메뉴 건너뛰기




Volumn 47, Issue , 2016, Pages 160-169

A crypto-watermarking system for ensuring reliability control and traceability of medical images

Author keywords

Decryption; Medical image; Reliability; Security; Traceability; Watermarking

Indexed keywords

CRYPTOGRAPHY; DIGITAL WATERMARKING; MEDICAL IMAGING; RELIABILITY; WATERMARKING;

EID: 84976321913     PISSN: 09235965     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.image.2016.05.021     Document Type: Article
Times cited : (41)

References (35)
  • 1
    • 78751704723 scopus 로고    scopus 로고
    • Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records
    • [1] Quantin, C., Jaquet-Chiffelle, D.O., Coatrieux, G., Benzenine, E., Allaërt, F.A., Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records. Int. J. Med. Inform. 80:2 (2011), 6–11.
    • (2011) Int. J. Med. Inform. , vol.80 , Issue.2 , pp. 6-11
    • Quantin, C.1    Jaquet-Chiffelle, D.O.2    Coatrieux, G.3    Benzenine, E.4    Allaërt, F.A.5
  • 2
    • 84945449361 scopus 로고    scopus 로고
    • A teleassistance protocol based on joint watermarking-encryption evidence for identification of liabilities in case of litigation
    • [2] Bouslimi, D., Coatrieux, G., Quantin, C., Allaërt, F.-A., Cozic, M., Roux, Ch, A teleassistance protocol based on joint watermarking-encryption evidence for identification of liabilities in case of litigation. Innov. Res. Biomed. Eng. 36:5 (2015), 279–286.
    • (2015) Innov. Res. Biomed. Eng. , vol.36 , Issue.5 , pp. 279-286
    • Bouslimi, D.1    Coatrieux, G.2    Quantin, C.3    Allaërt, F.-A.4    Cozic, M.5    Roux, C.6
  • 3
    • 84866611349 scopus 로고    scopus 로고
    • A joint encryption/watermarking system for verifying the reliability of medical images
    • [3] Bouslimi, D., Coatrieux, G., Cozic, M., Roux, C., A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Trans. Inf. Technol. Biomed. 16 (2012), 891–899.
    • (2012) IEEE Trans. Inf. Technol. Biomed. , vol.16 , pp. 891-899
    • Bouslimi, D.1    Coatrieux, G.2    Cozic, M.3    Roux, C.4
  • 5
    • 33746967065 scopus 로고    scopus 로고
    • Secure and efficient health data management through multiple watermarking on medical images
    • [5] Giakoumaki, A., Pavlopoulos, S., Koutsouris, D., Secure and efficient health data management through multiple watermarking on medical images. Med. Biol. Eng. Comput. 44:8 (2006), 619–631.
    • (2006) Med. Biol. Eng. Comput. , vol.44 , Issue.8 , pp. 619-631
    • Giakoumaki, A.1    Pavlopoulos, S.2    Koutsouris, D.3
  • 6
    • 84872116919 scopus 로고    scopus 로고
    • Reversible watermarking based on invariant image classification and dynamical error histogram shifting
    • [6] Coatrieux, G., Pan, W., Montagner, J., Cuppens, N., Cuppens, F., Roux, C., Reversible watermarking based on invariant image classification and dynamical error histogram shifting. IEEE Trans. Inf. Forensics Secur. 8:1 (2013), 111–120.
    • (2013) IEEE Trans. Inf. Forensics Secur. , vol.8 , Issue.1 , pp. 111-120
    • Coatrieux, G.1    Pan, W.2    Montagner, J.3    Cuppens, N.4    Cuppens, F.5    Roux, C.6
  • 7
    • 84976279012 scopus 로고    scopus 로고
    • Multiple watermark method for privacy control and tamper detection in medical images, in: Proceedings of the APRS Workshop on Digital Image Computing, Australia, 2005, pp. 59–64.
    • [7] C.-S. Woo, J. Du, B. Pham, Multiple watermark method for privacy control and tamper detection in medical images, in: Proceedings of the APRS Workshop on Digital Image Computing, Australia, 2005, pp. 59–64.
    • Woo, C.-S.1    Du, J.2    Pham, B.3
  • 9
    • 51349140801 scopus 로고    scopus 로고
    • Analyzing the secure and energy efficient transmissions of compressed fingerprint images using encryption and watermarking, in: Proceedings of International Conference on Information Security and Assurance, 2008, pp. 316–320.
    • [9] H. Seungwoo, K. Hakjae, L. Sungju, C. Yongwha, Analyzing the secure and energy efficient transmissions of compressed fingerprint images using encryption and watermarking, in: Proceedings of International Conference on Information Security and Assurance, 2008, pp. 316–320.
    • Seungwoo, H.1    Hakjae, K.2    Sungju, L.3    Yongwha, C.4
  • 10
    • 84892526118 scopus 로고    scopus 로고
    • Digital image security improvement by integrating watermarking and encryption technique, in: Proceedings of IEEE International Conference on Signal Processing, Computing and Control (ISPCC), Solan, September 2013, pp. 1–6.
    • [10] S.P. Metkar, M.V. Lichade, Digital image security improvement by integrating watermarking and encryption technique, in: Proceedings of IEEE International Conference on Signal Processing, Computing and Control (ISPCC), Solan, September 2013, pp. 1–6.
    • Metkar, S.P.1    Lichade, M.V.2
  • 11
    • 84960158497 scopus 로고    scopus 로고
    • On secure image transmission combining chaotic encryption and watermarking using dead beat synchronization of 4D Henon maps, in: Proceedings of the 3rd International Conference on Control, Engineering & Information Technology (CEIT), May 2015, pp. 1–4.
    • [11] N. Khalifa, R. L. Filali, M. Benrejeb, On secure image transmission combining chaotic encryption and watermarking using dead beat synchronization of 4D Henon maps, in: Proceedings of the 3rd International Conference on Control, Engineering & Information Technology (CEIT), May 2015, pp. 1–4.
    • Khalifa, N.1    Filali, R.L.2    Benrejeb, M.3
  • 12
    • 0035307977 scopus 로고    scopus 로고
    • A buyer-seller watermarking protocol
    • [12] Memon, N.D., Wong, P.W., A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10:4 (2001), 643–649.
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.4 , pp. 643-649
    • Memon, N.D.1    Wong, P.W.2
  • 14
    • 42949161065 scopus 로고    scopus 로고
    • A reversible data hiding method for encrypted images, in: Proceedings of SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, p. 68191E.
    • [14] W. Puech, M. Chaumont, O. Strauss, A reversible data hiding method for encrypted images, in: Proceedings of SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, p. 68191E.
    • Puech, W.1    Chaumont, M.2    Strauss, O.3
  • 15
    • 84863379693 scopus 로고    scopus 로고
    • Separable reversible data hiding in encrypted image
    • [15] Zhang, X., Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7:2 (2012), 826–832.
    • (2012) IEEE Trans. Inf. Forensics Secur. , vol.7 , Issue.2 , pp. 826-832
    • Zhang, X.1
  • 16
    • 84927666715 scopus 로고    scopus 로고
    • Ch. Roux, An a priori and a posteriori protection by means of data hiding of encrypted images: application to ultrasound images, in: Proceedings of International Conference on Health Informatics (ICHI), Vilamoura, Portugal, Vol. 42, November 2013, pp. 220-223.
    • [16] D. Bouslimi, G. Coatrieux, M. Cozic, Ch. Roux, An a priori and a posteriori protection by means of data hiding of encrypted images: application to ultrasound images, in: Proceedings of International Conference on Health Informatics (ICHI), Vilamoura, Portugal, Vol. 42, November 2013, pp. 220-223.
    • Bouslimi, D.1    Coatrieux, G.2    Cozic, M.3
  • 17
    • 84928975189 scopus 로고    scopus 로고
    • High capacity reversible data hiding in encrypted images by patch-level sparse representation
    • [17] Cao, X., Du, L., Wei, X., Meng, D., Guo, X., High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern., 46(5), 2015.
    • (2015) IEEE Trans. Cybern. , vol.46 , Issue.5
    • Cao, X.1    Du, L.2    Wei, X.3    Meng, D.4    Guo, X.5
  • 18
    • 84875018020 scopus 로고    scopus 로고
    • Reversible data hiding in encrypted images by reserving room before encryption
    • [18] Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F., Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8:3 (2013), 553–562.
    • (2013) IEEE Trans. Inf. Forensics Secur. , vol.8 , Issue.3 , pp. 553-562
    • Ma, K.1    Zhang, W.2    Zhao, X.3    Yu, N.4    Li, F.5
  • 19
    • 84880868167 scopus 로고    scopus 로고
    • Reversibility improved data hiding in encrypted images
    • [19] Zhang, W., Ma, K., Yu, N., Reversibility improved data hiding in encrypted images. Signal Process. 94 (2014), 118–127.
    • (2014) Signal Process. , vol.94 , pp. 118-127
    • Zhang, W.1    Ma, K.2    Yu, N.3
  • 20
    • 43949118608 scopus 로고    scopus 로고
    • A survey of homomorphic encryption for nonspecialists
    • [20] Fontaine, C., Galand, F., A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007:1 (2007), 1–15.
    • (2007) EURASIP J. Inf. Secur. , vol.2007 , Issue.1 , pp. 1-15
    • Fontaine, C.1    Galand, F.2
  • 21
    • 84947921901 scopus 로고    scopus 로고
    • Chameleon – a new kind of stream cipher, in: Proceedings of the 4th International Workshop on Fast Software Encryption, Vol. 1267, 1997, pp. 107–113.
    • [21] R. Anderson, C. Manifavas, Chameleon – a new kind of stream cipher, in: Proceedings of the 4th International Workshop on Fast Software Encryption, Vol. 1267, 1997, pp. 107–113.
    • Anderson, R.1    Manifavas, C.2
  • 23
    • 34547554409 scopus 로고    scopus 로고
    • M. van der Veen, Secure embedding of spread spectrum watermarks using look-up-tables, in: Proceedings of the International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hawaii, USA, Vol. 2, April 2007, pp. 153–156.
    • [23] M. Celik, A.N. Lemma, S. Katzenbeisser, M. van der Veen, Secure embedding of spread spectrum watermarks using look-up-tables, in: Proceedings of the International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hawaii, USA, Vol. 2, April 2007, pp. 153–156.
    • Celik, M.1    Lemma, A.N.2    Katzenbeisser, S.3
  • 24
    • 84905234288 scopus 로고    scopus 로고
    • TTP-free asymmetric fingerprinting protocol based on client side embedding, in: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, May 2014, pp. 3987–3991.
    • [24] T. Bianchi, A. Piva, TTP-free asymmetric fingerprinting protocol based on client side embedding, in: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, May 2014, pp. 3987–3991.
    • Bianchi, T.1    Piva, A.2
  • 25
    • 84900869831 scopus 로고    scopus 로고
    • A joint fed watermarking system using spatial fusion for verifying the security issues of teleradiology
    • [25] Viswanathan, P., Krishna, P.V., A joint fed watermarking system using spatial fusion for verifying the security issues of teleradiology. IEEE J. Biomed. Health Inf. 18:3 (2014), 753–764.
    • (2014) IEEE J. Biomed. Health Inf. , vol.18 , Issue.3 , pp. 753-764
    • Viswanathan, P.1    Krishna, P.V.2
  • 26
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: a class of provably good methods for digital watermarking and information embedding
    • [26] Chen, B., Wornell, G.W., Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47:4 (2001), 1423–1443.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 27
    • 77951595347 scopus 로고    scopus 로고
    • Medical image integrity control combining digital signature and lossless watermarking
    • [27] Pan, W., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, Ch, Medical image integrity control combining digital signature and lossless watermarking. Lect. Notes Comput. Sci. 5939 (2010), 153–162.
    • (2010) Lect. Notes Comput. Sci. , vol.5939 , pp. 153-162
    • Pan, W.1    Coatrieux, G.2    Cuppens-Boulahia, N.3    Cuppens, F.4    Roux, C.5
  • 28
    • 44049086946 scopus 로고    scopus 로고
    • Capacity bounds and rate-distortion-analysis in dither vector QIM watermarkingwith JPEG and JPEG2000 Attack, in: Proceedings of the 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, 2006, pp. 766–770.
    • [28] Y. Xiang, M. Salehi, Capacity bounds and rate-distortion-analysis in dither vector QIM watermarkingwith JPEG and JPEG2000 Attack, in: Proceedings of the 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, 2006, pp. 766–770.
    • Xiang, Y.1    Salehi, M.2
  • 29
    • 0038447029 scopus 로고    scopus 로고
    • Optimal probabilistic fingerprint codes, in: Proceedings of the Thirty-fifth Annual ACM Symposium on Theory of Computing (STOC), 2003, pp. 116–125.
    • [29] G. Tardos, Optimal probabilistic fingerprint codes, in: Proceedings of the Thirty-fifth Annual ACM Symposium on Theory of Computing (STOC), 2003, pp. 116–125.
    • Tardos, G.1
  • 30
    • 0028495791 scopus 로고
    • Near-lossless compression of medical images through entropy coded DPCM
    • [30] Chen, K., Ramabadran, T.V., Near-lossless compression of medical images through entropy coded DPCM. IEEE Trans. Med. Imaging, 1994.
    • (1994) IEEE Trans. Med. Imaging
    • Chen, K.1    Ramabadran, T.V.2
  • 31
    • 0642305414 scopus 로고    scopus 로고
    • Is digital image compression acceptable within diabetic retinopathy screening?
    • [31] Basu, A., Kamal, A.D., Illahi, W., Khan, M., Stavrou, P., Ryder, R.E.J., Is digital image compression acceptable within diabetic retinopathy screening?. Diabet. Med. 20 (2003), 766–771.
    • (2003) Diabet. Med. , vol.20 , pp. 766-771
    • Basu, A.1    Kamal, A.D.2    Illahi, W.3    Khan, M.4    Stavrou, P.5    Ryder, R.E.J.6
  • 32
    • 79952539535 scopus 로고    scopus 로고
    • Watermarking to enforce medical image access and usage control policy, in: Proceedings of Signal-Image Technology and Internet-Based Systems (SITIS), Kuala Lampur, Malaysia, December 2010, pp. 251–260.
    • [32] W. Pan, G. Coatrieux, N. Cuppens-Boulahia, F. Cuppens, C. Roux, Watermarking to enforce medical image access and usage control policy, in: Proceedings of Signal-Image Technology and Internet-Based Systems (SITIS), Kuala Lampur, Malaysia, December 2010, pp. 251–260.
    • Pan, W.1    Coatrieux, G.2    Cuppens-Boulahia, N.3    Cuppens, F.4    Roux, C.5
  • 33
    • 84979950600 scopus 로고    scopus 로고
    • A new crypto-watermarking method for medical images safe transfer, in: Proceedings of the 12th European Signal Processing Conference (EUSIPCO'04), Vienna, Austria, September 2004, pp. 1481–1484.
    • [33] W. Puech, J.M. Rodrigues, A new crypto-watermarking method for medical images safe transfer, in: Proceedings of the 12th European Signal Processing Conference (EUSIPCO'04), Vienna, Austria, September 2004, pp. 1481–1484.
    • Puech, W.1    Rodrigues, J.M.2
  • 34
    • 84905234288 scopus 로고    scopus 로고
    • TTP-free asymmetric fingerprinting protocol based on client side embedding, in: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2014, pp. 3987–3991.
    • [34] T. Bianchi, A. Piva, TTP-free asymmetric fingerprinting protocol based on client side embedding, in: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2014, pp. 3987–3991.
    • Bianchi, T.1    Piva, A.2
  • 35
    • 84976301208 scopus 로고    scopus 로고
    • Lecture notes on cryptography, Summer Course “Cryptography and Computer security”, MIT, Vol. 1999, 1996.
    • [35] S. Goldwasser, M. Bellare, Lecture notes on cryptography, Summer Course “Cryptography and Computer security”, MIT, Vol. 1999, 1996.
    • Goldwasser, S.1    Bellare, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.