Data Activity in Homomorphically Encrypted Medical Pictures for Corroboratory their Reliableness in Each EnCrypted and Special Domains

Authors(2) :-Yadavalli Gopi, Shaik Dil Bahar

In this paper, we propose another plan of information stowing away of encoded pictures with the end goal of checking the unwavering quality of a picture into both scrambled and spatial spaces. This plan couples the Quantization Index Modulation (QIM) and the Parlier cryptosystem. It depends on the inclusion of the picture, before its encryption, of a predefined watermark, a "pre-watermark". Message addition (resp. extraction) is directed into (resp. from) the scrambled picture utilizing an adjusted form of QIM. It is the effect of this inclusion procedure onto the "pre-watermark" that offers access to the message in the spatial space, i.e. after the picture has been decoded. With our plan, encryption/unscrambling forms are very autonomous of message implanting/extraction. One does not have to know the encryption/unscrambling key for concealing a message into the encoded picture. Analyses led on ultrasound medicinal pictures demonstrate that the picture bending is low while offering a high limit that can bolster distinctive watermarking based security destinations.

Authors and Affiliations

Yadavalli Gopi
Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India
Shaik Dil Bahar
Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India

Watermarking, Encryption, Distortion, Reliability, Biomedicalimaging,Biomedicaltrasonics, Cryptography, Medical Image Processing, Security of Data

  1. Allaert FA, Weinberg D, Dusserre P, Yvon PJ, Dusserre L, Retaillau B, et al. Evaluation of an international telepathology system between Boston (USA) and Dijon: glass slides versus telediagnostic television monitor. J Telemed Telecare 1996;2(Suppl 1):27-30.
  2. Decret n 2010-1229 du 19 octobre 2010 relatif a la telemedecine.
  3. Allaert A, Quantin C. Responsabilites et remunerations des actes de tele-expertise. J Gest Econ Med 2012;30(4):219-29.
  4. Coatrieux G, Quantin C, Allaert FA, Auverlot B, Roux Ch. Watermarking - a new way to bring evidence in case of telemedicine litigation. Stud Health Technol Inform 2011;169:611-5.
  5. Coatrieux G, Maître H, Sankur B, Rolland Y, Collorec R. Relevance of watermarking in medical imaging. In: Proc. IEEE-EMBS int. conf. on information technology applications in biomedicine. 2000. p. 250-5.
  6. Bouslimi D, Coatrieux G, Roux Ch. A joint watermarking/encryption al-gorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains. In: Proc. int. conf. IEEE-EMBC. 2011. p. 8066-9.
  7. Rajendra Acharya U, Niranjan UC, Iyengar SS, Kannathal N, Min LC. Simultaneous storage of patient information with medical images in the frequency domain. Comput Methods Programs Biomed 2004;76:13-9.
  8. Loytynoja M, Cvejic N, Lahetkangas E, Seppanen T. Audio encryption using fragile watermarking. In: Proc. fifth international conference on in-formation, communications and signal processing. 2005. p. 881-5.
  9. Seungwoo H, Hakjae K, Sungju L, Yongwha C. Analyzing the secure and energy efficient transmissions of compressed fingerprint images using en-cryption and watermarking. In: International conference on information security and assurance. 2008. p. 316-20.
  10. Memon ND, Wong PW. A buyer-seller watermarking protocol. IEEE Trans Image Process 2001;10(4):643-9.
  11. Charpentier A, Fontaine C, Furon T, Cox I. An asymmetric fingerprint-ing scheme based on Tardos codes. In: 13th international conference on information hiding, vol. 6958. 2011. p. 43-58.
  12. Rial A, Deng M, Bianchi T, Piva A, Preneel B. A provably secure anony-mous buyer-seller watermarking protocol. IEEE Trans Inf Forensics Secur 2010;5(4):920-31.
  13. Anderson R, Manifavas C. Chameleon - a new kind of stream cipher. In: Proceedings of the 4th international workshop on fast software encryption, vol. 1267. 1997. p. 107-13.
  14. Piva A, Bianchi T, De Rosa A. Secure client-side ST-DM watermark em-bedding. IEEE Trans Inf Forensics Secur 2010;5(1):13-26.
  15. Celik M, Lemma AN, Katzenbeisser S, van der Veen M. Secure em-bedding of spread spectrum watermarks using look-up-tables. In: Proc. international conference on acoustics, speech and signal processing, vol. 2. Hawaii (USA): IEEE Press; 2007. p. 153-6.
  16. Cheung S, Leung H, Wang C. A commutative encrypted protocol for the privacy protection of watermarks in digital contents. In: Proceedings of the 37th annual Hawaii international conference on system sciences, vol. 4. 2004. p. 40094a.
  17. Metkar SP, Lichade MV. Digital image security improvement by inte-grating watermarking and encryption technique. In: IEEE international conference on signal processing, computing and control. 2013. p. 1-6.
  18. Kuribayashi M. On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol. EURASIP J Multimed Inf Secur 2010;2010:1:1-1:11.
  19. Lei C-L, Yu P-L, Tsai P-L, Chan M-H. An efficient and anony-mous buyer-seller watermarking protocol. IEEE Trans Image Process 2004;13:1618-26.
  20. Fontaine C, Galand F. A survey of homomorphic encryption for nonspe-cialists. EURASIP J Multimed Inf Secur 2007;2007(1):1-15.
  21. Prangjarote P, Lin C-Y, Yeh C-H. High efficient joint fingerprinting and decryption for multimedia distribution. In: 9th international con-ference on information, communications and signal processing. 2013. p. 1-5.
  22. Bianchi T, Piva A. TTP-free asymmetric fingerprinting protocol based on client side embedding. In: IEEE international conference on acoustics, speech and signal processing. 2014. p. 3987-91.
  23. Bouslimi D, Coatrieux G, Cozic M, Roux C. A joint encryption/water-marking system for verifying the reliability of medical images. IEEE TITB 2012;16:891-9.
  24. Bouslimi D, Coatrieux G, Roux Ch. A joint encryption/watermarking algorithm for verifying the reliability of medical images: applica-tion to echographic images. Comput Methods Programs Biomed 2011;106(1):47-54.
  25. Chen B, Wornell GW. Quantization index modulation: a class of prov-ably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 2001;47(4):1423-43.
  26. Coatrieux G, Quantin C, Montagner J, Fassa M, Allaërt F-A, Roux Ch. Watermarking medical images with anonymous patient identification to verify authenticity. Stud Health Technol Inform 2008;136:667-72.
  27. Deng M, Preneel B. Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity. In: Proc. ISECS. 2008. p. 923-9.

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 294-299
Manuscript Number : CSEIT172485
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Yadavalli Gopi, Shaik Dil Bahar, "Data Activity in Homomorphically Encrypted Medical Pictures for Corroboratory their Reliableness in Each EnCrypted and Special Domains", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.294-299 , July-August-2017.
Journal URL :

Article Preview