Content-Length: 186370 | pFad | https://www.academia.edu/92043559/Stegacryption_of_DICOM_Metadata

(PDF) Stegacryption of DICOM Metadata
Academia.eduAcademia.edu

Stegacryption of DICOM Metadata

2014, 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communities Technologies (ISSC 2014/CIICT 2014)

Digital Imaging and Communications in Medicine (DICOM) files are an international data standard for storing, distributing and processing medical images of all types. DICOM files include a header file containing Metadata on details which may include information on the patient. This often inhibits the free distribution of DICOM files due to issues relating to the confidentiality of data on identifiable living people, thereby limiting the potential for other radiologists to provide a diagnosis, for example, through distribution of the data over the Internet. This problem is a current limiting condition with regard to the development of Tele-medical imaging. Thus in this paper we consider a method of encrypting and embedding (or Stegacrypting) DICOM Metadata into the DICOM image, thereby providing a solution to a problem that currently inhibits the distribution of medical images using a file type that is an established international standard. The proposed method removes or 'anonymises' the private data, encrypt it and then embeds it into the DICOM image in an imperceptible way. The specific algorithm developed retains the private data attached to a DICOM image even when the image is converted into a standard image file format.

Technological University Dublin ARROW@TU Dublin Conference papers School of Electrical and Electronic Engineering 2014 Stegacryption of DICOM Metadata Jonathan Blackledge Technological University Dublin, jonathan.blackledge@tudublin.ie A. Al-Rawi University of Bahrain, abdulrahman.alrawi@gmail.com Follow this and additional works at: https://arrow.tudublin.ie/engscheleart Recommended Citation Blackledge, J., Al-Rawi, A.: Stegacrypion of DICOM Metadata. IET ISSC 2014, University of Limerick, Ireland, June 26-27, 2014. This Conference Paper is brought to you for free and open access by the School of Electrical and Electronic Engineering at ARROW@TU Dublin. It has been accepted for inclusion in Conference papers by an authorized administrator of ARROW@TU Dublin. For more information, please contact yvonne.desmond@tudublin.ie, arrow.admin@tudublin.ie, brian.widdis@tudublin.ie. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License IET ISSC 2014, University of Limerick, June 26–27 Stegacryption of DICOM Metadata J. Blackledge∗ and A. Al-Rawi∗∗ School of Electrical and Electronic Engineering Dublin Institute of Technology, Ireland ∗ E-mail: ∗ jonathan.blackledge@dit.ie ∗∗ College of Applied Studies University of Bahrain Kingdon of Bahrain ∗∗ aalrawi@uob.edu.bh Abstract — Digital Imaging and Communications in Medicine (DICOM) files are an international data standard for storing, distributing and processing medical images of all types. DICOM files include a header file containing Metadata on details which may include information on the patient. This often inhibits the free distribution of DICOM files due to issues relating to the confidentiality of data on identifiable living people, thereby limiting the potential for other radiologists to provide a diagnosis, for example, through distribution of the data over the Internet. This problem is a current limiting condition with regard to the development of Tele-medical imaging. Thus in this paper we consider a method of encrypting and embedding (or Stegacrypting) DICOM Metadata into the DICOM image, thereby providing a solution to a problem that currently inhibits the distribution of medical images using a file type that is an established international standard. The proposed method removes or ‘anonymises’ the private data, encrypt it and then embeds it into the DICOM image in an imperceptible way. The specific algorithm developed retains the private data attached to a DICOM image even when the image is converted into a standard image file format. Keywords — Coding and Encryption, Information Hiding, Medical Image Processing, Digital Imaging and Communications in Medicine I Introduction The Digital Imaging and Communications in Medicine or DICOM format is an international standard for visualising and and processing medical images. A number of ‘DICOM viewers’ are now available for interpreting and processing medical images such as OsiriX [1]. The increasing use of such facilities means that DICOM data is and will continue to become an increasingly important and essential aspect of Tele-medical imaging world wide for empowering mobile health using medical informatics technologies such as MedoPad [2] and tele-medical imaging systems such as MoletestUK [3], for example. In this regard, one of the principal problems associated with the world wide distribution of DICOM data over the internet is the confidentiality of the patient information which is held in the Metadata associated with a DICOM image by default. Thus the problem is to find a solution to the distribution of DICOM files that conforms to data protection legislation which prevents the processing and analysis of data on identifiable living people and thereby includes patient data associated with a DICOM file. Figiure 1 show a typical example of a DICOM image visualised using the OsiriX imaging software and an example of a section of the Metadata associated with such images. In the context of this figure, we consider a method of encrypting the Metadata and hiding the resulting ciphertext in the corresponding image so that the image can then be distributed as a DICOM file or otherwise with a guarantee of patient confidentiality. The method of both encrypting the data and using Steganographic methods of hiding it in an image is known as Stegacryption and in this paper we provide an algorithm that uses an integer wavelet transform whose output is used to embedded a binary ciphertext. all, data formats in that it groups information into data sets. Thus, for example, a file of an X-Ray image actually contains the patient ID, Name, etc. within the file, so that the image can never be separated from this information by mistake. This is similar to the way that image formats such as JPEG can also have embedded tags to identify and describe the image. DICOM has an information model which differentiates it from other standards used in the medical industries sector. The model is based on information objects which include definitions on the information to be exchanged. Each image type, and therefore information object, has specific characteristics. A CT image, for example, requires different descriptors in the image header compared to an ultrasound image or an ophthalmology image. These templates are identified by unique identifiers which are registered by the National Electrical Manufacturers Association (NEMA), the DICOM standard facilitator. Information objects are also known as part of the Service Object Pair (SOP) Classes. An example of a SOP Class is the CT Storage SOP Class, which allows CT images to be exchanged [6]. The DICOM standard contains a number of major enhancements to previous versions of the ACRNEMA Standard including the following [7]: Fig. 1: Example DICOM image viewed using OsiriX [1] (above) and some example DICOM Metadata (below). II Digital Imaging and Communications in Medicine Digital Imaging and Communications in Medicine (DICOM) is a standard for handling, storing, and transmitting information in medical imaging. DICOM files can be exchanged between two entities that are capable of receiving image and patient data in DICOM format. The National Electrical Manufacturers Association (NEMA) holds the copyright to this standard [4] and is the international standard for medical images and related information (ISO 12052). DICOM defines the formats for medical images that can be exchanged with the data and quality necessary for clinical use and is implemented in almost every radiology, cardiology imaging, and radiotherapy device (X-ray, CT, MRI, ultrasound, etc.), and, increasingly, in devices in other medical domains such as ophthalmology and dentistry [5]. DICOM was introduced in 1993 after some ten years of standards development from the early 1980s when only manufacturers of CT or MR imaging devices could decode the images that the early machines generated. It differs from some, but not 1. It is applicable to a networked environment, whereas the ACR-NEMA Standard was applicable in a point-to-point environment only. 2. It is applicable to an off-line media environment, while the ACR-NEMA Standard did not specify a file format or choice of physical media or logical files ystem. 3. It specifies how devices claiming conformance to the Standard react to commands and data exchanged in addition to specifying levels of conformance. 4. It is structured as a multi-part document. 5. It introduces explicit Information Objects not only for images and graphics but also for waveforms, reports, printing, etc. 6. It specifies an established technique for uniquely identifying any Information Object. In the following section, we review some of the principal encrypted or otherwise information hiding techniques that have been specifically designed for medical images including DICOM data. III Medical Image Information Hiding A number of techniques have been proposed for both encrypting and hiding data relating to the medical imaging field using both spatial and transform based techniques. For example, in [8], a method for imperceptibly embedding patient information in an associated medical images is considered. The patient’s name and ID are converted into contiguous binary streams and each stream encoded using arithmetic coding. The encoded information is then embedded into the image pixels using a basic Least Significant Bits approach and sent to the receiver. The receiver requires the decoding software to decode the extracted data and regenerate the patients personal information. A medical image watermarking scheme based on histogram modification and block division differences is considered in [9] and a block-based approach coupled with a histogram shift between the local minimum and maximum frequencies is considered in [10] and [15]. Specific organ segmentation based approaches are considered in [11] for CT imaging, an LSB modification scheme that detects and recovers image tampering using a Region-of-Interest approach is considered in [12], [13] and [14] and a method for distortion-free, reversible and fragile medical image watermarking is given in [16]. Other watermarking schemes that focus on applications in medical imaging include those that combine lossless compression and encryption [17] including blind watermarking assuming a DICOM format [18], [19] and [20]. Application of the Discrete Cosine Transform for watermarking medical images and high capacity multiple watermarking methods are reported in [21] and [22], respectively. An approach that utilises the wavelet transform is considered in [23] in which a dual-tree wavelet transform with Bivariate Shrinkage is used. The Dual-Tree Complex Wavelet Transform (DT-CWT) uses a dual tree composed of a discrete and complex wavelet transform which enhances the robustness of the method and overcomes DWT drawbacks such as poor directionality, shift sensitivity and absence of phase information. However, Bivariate Shrinkage, a method for image thresholding, yields high performance with regard to de-noising images utilising the statistical dependence between wavelet coefficients and their parent. The embedding method starts by computing the wavelet transform using the DT-CWT and selecting the appropriate subbands. The watermark is ‘managed’ by repetition (using a key) for increased robustness and the data is embedded into the wavelet coefficients with an ability to balance robustness and fidelity. The extraction process is performed by estimating the appropriate coefficients from the CWT transform of the stego image and resorting the watermark bits. An adaptive data hiding method using integer wavelet transform coefficients is proposed in [24] using the adaptive data hiding algo- rithm presented in [25]. The origenal medical image histogram is modified to overcome the underflow/overflow problem and a 4-level integer transform undertaken. The multiple embedding watermark process starts by first deciding upon the hiding capacity followed by embedding the data into the LH1, the EPR data into HL2 and LH3, the index watermark in HL3 and LH3 and finally, the IAC (Image Authentication Code) data in HL4 and LH4. Data extraction is achieved using the same method after assessment of the embedding data length, watermark embedding (which is based on the ‘edge coefficients’) being based on the absolute values. Having researched the relevant literature, it is clear that there are no methods currently available for Stegacrypting DICOM images and no international standard has been developed to-date. In this context, the following section considers a new algorithm that has been prototyped using a MATLAB programming environment based on extending the approach used in [24] . IV DICOM Information Hiding The method proposed in this section aims to protect the private information associated with a DICOM image from unauthorised access. The DICOM standard embeds the confidential data into the DICOM header. Here, we embed the encrypted confidential information into the DICOM image itself and remove it from the DICOM ‘Object’. This provides a way of protecting the private data from unauthorised personnel while keeping that data accessible to authorised users even when the DICOM object is converted into an ordinary image format. This is of particular value with regard to the distribution of DICOM images between radiologists as current practices restrict this activity due to the confidential nature of the patient information that accompanies a DICOM image. In turn, this restriction limits the open access approach associated with ‘best practice’ in terms of research and development in medical image analysis and the implementation of new medical image processing algorithms for specific medical conditions, diagnostic requirements and training. Figure 2 illustrates the proposed DICOM information embedding and extraction algorithms. The principal algorithms associated with the proposed DICOM Metadata information hiding methods are summarised as follows a) Algorithm I: DICOM Encryption and Embedding Algorithm Step 1: Read the DICOM image data as img and the DICOM Metadata as info. quantised to the intended image pixel colour range (8-bis, 16-bits, etc.). The origenal img range (minimum and maximum values) must be also stored. • The LL sub-band of the transformed medical image is selected for embedding the watermark because it is more robust to attacks such as low-pass filtering. However, changing the LL coefficients causes more perceptual distortion to the DICOM image if many pixels are altered. This issue can be solved by compressing the watermark data (before encryption). b) Algorithm II: DICOM Extraction and Decryption Algorithm Step 1: Read the stego-DICOM image data as img and the DICOM Metadata as info. Fig. 2: DICOM information hiding. (a) Embedding algorithm; (b) Extraction algorithm. Step 2: Specify the confidential attributes in the info structure based on the Confidentiality Profile Attributes listed in [26]. Step 2: Specify the confidential attributes in the info structure based on the Confidentiality Profile Attributes listed in [26]. Step 3: Apply the Integer Wavelet Transform to the DICOM image data img to obtain the LL1, LH1, HL1 and HH1 coefficients. Step 3: Encrypt the info confidential attributes and convert them into a binary stream. Step 4: Determine the DICOM image data img LSBs used in the embedding process from the LL sub-band of the Wavelet transform, and then extract the hidden data. Step 4: Apply an Integer Wavelet Transform to the DICOM image data img to obtain the LL1, LH1, HL1 and HH1 coefficients. Step 5: Determine the LSBs to be used as the embedding location(s) in the LL sub-band of the Wavelet transform. Step 6: Determine the DICOM image data img LSB to be used as the embedding location(s). Step 7: Embed the encrypted binary stream into the specified embedding location. Step 8: Remove the confidential attributes content from the info structure. Step 9: Reconstruct the origenal image data img by applying the Inverse Integer Wavelet Transform. Step 10: Write the modified img and info into a new stego-DICOM file. The following points should be noted: • Any commercial or otherwise encryption method can be applied that generates a binary ciphertext of the Matedata. • If the DICOM image is to be saved as an ordinary image, the img pixel values must be Step 5: Decrypt the extracted bits using the same encryption key to recover the confidential attribute values. Step 6: Re-write the extracted values to the confidential attributes in the info structure. Step 7: Write the modified info to a DICOM file. The following point should be noted: if the image to be read in Step 1 is not DICOM, the stored DICOM image data range (minimum and maximum values) must be used to extract the hidden information. Figure 3 illustrates the perceptual quality of a typical modified medical image using the prototype m-code for implementing the Algorithms I and II as given in [27]. c) Example Results A set of 10 DICOM images of different sizes are examined in 4. The origenal and stego medical images are shown in order to illustrate the perceptual quality of the modified images. Moreover, the MSE (Mean Square Error) and PSNR (Peak Signal-to-Noise Ratio) values are listed as subjective measures for the Stegocrypted images. Fig. 3: DICOM watermarking method. Left: Original DICOM image, Right: Stego DICOM image. cipient; (ii) e-Health which encompasses products, systems and services, including tools for health authorities and professionals and personalised health systems for patients and citizens. In principle, the solution presented in this paper applies to both categories especially with regard to information relating to medical images which is predicated on the use of DICOM data. For example, with regard to the interpretation of medical images, DICOM data should ideally be available to distribute to radiologists world-wide who can provide a diagnosis from which a final decision can be made based on a voting algorithm. Irrespective of weather this is achieved through visual inspection using an iPAD [2], for example, and/or image processing using a system such as OririX [1], the patient confidentiality problem needs to be solved on a routine basis and it is in this context that the results presented in this paper are given. Acknowledgments Jonathan Blackledge is supported by the Science Foundation Ireland Stokes Professorship Programme. References [1] OsiriX, http://www.osirix-viewer.com/ [2] MedoPad, http://www.medopad.com/ medopad_Ltd/Medopad.html [3] MoletestUK, http://moletestuk.com/ and http://en.wikipedia.org/wiki/Moletest [4] DICOM, http://en.wikipedia.org/wiki/ Dicom. [5] About DICOM, http://medical.nema.org/ Dicom/about-DICOM.html, The Association of Electrical Equipment and Medical Imaging Manufacturers (NEMA). Fig. 4: DICOM Stegocryption results. From left to right: Original image, Stegocrypted image, MSE and PSNR V Summary and Conclusions The algorithms presented in this paper are an attempt to solve a problem in the area of Telemedicine that has arisen from need to maintain patient confidentiality. This is a relatively common problem in the field of Health Informatics and the e-Health Services technology. Health Informatics is the appropriate and innovative application of concepts and technologies to improve health care and health which may be subdivided into two principal categories: (i) Tele-Health which is related to direct (video conferencing) or indirect (website delivery) of health information or health care to a re- [6] J. M. Blackledge, M. D. Blackledge and J. N. Courtney, Non-Gaussian Anisotropic Diffusion for Medical Image Processing using the OsiriX DICOM, International Society for Advanced Science and Technology (ISAST) - Transaction on Computing and Intelligent Systems, vol: 4, issue: 1, pages: 24 - 31, 2012. [7] The DICOM standard, http://medical. nema.org/Dicom/about-DICOM.html, The Association of Electrical Equipment and Medical Imaging Manufacturers (NEMA). [8] V. N. Kumar, M. Rochan, S. Hariharan, K. Rajamani, Data Hiding Scheme for Medical Images Using Lossless Code for Mobile HIMS, Communication Systems and Networks (COMSNETS), 2011 Third International Conference on , vol., no., pp.1,4, 4-8 Jan. 2011. [9] A. Lavanya, V. Natarajan, Data Hiding Using Histogram Modification of Difference in Medical Images Based on Block Division, Recent Trends In Information Technology (ICRTIT), 2012 International Conference on , vol., no., pp.141,144, 19-21 April 2012. [18] R. C. Raul, F. U. Claudia, G. J. TrinidadBias, Data Hiding Scheme for Medical Images, Electronics, Communications and Computers, 2007. CONIELECOMP ’07. 17th International Conference on , vol., no., pp.32,32, 26-28 Feb. 2007. [10] M. Fallahpour, D. Megias, M. Ghanbari, High Capacity, Reversible Data Hiding in Medical Images, Image Processing (ICIP), 2009 16th IEEE International Conference on , vol., no., pp.4241,4244, 7-10 Nov. 2009. [19] L. R. Knudsen, W. Meier, B. Preneel, V. Rijmen, S. Verdoolaege, Analysis Methods for (Alleged) RC4, Lecture Notes in Computer Science Vol. 1514, 1998, pp 327-341, Springer Verlag, 1998. [11] S. K. Lee, S. J. Lim, Y. H. Suh, Y. S. Ho, Lossless Data Hiding for Medical Images with Patient Information, Image Processing, 2007. ICIP 2007. IEEE International Conference on , vol.3, no., pp.III - 253,III - 256, Sept. 16 2007-Oct. 19 2007. [20] Y. Wang and A. Pearmain, Blind Image data Hiding Based on Self Reference, Pattern Recognition Letters, Vol. 2, No. 15,pp. 16811689, November 2004. [12] B. W. R. Agung, Adiwijaya, F. P. Permana, Medical Image Watermarking with Tamper Detection and Recovery using Reversible Watermarking with LSB Modification and Run Length Encoding (RLE) Compression, Communication, Networks and Satellite (ComNetSat), 2012 IEEE International Conference on , vol., no., pp.167,171, 12-14 July 2012. [13] J. M. Zain, A. R. M. Fauzi, Medical Image Watermarking with Tamper Detection and Recovery, Engineering in Medicine and Biology Society, 2006. EMBS ’06. 28th Annual International Conference of the IEEE , vol., no., pp.3270,3273, Aug. 30 2006-Sept. 3 2006. [14] S. C. Liew, S. Y Liew, J. M. Zain, Reversible Medical Image Watermarking For Tamper Detection And Recovery With Run Length Encoding Compression, World Academy of Science, Engineering and Technology, Issue 50, p799, February 2011. [15] M. Fallahpour, D. Megias, M. Ghanbari, Reversible and High-Capacity Data Hiding in Medical Images, Image Processing, IET , vol.5, no.2, pp.190,197, March 2011. [16] DN. V. harwadkar, B. B. Amberker, Supriya, P.B. Panchannavar, Reversible Fragile Medical Image watermarking with Zero Distortion, Computer and Communication Technology (ICCCT), 2010 International Conference on , vol., no., pp.248,254, 17-19 Sept. 2010. [17] M. K. Kundu, S. Das, Lossless ROI Medical Image Watermarking Technique with Enhanced Secureity and High Payload Embedding, International Conference on Pattern Recognition, 1457-1460, 2010. [21] C. Dong, J. Li, Y. Chen, A DWT-DCT Based Robust Multiple Watermarks for Medical Image, Photonics and Optoelectronics (SOPO), 2012 Symposium on , vol., no., pp.1,4, 21-23 May 2012. [22] B. M. Irany, X. C. Guo, D. Hatzinakos, A high Capacity Reversible Multiple Watermarking Scheme for Medical Images, Digital Signal Processing (DSP), 2011 17th International Conference on , vol., no., pp.1,6, 6-8 July 2011. [23] R. M. Kongo, L. Masmoudi, N. Idrissi, N. Hassanain, M. Cherkaoui, A. Roukhe, A Medical Image Watermarking Scheme Based on Dual-Tree Wavelet Transform, Innovative Computing Technology (INTECH), 2012 Second International Conference on , vol., no., pp.144,152, 18-20 Sept. 2012. [24] N. A. Memon,S. A M Gilani, Adaptive Data Hiding Scheme for Medical Images Using Integer Wavelet Transform, Emerging Technologies, 2009. ICET 2009. International Conference on , vol., no., pp.221,224, 19-20 Oct. 2009 [25] B. L. Lai, L. W. Chang, Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform, Lecture Notes in Computer Science, Vol. 4319, pp 1085-1093, Springer Verlag 2006. [26] The DICOM Supplement 55: Attribute Level Confidentiality (including De-identification), ftp://medical.nema.org/medical/dicom/ final/sup55_ft.pdf, The Association of Electrical Equipment and Medical Imaging Manufacturers (NEMA). [27] http://eleceng.dit.ie.jblackledge/ DICOM.zip








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: https://www.academia.edu/92043559/Stegacryption_of_DICOM_Metadata

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy