You are on page 1of 8

Synopsis of (Digital Watermarking in Medical Images)

Bachelor of Technology Computer Science and Engineering

Submitted by:Archana Rana 0809110016 Prashant Singh 0809110050 Rahul Chaudhary 0809110054 Ravi Kumar Jaiswal 0809110059

Department of Computer Science and Engineering JSS Academy Of Technical Education, Noida

Intoduction:Internet has many applications like telemedicine, online banking , Teleshopping etc. One crucial application of the Internet is telemedicine, where healthcare professionals use the Internet for transmitting or receiving Electronic Patient Records (EPR) via e-mail. An EPR typically contains the health history of a patient, including X-ray images, CT-Scan images, physical examinations report, laboratory tests, treatment procedures, prescriptions, radiology examinations etc. An EPR can be represented in various forms such as diagnostic reports, images, vital signals, etc. An EPR transmitted through the Internet is very important since it contains the medical information of a person in digital format. The tampering of an EPR would embarrass the individuals. Thus, due to the rapid development of telemedicine the security of the medical images became important .In telemedicine ,for the security and authenticity of medical images, Medical image watermarking is used which is a particular subset of image watermarking whereby medical images are embedded with hidden information that may be used to assert ownership, increase the security, and verify the numerical integrity of medical images.

Two different scenarios where the image watermarking is used as a security element in the medical field are as follows:1) Authentication and tracing : Medical images may go through several services and receive different processing and annotations. These transformations are recorded in a historical resume which is attached to the image as meta-data along with the patient references and the acquisition data. If a watermark is introduced in the image carrying an identifier also present in the resume, it guarantees that no error or falsification has been committed in the simultaneous processing of the image and the resume. The automatic handling of the watermark and the resume by authorized workstations is an additional security for the documents and may allow for instance the practice of reversible watermarking. If non-reversible watermarks are used, incremental marks may hold track of the different services which handled the document. 2) EPR diffusion : If the EPR is kept by the patient him/herself, or distributed on several sites, and transmitted to the different services in charge of further considerations or treatments, some mechanisms should be introduced to guarantee the integrity of the document. These mechanisms not only will tell the medical persons whether the document is the same as the original one, but also if

some differences exist, their location and Importance. The decision could then be taken to consider the document as valuable or not. Watermarking as a tool for integrity control is well adapted for this purpose. As the checking of complex watermark may be heavy, it is probably not likely that it is done every time the image is displayed. The resume file attached to the image or the image header will be the prime identifier, and the control of the adequacy between the image and the resume or header be made when necessary for instance before entering the documents in a data base or before a diagnosis or when a conflict happens. In this scenario, the watermark is the ultimate security proof, most of the time ignored by the system, which is only used when important security issues arrive.

Motivation:Main motivation for Medical Image Watermarking is to facilitate sharing and remote handling of medical images in a secure manner. Watermarking uses to enhance the security of medical images through three main aspects(i) Confidentiality means that only authorized persons have access to the information, (ii)Reliability which focuses on two main aspects: a)-Integrity which means the information has not been modified by unauthorized user b)-Authentication which means thereshould be proof that the information belongs to the correct patient (iii) Availability which is the ability of information system to be used by authorized persons

Project Objective:Two main objectives of watermarking in the medical domain are : 1) Data hiding for the purpose of inserting meta-data to render the image more usable 2) Information protection with application like integrity control. This would ultimately lead to Protecting and enhancing medical images with watermarking.

Scope of the Project :Module 1- Literature Study: Number of medical image watermarking schemes have been reported in the literature to address the issues of medical information security, and authentication. Wakatani proposed a medical image watermarking method that avoids embedding watermark in the region of interest. Rodriquez et al. searches for the suitable pixels to embed information using the spiral scan starting from the centroid of the image. Giakoumaki et al. proposed a wavelet-based watermarking scheme to embed multiple watermarks in medical images. Woo et al. have proposed a multiple watermarking method. An encrypted patient data is embedded as annotation watermark for achieving for privacy control and tiled binary pattern is embedded as fragile watermark for tamper localization. Module 2- State of art Technology: Watermarking techniques are divided into two basic categories, which are: (1) spatial-domain watermarking, in which the lower order bits of the image pixels are replaced with that of the watermark or adding some fixed intensity value to a picture and (2) frequency-domain watermarking, in which the image is first transformed to the frequency domain discrete fourier transform (DFT) or discrete cosine transform (DCT), and then the low-frequency components are modified to obtain watermarked images. Module 3- Design: a)-Watermarking Method and Capacity Selection: It depend on different parameters1. Image region size and shape. 2. Method of region characterizations. 3. Selection of appropriate watermarks and associated capacities (i.e. number of bits that are embedded per region).

4. Method for comparing the visual similarity (or degradation) between raw and watermarked regions.

b)- Watermarking Method and Capacity Specification: In the above sub-module , the most appropriate watermark method and payload capacity are determined for each region type. During this submodule, the parameters and thresholds outlined above must be appropriately selected

c)- Watermark Embedding(Encoding): During encoding, a payload is embedded into an image, as shown in Fig. 1. Typical payloads may be text (such as patient or image capturedetails), another image (such as a logo) or an identification number (such as patient or hospital identifiers).

d)-Watermark Extraction(Decoding): Fig. 2 shows the decoding process for a blind watermarking system. In this type of system only the embedded image is supplied from which the payload is to be extracted. Non-blind systems may have additional data such as the original image or payload.

Module 4- Interface:

Module 5- Coding and Testing:

Module 6- Integration with Graphical user interface and testing:

Pert Chart/ Gantt Chart:-

Technical feasibility:1) .NET Framework using C# 2)

Sql server 2005

3) Visual Studio 2008

References:1. Janani

Natarajan,Vijay R.RathodMedical Image Watermarking using a Perceptual Similarity Metric MIT International Journal of Electrical and Instrumentation Engineering Vol-1, No. 1, pp. 29-34, Jan(2011) Ali Hajjaji, Abdellatif Mtibaa, El-bey Bourennane3, A Watermarking of Medical Image : New Approach Based On Multi-Layer Method, IJCSI International Journal of Computer Science Issues, Voi-8, Issue 4, No 2, pp.33-41,July (2011)

2. Mohamed

3. Nisar Ahmed Memon, Multiple Watermarking of Medical

Images for Content Authentication and Recovery,IEEE Trans on.Information Technology in Biomedicine, vol. 5, no.3, pp. 195-201, Sept (2001)

You might also like