A Novel Selective Encryption DWT-based Algorithm For Medical Images
A Novel Selective Encryption DWT-based Algorithm For Medical Images
80
79
LPF 2 LL Band
LPF 2
HPF 2 LH Band
Image
LPF 2 HL Band
HPF 2
HPF 2 HH Band
Row-Column
Row Processing Column Processing
Processing
(a) (b)
Figure 1: Diagrams of DWT image decomposition: (a) DWT image decomposition process (Single Level), (b) Analysis
DWT sub-band (Two Level)
(a) (b)
Figure 2: Example of decomposition by DWT: (a) Original image, (b) Single level decomposition
Figure 3: Pyramidal decomposition of an image: (a) Single level decomposition, (b) Two level decomposition, (c) Three
level decomposition
Encryption Standard (AES) [2] (the new standard in en- the whole picture.
cryption) or RSA (that was invented by R. Rivest, A.
Shamir, and L. Adleman) [15] will lead to scrambling over Taking into account the fact that the decomposition in
the JPEG2000 standard [1] is limited to 5, we will limit
81
80
Original Selective Entropy
Image DWT Quantizer
Encryption Coder
Encrypted and Compressed
Image
Restored Selective Entropy
IDWT Dequantizer
Image Decryption Decoder
R=1 R =2 R =3 R =4 R=5
LL 1 LL 2 LL 3 LL 4 LL 5
Figure 5: Illustration of the quality of the approximation of the image contained in the sub-band LL as a function of the
resolution
ourselves to level 5 so that our approach is compatible with the JPEG2000 algorithm [1]. Moreover, the increase in the
this norm. number of encrypted coefficients affects exponentially the
processing time (encryption-decryption).
From Figure 6, it can be seen that the quality of the in-
3.3 Advantages of our approach
terference introduced by the encryption of the sub-band LL
Rapidity: our new approach is very fast. In fact, only
is excellent up to level 3. But from the decomposition level
6.25% of all the information contained in the DWT
4, the reconstructed images are no longer illegible. Indeed,
matrix is encrypted. Consequently, our approach al-
it is possible to extract medical information of a general
lows a very significant gain in terms of processing
nature. This fact can be aggravated by attack by decompo-
time during the encryption-decryption process com-
sition and reconstitution of the encrypted image with can-
pared to the conventional approaches which consist
cellation of the encrypted coefficients in the sub-band LL.
in encrypting all the information contained in the im-
This attack is effective since it makes it possible to clearly
age.
visualize the texture of the image contained in the averages
and the high frequencies and to eliminate the interference Robustness: The security of our crypto-compression ap-
that exists at the level of the average intensities generated proach is equivalent to the robustness of the classi-
by the encryption of the coefficients of the sub-band LL. cal encryption algorithm that will be used to encrypt
From the results illustrated in Figures 6-7, it will be the coefficients of the sub-band LL. So if we use al-
noted that the greater the number of coefficients that ex- gorithms that are deemed safe such as RSA [15] or
ist in the encrypted sub-band, the more the resulting im- AES [2] (with the use of large keys), we can say that
age, whether after encryption or after attack, is illegible our algorithms are robust enough to guarantee a very
and hence more secure. However, encryption reduces the good degree of security.
spatial redundancy that exists between the different coeffi-
cients given the randomness of the data resulting from an
encryption operation. This affects the compression ratio of
82
81
Encrypted Part
Original image LL 1 LL 2
LL 3 LL 4 LL 5
Figure 6: Reconstructed images after encryption of the sub-band LL for different resolutions
LL 2 LL 4
LL 3 LL 5
Figure 7: Result of an attack throughby cancellation of the encrypted coefficients of the sub-band LL
Efficiency: The new crypto-compression approach pre- the image. In fact, information on the bone density
sented in this work is effective since it makes it pos- and the contours of the bone, on which any radio-
sible to prevent any attempt at correct diagnosis from logical diagnosis is based, is no longer present in the
83
82
encrypted images (see Figure 7). This makes the ex- [7] Henry Ker-Chang Chang and Jiang-Long Liu. A
traction of useful information impossible unless it is linear quadtree compression scheme for image en-
possible to recover the initial value of the encrypted cryption. Signal Processing: Image Communication,
coefficients, which is impossible given the robust- 10(4):279–290, 1997.
ness of the conventional encryption algorithms.
[8] Raphael Grosbois, Diego Santa-Cruz, and Touradj
4 Conclusion Ebrahimi. New approach to JPEG2000 compliant re-
In this paper, a new approach to crypto-compression of gion of interest coding. In SPIE’s 45th annual meet-
medical images is presented, which consists in applying ing, Applications of Digital Image Processing XXIV,
partial encryption in the components of the DWT matrix. volume 4472, pages 267–275, August 2001.
The basic idea of this approach takes advantage of the fact
[9] Chih-Hsien Hsia, Jen-Shiun Chiang, and Jing-Ming
that after application of the DWT on an image, a large part
Guo. Discrete Wavelet Transforms - Biomedical Ap-
of the energy is concentrated in the sub-band LL.
plications, chapter Multiple Moving Objects Detec-
This approach is secure and compatible with the
tion and Tracking Using Discrete Wavelet Transform,
JPEG2000 standard. Its main advantages are speed and
pages 297–320. InTech, 2011.
efficiency. Indeed, it allows to considerably reduce the
processing time in the encryption-decryption process thus [10] J. A. Jaleel, S. Salim, and S. Archana. Textu-
ensuring the optimization of transmission and secure stor- ral features based computer aided diagnostic system
age of medical images. This is due to the fact that only for mammogram mass classification. In Interna-
6.25% of the DWT matrix coefficients are encrypted in tional Conference on Control, Instrumentation, Com-
this approach. Moreover, it is effective since it provides munication and Computational Technologies (ICCI-
encrypted images that are not interpretable medically even CCT’14), pages 806–811, July 2014.
after attack.
[11] D.W. Jones. Application of splay trees to data com-
References pression. Commun. ACM, 31(8):996–1007, August
[1] ISO/IEC 1.29.15444-1, ”JPEG2000 part i final com- 1988.
mittee version 1.0”, september 2004.
[12] Xiaobo Li, Jason Knipe, and Howard Cheng. Im-
[2] FIPS PUB 197, Advanced Encryption Stan- age compression and encryption using tree structures.
dard (AES), 2001. U.S. Department of Com- Pattern Recognition Letters, 18(11-13):1253–1259,
merce/National Institute of Standards and Technol- 1997.
ogy (NIST).
[13] Yossi Matias and Adi Shamir. Proceedings of Ad-
[3] M. K. Abdmouleh, H. Amri, A. Khalfallah, and M. S. vances in Cryptology (CRYPTO), chapter A Video
Bouhlel. A fast JPEG2000 based crypto-compression Scrambling Technique Based On Space Filling
algorithm: Application to the security for transmis- Curves, pages 398–417. Springer Berlin Heidelberg,
sion of medical images. In International Workshop Berlin, Heidelberg, 1988.
on Soft Computing Applications (SOFA’16), Arad–
Romania, August 24–26 2016. [14] W. B. Pennebaker and J. L. Mitchell. JPEG Still Im-
age Data Compression Standard. Van Nostrand Rein-
[4] Mohammed Bahoura and Hassan Ezzaidi. FPGA- hold, cop, New-York, 1993.
Implementation of Discrete Wavelet Transform with
Application to Signal Denoising. Circuits, Systems, [15] R. L. Rivest, A. Shamir, and L. Adleman. A method
and Signal Processing, 31(3):987–1015, 2012. for obtaining digital signatures and public-key cryp-
tosystems. Commun. ACM, 21(2):120–126, February
[5] Med Salim Bouhlel, Fahmi Kammoun, and Eric Gar- 1978.
cia. An efficient DCT-based crypto-compression
scheme for a secure and authentic medical image [16] M. Venkateshwar Rao and V. Bhagya Raju. Im-
transmission. Journal of Testing and Evaluation for age Resolution Enhancement Technique Using Lift-
Applied Sciences and Engineering, 34(6):459–463, ing Wavelet and Discrete Wavelet Transforms, pages
2006. 235–239. Springer Singapore, Singapore, 2016.
[6] Chin-Chen Chang, Min-Shian Hwang, and Tung- [17] Chuntao Wang, Jiangqun Ni, and Qiong Huang.
Shou Chen. A new encryption algorithm for im- A new encryption-then-compression algorithm using
age cryptosystems. Journal of Systems and Software, the rate-distortion optimization. Signal Processing:
58(2):83–91, 2001. Image Communication, 39, Part A:141–150, 2015.
84
83