman Üniversitesi Mühendislik Bilimleri Dergisi. 2021;8:154–168.
MLA Karakış, Rukiye and Kali Gurkahraman. “TIBBİ GÖRÜNTÜLERİN GÜVENLİĞİ İÇİN İLGİ OLMAYAN BÖLGELERDE KENAR TABANLI DAMGALAMA”. Adıyaman Üniversitesi Mühendislik Bilimleri Dergisi, vol. 8, no. 14, 2021, pp. 154-68.
Vancouver Karakış R, Gurkahraman K. TIBBİ GÖRÜNTÜLERİN GÜVENLİĞİ İÇİN İLGİ OLMAYAN BÖLGELERDE KENAR TABANLI DAMGALAMA. Adıyaman Üniversitesi Mühendislik Bilimleri Dergisi. 2021;8(14):154-68.