A Hybrid Cryptosystem and Watermarking for Secure Medical Image Transmission

Main Article Content

Oladotun O. Okediran


Advances in computing and communication technologies have provided new methods to store and access medical data electronically and distribute them over open communication networks. Today, patients themselves can access their medical information themselves and medical information can be transmitted among medical institutions as well as stakeholders in the health sector.  Accompanying these benefits are concomitant risks for patient medical records in electronic formats and strictly personal medical documentations being transmitted and accessible over open communication channels such as the Internet. Thus it is common knowledge that there should be in place network-level security measures and protocols in medical information systems. Many security schemes that were based on cryptography, watermarking and steganography have been proposed and implemented to secure medical data. However, an apt review of relevant literature revealed that in many implementations robustness against attacks is not guaranteed. Issues bordering on low embedding capacity, low robustness, low imperceptibility and bad trade tradeoff between robustness and capacity are evident in many implementations. In this paper, a hybrid Rivest-Shamir-Adleman (RSA) algorithm, Rivest Cipher 4 (RC4) algorithm and Spread Spectrum techniques were proposed for securing medical image data over open communication networks. The performance of the proposed scheme was evaluated using Peak Signal to Noise Ratio (PSNR), Signal to Noise Ratio (SNR), Mean Square Error (MSE) and Bit Error Rate (BER). For the five sample medical images used to test the scheme, the BER value is zero while the PNSR and SNR are consistent and they returned desirable high values. The MSE values for the images were low. The average values of the PSNR, SNR and MSE are 51.88 dB, 43.38 dB and 0.113 respectively. Hence, the proposed scheme is utterly revertible, robust and highly imperceptible; the original images can be retrieved by the recipient without any deformation or alteration.

Cryptography, medical image, watermarking, Rivest cipher 4, Rivest-Sharmir-Adleman, security, spread spectrum.

Article Details

How to Cite
O. Okediran, O. (2020). A Hybrid Cryptosystem and Watermarking for Secure Medical Image Transmission. Asian Journal of Research in Computer Science, 5(1), 1-14. https://doi.org/10.9734/ajrcos/2020/v5i130124
Original Research Article


Matheson LR, Mitchell SG, Shamoon TG, Tarjan RE, Zane F. Robustness and security of digital watermarks. Financial Cryptography, Lecture Notes in Computer Science. 1998;1465:227-240.

Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R. Relevance of watermarking in medica imaging. In: Proc. IEEE Conference on Information Technology Applications in Biomedicine, Arlington, USA. 2000;250-255.

Mohanty SP. Digital watermarking: A tutorial review. The Report, Indian Institute of Science, India; 2000.

Coatrieux G, Lecornu L, Roux CH, Sankur B. A review of image watermarking applications in healthcare. In: Proc. of 28th Annual International Conference Engineering in Medicine and Biology Society, EMBS '06, IEEE, New York. 2006;4691-4694.

Chao HM, Hsu CM, Miaou SG. A data-hiding technique with authentication, integration and confidentiality for electronic patient records. IEEE Transactions on Information Technology in Biomedicine. 2002;6(1):46-53.

Singh AK, Kumar B, Dave M, Mohan A. Multiple watermarking on medical images using selective DWT coefficients. Journal of Medical Imaging and Health Informatics. 2015;5(3):607-614.

Acharya R, Bhat PS, Kumar S, Min LC. Transmission and storage of medical images with patient information. Computers in Biology and Medicine. 2013; 33(4):303-310.

Giokoumaki A, Pavlopoulos S, Koutsouris D. Secure and efficient health data management through multiple watermarking on medical images. Journal of Medical and Biological Engineering and Computin. 2006;44(8):619-631.

Lavanya A, Natarajan V. Watermarking Patient Data in Encrypted Medical Images. Sadhana. 2012;37(6):723-729.

Singh AK, Dave M, Mohan A. Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wireless Personal Communications. 2015;83(3):2133-2150.

Mildenberger P, Eichelberg M, Marthin E. Introduction to the DICOM Standard. European Radiology. 2002;12(4):920-927.

Cao F, Huang HK, Zhou XQ. Medical image security in a HIPAA mandated PACS environment. Computerized Medical Imaging and Graphics. 2003;27(2):185-196.

Rati O, Rosset A. Open-source software in medical imaging: Development of OsiriX. International Journal of Computer Assisted Radiology and Surgery. 2006;1(4):187-196.

Lu X, Zhang M, Yang L., Zhao Y, Liu J. Research and implementation of medical images management system based on DICOM standard. International Conference on Biological and Biomedical Sciences, Newark, United States. 2012;9:140- 160.

Gao T, Chen Z. A new image encryption algorithm based on hyper-chaos. Physics Letters A. 2008;372(4):394–400.

Zhang X. Separable reversible data hiding in encrypted image, IEEE transactions on information forensics and security. 2012; 7(2):826–832.

Bouslimi D, Coatrieux G, Cozic M, Roux C. A joint encryption /watermarking system for verifying the reliability of medical images, IEEE transactions on information technology in biomedicine. 2012;16:891–899.

Francois M, Grosges T, Barchiesi D, Erra R. A new image encryption scheme based on a chaotic function. Signal Processing: Image Communication. 2012;27(3):249–259.

Wei Z, Wu Y, Ding X, Deng RH. A scalable and format compliant encryption scheme for h. 264/SVC bit streams, signal processing: Image communication. 2012; 27:1011–1024.

Ghebleh M, Kanso A, Noura H. An image encryption scheme based on irregularly decimated chaotic maps, signal processing: Image communication; 2016.

Lima JB, Lima EAO, Madeiro F. Image encryption based on the finite field cosine transform. Signal processing: Image Communication. 2013;28:1537–1547.

Zhang Y, Xiao D, Shu Y, Li J. A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal processing: Image communication. 2013;28:292–300.

Zhu H, Zhao C, Zhang X. A novel image encryption compression scheme using hyper-chaos and chinese remainder theorem. Signal processing: Image Communication. 2013;28:670–680.

Fotopoulos V, Stavrinou ML, Skodras AN. Authentication and self-correction in sequential MRI slices. Journal of Digital Imaging. 2011;24(5):943–948.

Rahimi F, Rabbani H. A dual adaptive watermarking scheme in contourlet domain for DICOM images. Bio Medical Engineering Online. 2011;10(53).

Elshazly EH, Faragallah OS, Abbas AM, Ashour MA, El-Rabaie ESM, Kazemian H, Alshebeii SA, Fathi E, Hala AES, Elsayed HS. Robust and secure fractional wavelet image watermarking. Signal, Image and Video Processing; 2014.

Mousavi SM, Naghsh A, Abu-Bakar SAR. Watermarking techniques used in medical images: A survey. Journal of Digital Imaging. 2014;27(6):714-729.

Abd-Eldayem MM. A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine. Egyptian Informatics Journal. 2013;14(1):1-13.

Rey C, Dugelay JL. A survey of watermarking algorithm for image authentication. EURASIP Journal on Applied Signal Processing. 2002;1:631-621,.

Allaert FA, Dusseire L. Security of health system in France: What we do will no longer be different from what we tell? International Journal of Biomedical Computing. 1994;35(1):201-204.

Delfs H, Knebl H. Introduction to cryptography: Principles and applications. Second Edition, Springer-Verlag Berlin Heidelberg; 2007.

Stallings W. Cryptography and network security: Principles and practice. Seventh Edition, Pearson Education Limited; 2017.

Biggs N. Codes: An introduction to information communication and cryptography, springer; 2008.

Samcovic A, Turan J. Digital image watermarking by spread spectrum. In Proceedings of the 11th WSEAS International Conference on Communications. 2007;26-28.

Mister S, Tavares S. Cryptanalysis of RC4-like ciphers. In Tavares S, Meijer H. eds.: Selected Areas of Cryptography (SAC '98). Volume 1556 of LNCS, Springer Verlag; 1999.

Menezes AJ, van Oorschot PC, Vanstone SA. Handbook of Applied Cryptography. Chapter 6, CRC Press. 1997;191-195.

Fluhrer S, Mantin I, Shamir A. Weaknesses in the key scheduling algorithm of RC4. In: Selected Areas of Cryptography (SAC 2001). LNCS, Springer Verlag; 2001.

Cox IJ, Kilian J, Leighton FT, Shamoon T. Secure spread spectrum watermarking for multimedia, image processing, IEEE transactions. 1997;6(12):1673-1687.

Schyndel RG, Tirkel A, Osborne CF. A digital watermark. Proceedings of IEEE International conference on Image Processing. ICIP-1994. 1994;86-90.

Zhang Y. Digital watermarking technology: A review. ETP International Conference on Future Computer and Communication, IEEE; 2009.

Pickholtz R, Schilling D, Millstein L. Theory of spread spectrum communications: A tutorial. IEEE Transactions on Communications 1982;30:855-884.

Samcovic A, Turan J. Digital image watermarking by spread spectrum. In: Proceedings of the 11th WSEAS. International Conference on Communications, Agios Nikolaos, Crete Island, Greece. 2017;26-28.

Tolbal MF, Ghonemy MA, Taha IA, Khalifa AS. Using integer wavelet transforms in colored image-steganography. International Journal of Intelligent Computing and Information Sciences. 2004;4(2):1-11.

Boucherkha S, Benmohamed MA. Lossless watermarking based authentication system for medical images. International Journal of Signal Processing. 2004;1(4):278–81.

Delforouzi A, Pooyan M. Adaptive digital audio steganography based on integer wavelet transform. Circuits System Signal Process. 2008;27:247–259.

Memon N, Gilani S. Adaptive data hiding scheme for medical images using integer wavelet transform. In: IEEE International Conference on Emerging Technologies, Islamabad, Pakistan. 2009; 221–224.

Luo L, Chen Z, Chen M, Zeng X, Xiong Z. Reversible image watermarking using interpolation techniques. IEEE Transactions on Information Forensics and Security. 2010;5(1):187–193.

Mostafa S, El- sheimy N, Tolba A, Abdelkader F, Elhindy H. Wavelet Packets-based blind watermarking for medical image management. Open Biomedical Engineering Journal. 2010;4:93–98.

Memon N. Watermarking of medical images for content authentication and copyright protection. PhD thesis, Faculty of Computer Science and Engineering, GIK Institute of Engineering Sciences and Technology, Pakistan; 2010.

Sakkara S, Akkamahadevi DHS, Somashekar K, Raghu K. Integer wavelet based secret data hiding by selecting variable bit length. International Journal of Computer Applications. 2012;48(19):7-11.

Ko L, Chen J, Shieh Y, Hsin H, Sung T. Nested quantization index modulation for reversible watermarking and its application to healthcare information management systems. Computer Math Method Med. 2012;1–8.

Pandey V, Singh A, Shrivastava M. Medical image protection by using cryptography data-hiding and steganography. International Journal of Emerging Technology and Advanced Engineering. 2012;2(1):106-109.

An L, Gao X, Xuelong L, Tao D, Deng C, Li J. Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans Image Process. 2012;21(8):3598–611.

Das S, Kundu M. Effective management of medical information through a novel blind watermarking technique. J Med Syst. 2012;36(5):3339–3351.

Bouslimi D, Coatrieux G, Roux C. A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images. Comput Methods Programs, Biomed. 2012;106(1):47–54.

Jain M, Choudhary RC, Kumar A Secure Medical image steganography with RSA cryptography using decision tree. In: IEEE Second International Conference on Contemporary Computing and Informatics; 2016.

Mahalakshmi V, Satheeshkumar S, Sivakumar S. Performance of steganographic methods in medical imaging. International Journal of Computational and Applied Mathematics. 2017;12(1):549-556.

Banjan N, Dalvi P. Medical data security using combination of cryptography and steganography with AES-LSB algorithm. International Journal of Advanced Research in Electronics and Communication Engineering. 2018;7(7): 673-677.