2656 PDF
2656 PDF
2017, 8 (4)
Research Article
HYBRID BAKER MAP WITH AES IN CIPHER BLOCK CHAINING MODE IN MEDICAL IMAGES
Amudha K *1, Nelson Kennedy Babu C 2, Balu S 3
1
Department of Electronics and Communication Engineering, Kongunadu College of Engineering and Technology,
Trichy, Tamil Nadu, India
2
Department of Computer Science and Engineering, Dhanalakshmi Srinivasan College of Engineering, Coimbatore,
Tamil Nadu, India
3
Department of Computer Science and Engineering, K. S. Rangasamy College of Technology, Namakkal, Tamil Nadu,
India
*Corresponding Author Email: amudhak02 @gmail.com
DOI: 10.7897/2230-8407.080451
ABSTRACT
While transferring the medical images from one place to another place lot of security issues are raised. The security issues are confidentiality, integrity
and authenticity. Combined encryption and watermarking technique used to verify the integrity and authenticity of medical images. Encryption
algorithms are operated in stream cipher and block cipher mode. Advanced Encryption Standard (AES) algorithm is one of the block cipher algorithm.
The proposed method uses Advanced Encryption Standard Algorithm in Cipher Block Chaining (CBC) mode. To increase the security, the proposed
technique uses baker key in the original image before applying the AES algorithm. Based on the baker key the image pixel position has been changed.
To increase the data hiding capacity this technique embeds the information in the spatial domain and encrypted domain. The main objective of this
method is to provide integrity and authenticity of the medical images at the same time increase the information embedding capacity. Experimental
security analysis is taken for the 8-bit ultrasound images and 16-bit Positron Emission Tomography (PET) images.
Normally, RC6 block cipher algorithm is used to encrypt the After that, the information has been inserted in two ways into
data6,7. AES block cipher supports large size of data compared spatial domain and encrypted domain. The information is
to RC6 block cipher. Hence, AES is used in the proposed encoded parallel in the spatial domain and encrypted domain
methodologies in Cipher Block Chaining (CBC) mode. AES is a with different authenticity code. The output image, after
block cipher method that operates on discrete blocks embedding is called as watermarked image, which is further
67
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)
Figure 1: Flow diagram of hybrid baker map with AES in CBC mode
Baker Map Algorithm components in every rectangle are revised to a row in the
permuted rectangle. Rectangles are taken from right to left start
The baker map is utilized as a preprocessing apparatus to build with upper rectangles and after that lower ones. Inside every
the security of the system. It is a permutation based technique, rectangle, the scan starts from the base left corner towards upper
which is carried out the randomization of a square matrix of components10,11. A Baker map algorithm with key [2 4 2] is
dimensions (M X M) by changing the pixel positions in view of shown in Figure 2.
the secret key. It assigns a pixel to another pixel position in a
bijective way. The square matrix is partitioned into rectangles Pixel position is changed by the baker map algorithm with
with various sizes of the width and number of components. The respect to keys.
Here, Pixels in rectangles are taken from right upper rectangles
followed by bottom ones. Inside every rectangle, the output
starts from the base left corner towards upper components that
are located in the first row of the reordered table. In this above
example, right upper rectangles bottom pixel of left corner is
P31 which is the first element of the first row. Next bottom left
corner towards upper element is P23 which comes as second
element of the first row in the reordered table, likewise the all
elements in the first row are filled. For second row, the next
rectangle on the right side is its bottom one, the bottom element
is P63 it comes to the first element of the second row likewise
the second row is filled. For the third row, the right side upper
rectangle left corner bottom element is P11, which comes as first
element of the third row, likewise the third row is filled.
Similarly, pixels are filled in all rows 12,13..
68
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)
The previous cipher text block is exclusive ORed with the Combined Encryption And Watermark
current plain text block (B1) to get an encrypted version of that
plain text (B1e), and then this output is encrypted by AES with a The main objective of this system is to verify the reliability of
secret key to get cipher text and so on. an image within the spatial domain and encrypted domain. The
combined watermarking and encryption approach is shown in
Figure 4.
69
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)
In this watermarking technique, information is embedded in the Msge = <AC, PRNG bits>
spatial domain and encrypted domain. In the spatial domain,
information is embedded with Authenticity Code (AC) and Here, information has been embedded in the spatial domain as
Secure Hash code. This authenticity code is used to verify the well as the encrypted domain is used to increase the embedding
patient authentication and secure hash code is used to verify the capacity rate. At the same time, secure hash code and PRNG bits
integrity proof17,18. The spatial domain messages (Msgs) contain with authenticity code is included in the message to provide
authenticity code and secure hash code. more authenticity and integrity. Here, secret information is
(Msgs) = <AC, SHA code> embedded in spatial end encrypted domain which is represented
as double watermark.
In encrypted domain, information is embedded with authenticity
code and Pseudo random sequence of bits generated by RESULTS
encrypting watermarking key (Kwe). Here, Pseudo random
sequences of bits verify the integrity as well as authenticity code Experimental results are conducted on Ultrasound images and
verifies the authenticity. Encrypted domain message (Msge) Positron Emission Tomography (PET) images. The sample
represented as image sets are shown in the Figure 5.
Baker map algorithm is applied to the original Ultrasound and on the images then the pixel position is changed which is shown
PET images which changes the pixel position. The original in Figure 6(b). Next baker key [4 8 4] is applied to the images,
ultrasound image and PET images are taken for experimental the changed pixel position is shown in Figure 6 (c).
purpose is shown in Figure 6 (a) and baker key [2 4 2] is applied
70
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)
The resultant encrypted image using AES in CBC mode is shown in Figure 7. Advanced AES in CBC mode refers that a plaintext
block is combined with the previous cipher text block through an XOR operation before being encrypted. The original PET image,
watermarked encrypted image and decrypted image are shown in Figure 7 (a), (b) and (c) respectively.
(a) Original PET image (b) watermarked/ciphered image (c) Decrypted image
71
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)
In order to verify its integrity, histogram analysis is taken for In decryption side, histogram is plotted for input image which is
original input images and decrypted images. Histogram analysis equal to the encrypted image, chaotic baker image, and the
is taken for original input PET image 6(a) and baker image 6(b) decrypted image which is equal to the original image. Here, the
and its encrypted image 7(b), in encryption side and decryption histogram of the original input image and decrypted image both
side is shown in Figure 8. are same.
In encryption side, the histogram is plotted for the original PET The analysis is taken and compared the sample input images
image, baker key [2 4 2] is applied to an input image and the which has in Figure 5. The output performance is measured for
resultant image is a chaotic baker image, and encrypted image. those images and the measured value is tabulated in Table 1 and
plotted in Figure 9 and 10 respectively .
Table 1: Performance Evaluation of hybrid baker map with AES in CBC mode for Ultrasound and PET images
72
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)
gives high entropy and low correlation coefficient value due to for verifying the Reliability of Medical Images, IEEE
the process of baker map preprocessing tool. This system Transactions on Information Technology in Biomedicine
maintains the embedding rate upto 0.1bpp and reduces the 2012; 16:891-899.
processing time to 2.572 sec due to concurrent double 10. Epstein M A, Pasieka M S, Lord W P, Wong S T C,
watermark. Mankovich N J. Security for the digital information age of
medicine: issues, applications, and implementation. Journal
REFERENCES of Digital Imaging 1998; 11:33-44.
11. Giakoumaki, Sotiris Pavlopoulos, Dimitris Koutsouris.
1. Coatrieux G, Le Guillou C, Cauvin J M, Roux C. Reversible Multiple Image Watermarking Applied to Health
watermarking for knowledge digest embedding and Information Management. IEEE Transactions on
reliability control in medical images. IEEE Transactions on Information Technology in Biomedicine 2006; 10:722-732.
information technology in biomedicine 2009; 13:158-165. 12. Gouenou Coatrieux, Hui Huang, Huazhong Shu,Limi Luo,
2. Rajendra Acharya U, Acharya D, Subbanna Bhat P, Christian Roux. A Watermarking based Medical Image
Niranjan U C. Compact storage of medical images with Integrity Control System and an Image Moment Signature
patient information. IEEE Transactions on information for Tampering Characterization. IEEE Journal of
technology in biomedicine 2001; 5:320–323. Biomedical and Health Informatics 2013; 17:1057-1067.
3. Shiguo L, Zhongxuan L, Zhen R, Haila W. Commutative 13. Mohamed M Abd-Eldayem. A proposed security technique
encryption and watermarking in video compression, IEEE based on watermarking and encryption for digital imaging
Transactions on Circuits Systems Video Technology 2007; and communications in medicine. Elesiver Egyptian
17:774–778. Informatics Journal 2014,14:1-13.
4. Chen B, Wornell G W. Quantization index modulation: A 14. Mostafa S A K, El- sheimy N, Tolba A S, Abdelkader F M,
class of provably good methods for digital watermarking Elhindy H M. Wavelet packets-based blind watermarking
and information embedding. IEEE Transactions on for medical image management. Journal of Biomedical
information theory 2001;47: 1423–1443. Engineering 2010; 4:93-98.
5. Al-Qershi O M, Khoo B E. Authentication and data hiding 15. Ni, Z, Shi, Y Q, Ansari, N, Su, W. Reversible data hiding.
using a hybrid ROI-based watermarking scheme for DICOM IEEE Transactions on Circuits and Systems for Video
images. Journal of Digital Imaging 2011; 24:114-125. Technology 2006; l6:354–362.
6. Boucherkha S, Benmohamed M. A lossless watermarking 16. Ou, Y, Sur, C, Rhee, K H. Region-based selective
based authentication system for medical images. World encryption for medical imaging Frontiers in Algorithmics.
Academy of Science and Technology 2007; 1:20-23. Springer 2007; 4613:62–73.
7. Celik M U, Sharma G, Tekalp AM, Saber E. Lossless 17. Qingqi Pei, Xiang Wang, Yuan Li, Hui Li. Adaptive
generalized-LSB data embedding. IEEE Transactions on Reversible Watermarking with Improved Embedding
image processing 2005; 14:253–266. Capacity. Elsevier Journal of Systems and Software 2013;
8. Chao H M, Hsu C M, Miaou S G. A data-hiding technique 86:2841-2848.
with authentication, integration, and confidentiality for 18. Tan, C K, Ng, C, Xu, X, Poh, C L, Guan, Y L, Sheah, K.
electronic patient records. IEEE Transactions on Security protection of DICOM medical images using dual-
Information Technology in Biomedicine 2002; 6:46-53. layer reversible watermarking with tamper detection
9. Dalel Bouslimi, Gouenou Coatrieux, Michel Cozic, capability. Journal of Digital Imaging 2011; 24:528-540.
Christian Roux. A Joint Encryption/Watermarking System
Disclaimer: IRJP is solely owned by Moksha Publishing House - A non-profit publishing house, dedicated to publish quality research, while
every effort has been taken to verify the accuracy of the content published in our Journal. IRJP cannot accept any responsibility or liability for
the site content and articles published. The views expressed in articles by our contributing authors are not necessarily those of IRJP editor or
editorial board members.
73