You are on page 1of 6

2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR’16)

AN IRIS BASED REVERSIBLE


WATERMARKING SYSTEM FOR THE
SECURITY OF TELERADIOLOGY
BALAMURUGAN.G DR.K.SURESH JOSEPH Arulalan.V
Assistant Professor Associate Professor, M.Tech,
Department of Computer Department of Computer Science, Department of Computer Science
Science and Engineering, School of Engineering and Technology, and Engineering,
Christ College of Engineering Pondicherry University, Manakula Vinayagar Institute of
and Technology Pondicherry-605014, India Technology,
Pondicherry University Pondicherry University,
Pondicherry-605010.India Pondicherry-605107, India
gbalamurugan1991@gmail.com arulalanveerappan@gmail.com

Abstract— To improve the security of medical data and integrity of medical data is altered or not by the unauthorized
also transfer the medical images and their information persons and information resource relates to one patient [4]. To
among, the radiologist and physicians for concerning is provide all these functional aspects, Teleradiology requires a
termed as Teleradiology. Maintaining a secure novel security mechanism for maintenance of medical data
environment is a challenging for Teleradiology from remotely. In this paper, we propose an personal information
various issues like malpractice liability and Image system, the authentication is maintained by iris recognition
Retention etc. To overcome these issues and also to and then the confidentiality is achieved by encryption
maintain secure transformation of medical data, we technique using Biometric encryption [15,20] which is used
propose a combined novel system using Biometrics, for encryption of medical information of patient’s.
encryption and watermarking method termed as, “An Iris Watermarking technique is employed to check the integrity of
Based Reversible Watermarking for the security of the system.
Teleradiology. Here, we use CIA mechanism for medical Watermarking is termed as hiding of information in
information and also for medical image transformation. its carrier signal [5, 7]. Traditionally watermarking systems
Enrollment and Embedding process is carried out for the are classified according to their applications. Here we classify
addition of user’s and their information. Verification and the watermarking system based on their domain namely
Extraction process is carried out for the authentication of Spatial Domain and Frequency domain [6, 16]. In spatial
information identity. domain it modulates spatially with the help of image pixels
Index Terms— Teleradiology, Biometrics, Encryption, respectively.
Watermarking technique, Enrollment, Embedding, But, the frequency domain watermarking system
Verification and Extraction. controls, the host signal frequency to embed the watermark in
its co-efficient [9]. In this proposal we prefer, frequency based
1. INTRODUCTION
watermarking technique for selection of region to embed the
Teleradiology plays an important role for the
encrypted information. We use Discrete Wavelet
transformation of medical information and images for e-health
Transformation and Singular Value Decomposition [10, 14]
care service [1]. But, there arise a critical Issue in privacy and
for the selection of region in frequency band in medical
security protection of medical data such as image Retention,
Image. [12] Quantization based reversible watermarking is
privacy etc. Another important issue is maintenance of
used for embed the information. It ensures the availability for
multiple documents [8] for a single patient it is given as
the security of Teleradiology system and guaranteed access to
personal details, digital X-rays, diagnosis results are
the medical Information.
transmitted in online which may cause time complexity [2,
17]. In order to avoid this, we merge the multiple documents
2. CONTRIBUTION OF THE PROPOSED WORK
using a functional technique called as watermarking [3, 11].
1) Iris Based Biometric Recognition
Various security mechanisms are carried out for the protection
2) Key generation from the Iris Template
of Teleradiology such as Firewall, VPN and cryptographic
3) Biometric Encryption Algorithm
hash function. But this mechanism does not provide a standard
4) Watermarking scheme for region based embedding
mechanism for the security of Teleradiology. To maintain, the
based on Reversible Watermarking
CIA mechanism in Teleradiology which means only an
authorized user is permitted to access the medical information
in normal scheduled condition and also check whether the

978-1-4673-9214-3/16/$31.00 © 2016 IEEE


2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR’16)

A. Advantage:
1) Maintains, the high quality medical image with Index 2.2. KEY GENERATION FROM IRIS TEMPLATE
2) Provide Solution to all the issues related to In this, we perform either row-wise or column-wise,
verification and validation and to ensure in one dimensional (1D) DCT of the intensities. This is carried
confidentiality, integrity and availability for out to obtain the DC co-efficient after DCT to generate a 1D
Teleradiology system. sequence of DC values for the 2D grayscale iris biometric
intensity Image. The key value generated is 128-bit. The DCT
2.1. Iris Based Biometric Recognition of a row of the iris matrix is given as

Figure 2: Key generation for Encryption


Figure 1: Steps in Iris Recognition
Iris Recognition system [13, 18, 19] specifies, the 2.3 BIOMETRIC ENCRYPTION ALGORITHM
authentication using the pattern recognition method based on From iris template, a 128-bit value which is used as
the high resolution iris of an individual user. a key for the encryption of medical information. The main
advantage of this algorithm is simple and operates at a higher
2.1.1 BASIC STEPS IN IRIS BIOMETRIC RECOGNITION speed. The data is encrypted by bitwise division and
The initial step, image acquisition which deals the multiplication which has two reverse shift operations. Hence,
captures of sequence of iris image from the cameras and the algorithm is very efficient and simple in nature.
sensors. The second step, Segmentation is an essential module
in Iris Recognition; it defines the effective Image Region used 2.4 WATERMARKING SCHEME
for succeeding processing such as feature extraction. It In this key value is obtained from iris template for
process two essential steps namely Estimation of Iris message encryption and then it is watermarked at medical
Boundary, Noise Removal. These steps are processed by using Image using quantization reversible watermarking technique.
two essential technique called as Canny edge detection and Reversible watermarking is also called as lossless
Hough transform. watermarking, which allows full abstraction of the embedded
The third step, Normalization is used in iris image to data in the whole restoration of the cover image. Quantization
localized efficiently to transform the iris image into a based watermarking technique are mostly fragile in nature. It
rectangular fixed Image. The normalization process is carried modulates the pixel value dependent on the previous pixel.
out using the Daughman’s Rubber Sheet Model. The final step Data embedding method is used to make it more suitable for
is Extraction of Iris Texture from the normalized 2D form the authentication.
image is broken up into 1D signal and these signal are used to
convolve with 1D Gabor Wavelets. 2.4.1 SELECTION OF FREQUENCY BAND IN MEDICAL
f 2 IMAGE:
G ( f ) = exp[− log[[ ]] Using both techniques namely Singular Value
f0 Decomposition and Discrete Wavelet Transformation, we
The log-filter outputs, the Biometric feature template select the frequency band region for the insertion of medical
is obtained from the above equation in it. encrypted information in the DWT bands has LH,LL,HL,HH
and we prefer LL bands for insertion and also SVD is
performed iteratively to maintain the property of reversibility.
2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR’16)

Figure 3: Block diagram for Reversible Watermarking

3. BLOCK DIAGRAM FOR PROPOSED WORK


i) Enrollment and Embedding using reversible
watermarking
ii) Verification and Validation using reversible
watermarking
Figure 4: Enrollment and Embedding using reversible watermarking
3.1 ENROLLMENT AND EMBEDDING USING
REVERSIBLE WATERMARKING

In this stage, we perform iris recognition enrollment


function, here the user enroll the iris image the iris
preprocessing steps like segmentation, normalization, feature
extraction and template will be generated. From the obtained
template, we generate 128-bit key using row wise DCT and
then using Biometric encryption algorithm the medical
information will be encrypted using 128-bit key value.

The encrypted information will be watermarked with


the help of DWT and SVD in medical image using
Quantization Based Reversible watermarking Technique, the
individual key value and the watermarked medical image will
be stored in database with the help of indexing function.

3.2 VERIFICATION AND VALIDATION USING


REVERSIBLE WATERMARKING
In this validation stage, the input iris value obtained
after pre-processing is compared with the value present in the
database using Indexing, then it matches the key value will be
sent to the watermarked medical image, the information is
decrypted the original text will be obtained after the correct
person validation. Thus, the extraction process is obtained
with the help of reversible watermarking.

Figure 5: Verification and Validation using reversible watermarking


2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR’16)
4. PERFORMANCE ANALYSIS 4.2 IMAGE QUALITY ANALYSIS
The performance result for the proposed system is evaluated PSNR of original image and PSNR of watermarked
with the following metrics Image is compared the original content of medical image is
a) Embedding capacity not affected.
b) Image quality analysis
c) Complexity analysis
d) Cryptographic attacks
e) Watermark attacks

4.1 EMBEDDING CAPACITY


The embedding capacity of the proposed work is
evaluated by hiding text in the medical image. Using
quantization based reversible watermarking approach, we
embed (64-byte) of patient’s detail into the medical image of a
particular patient.

Graph1: PSNR with respect to Block size.


4.3 Complexity analysis
The average mean time taken for embedding is a
maximum of 16s and for extraction is for 10s which shows
that the proposed system is of less complexity

Screenshot 1: Iris Enrollment

Screenshot 3: Complexity analysis

4.4 CRYPTOGRAPHIC ATTACKS:


Biometric Encryption Technique is used to generate
the cipher text. In this four step cipher algorithm with 128 bit
key gives good security performance. The essential
modification is not possible without authentication of the iris
recognition because, iris template is obtained and then using
row wise or column wise DCT co-efficient is taken to generate
128-bit key from iris.
The performance against common cryptographic
attacks like known cipher text and plain text, selected plain
text and cipher text attacks is preserved.

Screenshot 2: Embedding capacity


2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR’16)

Screenshot 4: Cryptographic Encryption

4.5 Watermark attacks: Screenshot 7: Extraction of patient’s information

There are three types of watermark attacks arise in it. 4.5.1 Unauthorized message embedding
1) Unauthorized message embedding Let us start with the iris verification, without the iris
2) Unauthorized message extraction authentication the key of 128-bit cannot be generated. The
3) Unauthorized watermark removal location of the text in the medical image is predicated by the
DWT and SVD such that an attacker cannot distinguish the
bits from any location.

4.5.2 Unauthorized embedding attack


The embedding of message in the medical image is
based on the DWT and SVD. The hackers can to modify
arbitrarily the embedded encrypted bit stream to introduce a
falsified message it can be easily evaluated during the
decryption stage because the extracted data will be unable to
reconstruct the watermarked medical image.

4.5.3 Unauthorized removal attack


The valid patient information in their encrypted
Screenshot 5: Acquisition of medical image edition with Iris key should be presented in all images.
4.6 Iris recognition performance metrics:
i) FAR
ii) FRR
The performance of iris recognition is evaluated
using the false acceptance rate (FAR) and false rejection rate
(FRR).The false acceptance rate is the measure that the
biometric security system will incorrectly accept an access
attempt by an unauthorized user. FAR typically is declared as
the ratio of the number of false acceptance divided by the
number of identification attempts.
The false rejection rate or FRR is the measure of the
biometric security system will incorrectly reject an access
attempt by an authorized user. FRR typically is declared as the
ratio of the number of false rejections divided by the number
of identification attempts.

Screenshot 6: Watermarking of patients information in medical image


2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR’16)
9. P.Viswanathan, Dr.P.VenkataKrishna (2009) Text Fusin
Watermarking in Medical Image with Semi-Reversible for secure
transfer and Authentication, ICARTCC Vol.3.
10. Swanirbhar Majumder, Kharibam Jilen, Kumari Devi,
Subir Kumar Sarkar (2013), Singular Value Decomposition and
Wavelet Based Iris Biometric Watermarking IETDL.
11. Lavanya and V.Natarajan (2012) Watermarking patient
data in encrypted Medical image, Indian Academy of Sciences,
pp.723-729.
12. Wioletta Wojtowicz (2013), Biometric Watermarking for
medical Images Example of Iris code, Technical Transaction
Mechanics.
13. Dolly Choudhary, Shamik Tiwari, Ajay Kumar Singh
(2012), A Survey: Feature Extraction Methods for Iris Recognition
Graph 2: ROC of the genuine acceptance rate (GAR) against FAR.
(IJECCT) Vol.2,Issue 6.
14. Sabu M.Thampi, Ann Jisma Jacob Securing Biometric
5. CONCLUSION
Images using Reversible Watermarking.
An Iris based reversible watermarking system for 15. Dr.R.Seshadri, T.Raghu Trivedi (2013) Efficient
the security of Teleradiology is designed for protection of Cryptographic key Generation using Biometrics,
medical information to overcome the legal issues. The Int.J.Com.tech.Appl. Vol2 (1).183-187.
system provides standard mechanism for Teleradiology and 16. Namita Chandrakar, Jaspal Bagga, 2013 Performance
also ensures that it provides CIA methodology. The Comparison of digital Image Watermarking Techniques- A
performance analysis of the system ensures that the system Survey.(IJCATR)
is reliable and reduces the complexities of the 17. Seyed Mojtaba Mousavi, Alireza Naghsh (2014)
Teleradiology. Watermarking Techniques used in Medical Images: A
Survey.J.Digit Imaging. Springer.
ACKNOWLEDGMENT 18. Wang.Y, L.Ma, “Iris Recognition using circular
symmetric Filters,” National Laboratory of Pattern recognition,
I deliver my truthful thanks to Dr. A.Ravichandran M.E., Ph.D., Institute.
M.I.S.T.E., M.I.E., Director (Christ College of Engineering and 19. Maryam Eskandari, ONsen Toygar, Feature Extraction
Technology & Christ Institute of Technology) for providing the Selection for face-Iris Multimodal Recognition”, SIVIP2014.
wonderful opportunity and kind guideline for research article 20. Praveen Varma, 2012 Proposed Method of cryptographic
preparation key generation for security digital image (IJARCSS).
REFERENCES
1. G.Balamurugan, Dr.K.B.Jayarraman, V.Arulalan (2014)
An Iris based Watermarking system for the security issues of
teleradiology, International Journal of Applied Engineering
Research, ISSN 0973-4562 Vol.9,No2
2. N.Hussain, W.Boles and C.Boyd, (2013) A review of
medical image watermarking requirement for Teleradiology,
J.Digital Image.Vol.26, No2 pp.326-343.
3. Mohamed M.Abd-Eldayem, (2013) A proposed security
technique based on watermarking and encryption for digital
Imaging and communications in medicine, “Egyptian Informatics
Journal, 1-13.
4. Gouenou Coatrieux, Hui Hung, Huazhong Shu, Limin
Luo and Christian Roux (2013) A Watermarking –based medical
Image ntegrity Control system and an Image Moment Signature for
Tampering Characterization.
5. Baiying Lei, Ee-Leng Tan, Siping Chen, Dong Ni,
Tianfu Wang, Haijum Lei (2014) Reversible watermarking scheme
for medical image based on differential evolution, Expert Systems
with Applications.
6. Balamurugan.G, Dr.K.B.Jayarraman, Arulalan.V (2014)
A Survey on Medical Image Watermarking Techniques, IJCSN
vol.3, Issue5.
7. Mohammed Tajuddin, C.Nandini (2013) Cryptographic
Key Generation using Retina Biometric Parameter (IJEIT) Vol-
3,Issue1
8. P.Viswanathan, P.VenkataKrishna (2014) A joint FED
Watermarking system using Spatial Issues of Teleradiology, IEEE
Journal of Biomedical and Health Informatics.

You might also like