0% found this document useful (0 votes)
100 views7 pages

2656 PDF

This document describes a method for securing medical images that combines encryption and watermarking using the Advanced Encryption Standard (AES) algorithm in Cipher Block Chaining (CBC) mode. First, a Baker map algorithm is applied to the original image using a secret key to change the pixel positions. Then information is embedded in both the spatial and encrypted domains of the image. The watermarked image is encrypted with AES-CBC for increased security. Experimental analysis shows this "hybrid Baker map" approach provides integrity and authenticity for medical images while achieving a high embedding capacity.

Uploaded by

Moon 131415
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views7 pages

2656 PDF

This document describes a method for securing medical images that combines encryption and watermarking using the Advanced Encryption Standard (AES) algorithm in Cipher Block Chaining (CBC) mode. First, a Baker map algorithm is applied to the original image using a secret key to change the pixel positions. Then information is embedded in both the spatial and encrypted domains of the image. The watermarked image is encrypted with AES-CBC for increased security. Experimental analysis shows this "hybrid Baker map" approach provides integrity and authenticity for medical images while achieving a high embedding capacity.

Uploaded by

Moon 131415
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Amudha K et al. Int. Res. J. Pharm.

2017, 8 (4)

INTERNATIONAL RESEARCH JOURNAL OF PHARMACY


www.irjponline.com
ISSN 2230 – 8407

Research Article
HYBRID BAKER MAP WITH AES IN CIPHER BLOCK CHAINING MODE IN MEDICAL IMAGES
Amudha K *1, Nelson Kennedy Babu C 2, Balu S 3
1
Department of Electronics and Communication Engineering, Kongunadu College of Engineering and Technology,
Trichy, Tamil Nadu, India
2
Department of Computer Science and Engineering, Dhanalakshmi Srinivasan College of Engineering, Coimbatore,
Tamil Nadu, India
3
Department of Computer Science and Engineering, K. S. Rangasamy College of Technology, Namakkal, Tamil Nadu,
India
*Corresponding Author Email: amudhak02 @gmail.com

Article Received on: 13/03/17 Approved for publication: 20/04/17

DOI: 10.7897/2230-8407.080451

ABSTRACT

While transferring the medical images from one place to another place lot of security issues are raised. The security issues are confidentiality, integrity
and authenticity. Combined encryption and watermarking technique used to verify the integrity and authenticity of medical images. Encryption
algorithms are operated in stream cipher and block cipher mode. Advanced Encryption Standard (AES) algorithm is one of the block cipher algorithm.
The proposed method uses Advanced Encryption Standard Algorithm in Cipher Block Chaining (CBC) mode. To increase the security, the proposed
technique uses baker key in the original image before applying the AES algorithm. Based on the baker key the image pixel position has been changed.
To increase the data hiding capacity this technique embeds the information in the spatial domain and encrypted domain. The main objective of this
method is to provide integrity and authenticity of the medical images at the same time increase the information embedding capacity. Experimental
security analysis is taken for the 8-bit ultrasound images and 16-bit Positron Emission Tomography (PET) images.

Keywords: Integrity, Authenticity, Spatial domain, Encrypted domain, AES in CBC

INTRODUCTION of data using a fixed key. A high embedding capacity rate is


achieved because of double watermarking and double AES is
Medical imaging plays a vital role in telesurgery, telemedicine, used for encryption to increase security which leads to a
telediagnosis and so on. Media and telecom advances require a complex workaround8. To reduce complexity of work and time,
diverse method for remote access and sharing of patient a better methodology is proposed in this paper. Here, secret
information. Even though the transmission is easy, it lacks in information is embedded in the spatial domain and encrypted
few security metrics such as confidentiality, availability and domain simultaneously with AES algorithm used in CBC mode
reliability1. Cryptographic algorithms are used to provide data for encryption purpose leading to better security.
confidentiality and integrity in information systems. The
medical information is left, if the decrypted or digital signature MATERIALS AND METHODS
is lost and it is not easy to verify its integrity and origin. So, the Hybrid Baker Map with AES in CBC Mode
cryptographic algorithms are considered as a priori protection
technique. Information with authenticity code is embedded in both spatial
domain and encrypted domain in the original input image 9. This
In order to improve the security of medical images the authenticity code is used to identify the image origin and an
watermarking techniques are used with an encryption method2. integrity proof. Then the resultant watermarked image has been
The joint encryption and watermarking technique is used to encrypted by AES with the help of the secret key.
protect the information. The reliability of the same is verified by
asserting its integrity and authenticity. During the transaction, In the proposed system, Baker Map algorithm is used before
the Patient Health Record (PHR) that contains patient name and embedding the information into spatial domain and encrypted
physician identity can be inserted into an image by using a domain. The Baker Map algorithm divides the square matrix of
watermarking method otherwise posterior technique3. The the original image into rectangles with different sizes. Then the
combined priori and posteriori technique is used to enhance the baker map algorithm modifies the pixel position of the original
security in medical images4,5. image based on the baker key.

Normally, RC6 block cipher algorithm is used to encrypt the After that, the information has been inserted in two ways into
data6,7. AES block cipher supports large size of data compared spatial domain and encrypted domain. The information is
to RC6 block cipher. Hence, AES is used in the proposed encoded parallel in the spatial domain and encrypted domain
methodologies in Cipher Block Chaining (CBC) mode. AES is a with different authenticity code. The output image, after
block cipher method that operates on discrete blocks embedding is called as watermarked image, which is further

67
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)

encrypted by AES in cipher block chaining mode to get


encrypted image. The overall flow diagram of the proposed
method is shown in Figure 1.

Figure 1: Flow diagram of hybrid baker map with AES in CBC mode

Baker Map Algorithm components in every rectangle are revised to a row in the
permuted rectangle. Rectangles are taken from right to left start
The baker map is utilized as a preprocessing apparatus to build with upper rectangles and after that lower ones. Inside every
the security of the system. It is a permutation based technique, rectangle, the scan starts from the base left corner towards upper
which is carried out the randomization of a square matrix of components10,11. A Baker map algorithm with key [2 4 2] is
dimensions (M X M) by changing the pixel positions in view of shown in Figure 2.
the secret key. It assigns a pixel to another pixel position in a
bijective way. The square matrix is partitioned into rectangles Pixel position is changed by the baker map algorithm with
with various sizes of the width and number of components. The respect to keys.
Here, Pixels in rectangles are taken from right upper rectangles
followed by bottom ones. Inside every rectangle, the output
starts from the base left corner towards upper components that
are located in the first row of the reordered table. In this above
example, right upper rectangles bottom pixel of left corner is
P31 which is the first element of the first row. Next bottom left
corner towards upper element is P23 which comes as second
element of the first row in the reordered table, likewise the all
elements in the first row are filled. For second row, the next
rectangle on the right side is its bottom one, the bottom element
is P63 it comes to the first element of the second row likewise
the second row is filled. For the third row, the right side upper
rectangle left corner bottom element is P11, which comes as first
element of the third row, likewise the third row is filled.
Similarly, pixels are filled in all rows 12,13..

Figure 2: Baker key [2 4 2]

68
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)

ENCRYPTION the user avoids creating indistinguishable output cipher text


Block Cipher Algorithm blocks from the same input data. These modifications are called
the block cipher modes of operations14,15.
Block cipher algorithms are generally used to encode large size
of information in terms of blocks. Block ciphers are working in The modes of operation are characterized as Electronic Code
various modes to achieve better security. The modes of Book, Cipher Feedback, Cipher Block Chaining, Counter and
operation of block ciphers are configuration methods that permit Output Feedback. In the proposed technique use the Cipher
those ciphers to work with extensive information streams, Block chaining mode in the AES algorithm to encrypt the data 16.
without the risk of compromising the security. However, it is
possible while working with block ciphers, to use the same AES Encryption in CBC mode
secret key bits for encrypting the same plain text. A
deterministic algorithm is utilized for multiple data input A plaintext block is combined with the previous cipher text
streams, resulting in a number of the same cipher text blocks. It block through XOR operation when CBC mode is applied. Bie is
is an extremely hazardous circumstance for the cipher's clients. denoted as an encrypted version of block Bi and Bei-1 refers the
An intruder would be able to get much information knowing a previous encrypted block, hence it is given by
distribution of indistinguishable message parts, even if would
not be able to break the cipher and discover the original Bie = AES (Bi (XOR) Bei-1, Ke)
messages. There exist some approaches to blur the cipher Where, Ke is the Encryption Key. AES in cipher block chaining
output. The idea is to mix the plain text blocks with the cipher mode operation is shown in Figure 3.
text blocks and use the outcome as the cipher input. As a result,

Figure 3: AES in CBC mode

The previous cipher text block is exclusive ORed with the Combined Encryption And Watermark
current plain text block (B1) to get an encrypted version of that
plain text (B1e), and then this output is encrypted by AES with a The main objective of this system is to verify the reliability of
secret key to get cipher text and so on. an image within the spatial domain and encrypted domain. The
combined watermarking and encryption approach is shown in
Figure 4.

69
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)

Figure 4: Combined approach

In this watermarking technique, information is embedded in the Msge = <AC, PRNG bits>
spatial domain and encrypted domain. In the spatial domain,
information is embedded with Authenticity Code (AC) and Here, information has been embedded in the spatial domain as
Secure Hash code. This authenticity code is used to verify the well as the encrypted domain is used to increase the embedding
patient authentication and secure hash code is used to verify the capacity rate. At the same time, secure hash code and PRNG bits
integrity proof17,18. The spatial domain messages (Msgs) contain with authenticity code is included in the message to provide
authenticity code and secure hash code. more authenticity and integrity. Here, secret information is
(Msgs) = <AC, SHA code> embedded in spatial end encrypted domain which is represented
as double watermark.
In encrypted domain, information is embedded with authenticity
code and Pseudo random sequence of bits generated by RESULTS
encrypting watermarking key (Kwe). Here, Pseudo random
sequences of bits verify the integrity as well as authenticity code Experimental results are conducted on Ultrasound images and
verifies the authenticity. Encrypted domain message (Msge) Positron Emission Tomography (PET) images. The sample
represented as image sets are shown in the Figure 5.

Ultrasound image PET image

Figure 5: Sample images

Baker map algorithm is applied to the original Ultrasound and on the images then the pixel position is changed which is shown
PET images which changes the pixel position. The original in Figure 6(b). Next baker key [4 8 4] is applied to the images,
ultrasound image and PET images are taken for experimental the changed pixel position is shown in Figure 6 (c).
purpose is shown in Figure 6 (a) and baker key [2 4 2] is applied

70
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)

(a) Input Images (b) Chaotic Key [2 4 2] (c) Chaotic Key [4 8 4]

Figure 6: Resultant images using different baker key

The resultant encrypted image using AES in CBC mode is shown in Figure 7. Advanced AES in CBC mode refers that a plaintext
block is combined with the previous cipher text block through an XOR operation before being encrypted. The original PET image,
watermarked encrypted image and decrypted image are shown in Figure 7 (a), (b) and (c) respectively.

(a) Original PET image (b) watermarked/ciphered image (c) Decrypted image

Figure 7: Evaluated images using AES

71
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)

(a)Encryption side (b)Decryption side

Figure 8: Histogram analysis of PET image

In order to verify its integrity, histogram analysis is taken for In decryption side, histogram is plotted for input image which is
original input images and decrypted images. Histogram analysis equal to the encrypted image, chaotic baker image, and the
is taken for original input PET image 6(a) and baker image 6(b) decrypted image which is equal to the original image. Here, the
and its encrypted image 7(b), in encryption side and decryption histogram of the original input image and decrypted image both
side is shown in Figure 8. are same.

In encryption side, the histogram is plotted for the original PET The analysis is taken and compared the sample input images
image, baker key [2 4 2] is applied to an input image and the which has in Figure 5. The output performance is measured for
resultant image is a chaotic baker image, and encrypted image. those images and the measured value is tabulated in Table 1 and
plotted in Figure 9 and 10 respectively .

Table 1: Performance Evaluation of hybrid baker map with AES in CBC mode for Ultrasound and PET images

S.No Parameters Ultrasound PET


1. PSNR (dB) 66.17 59.00
2. MSE 0.0151 0.0199
3. Entropy of original image (bits/pixel) 6.9371 5.999
4. Entropy of encrypted watermarked image (bits/pixel) 7.9997 7.997
5. Correlation coefficient 0.0019 0.0152
6. Embedding rate 0.1 0.1
7. Time required (sec) 2.572 3.134

Figure 9: Performance of Ultrasound images Figure 10: Performance of PET images

CONCLUSION verify the integrity and authenticity of medical images like


Ultrasound images and PET images even if it is encrypted. This
To avoid complexity of work and time, the system access to two system gives an efficient PSNR value of 66.17 dB for ultrasound
messages in the spatial domain and encrypted domain images and 59.17 dB for PET images. This improved PSNR
concurrently. These two messages with hash code, pseudo value represents noise free or error free output image because of
random sequence of bits and authenticity code are embedded to its low mean square error value. At the same time the system

72
Amudha K et al. Int. Res. J. Pharm. 2017, 8 (4)

gives high entropy and low correlation coefficient value due to for verifying the Reliability of Medical Images, IEEE
the process of baker map preprocessing tool. This system Transactions on Information Technology in Biomedicine
maintains the embedding rate upto 0.1bpp and reduces the 2012; 16:891-899.
processing time to 2.572 sec due to concurrent double 10. Epstein M A, Pasieka M S, Lord W P, Wong S T C,
watermark. Mankovich N J. Security for the digital information age of
medicine: issues, applications, and implementation. Journal
REFERENCES of Digital Imaging 1998; 11:33-44.
11. Giakoumaki, Sotiris Pavlopoulos, Dimitris Koutsouris.
1. Coatrieux G, Le Guillou C, Cauvin J M, Roux C. Reversible Multiple Image Watermarking Applied to Health
watermarking for knowledge digest embedding and Information Management. IEEE Transactions on
reliability control in medical images. IEEE Transactions on Information Technology in Biomedicine 2006; 10:722-732.
information technology in biomedicine 2009; 13:158-165. 12. Gouenou Coatrieux, Hui Huang, Huazhong Shu,Limi Luo,
2. Rajendra Acharya U, Acharya D, Subbanna Bhat P, Christian Roux. A Watermarking based Medical Image
Niranjan U C. Compact storage of medical images with Integrity Control System and an Image Moment Signature
patient information. IEEE Transactions on information for Tampering Characterization. IEEE Journal of
technology in biomedicine 2001; 5:320–323. Biomedical and Health Informatics 2013; 17:1057-1067.
3. Shiguo L, Zhongxuan L, Zhen R, Haila W. Commutative 13. Mohamed M Abd-Eldayem. A proposed security technique
encryption and watermarking in video compression, IEEE based on watermarking and encryption for digital imaging
Transactions on Circuits Systems Video Technology 2007; and communications in medicine. Elesiver Egyptian
17:774–778. Informatics Journal 2014,14:1-13.
4. Chen B, Wornell G W. Quantization index modulation: A 14. Mostafa S A K, El- sheimy N, Tolba A S, Abdelkader F M,
class of provably good methods for digital watermarking Elhindy H M. Wavelet packets-based blind watermarking
and information embedding. IEEE Transactions on for medical image management. Journal of Biomedical
information theory 2001;47: 1423–1443. Engineering 2010; 4:93-98.
5. Al-Qershi O M, Khoo B E. Authentication and data hiding 15. Ni, Z, Shi, Y Q, Ansari, N, Su, W. Reversible data hiding.
using a hybrid ROI-based watermarking scheme for DICOM IEEE Transactions on Circuits and Systems for Video
images. Journal of Digital Imaging 2011; 24:114-125. Technology 2006; l6:354–362.
6. Boucherkha S, Benmohamed M. A lossless watermarking 16. Ou, Y, Sur, C, Rhee, K H. Region-based selective
based authentication system for medical images. World encryption for medical imaging Frontiers in Algorithmics.
Academy of Science and Technology 2007; 1:20-23. Springer 2007; 4613:62–73.
7. Celik M U, Sharma G, Tekalp AM, Saber E. Lossless 17. Qingqi Pei, Xiang Wang, Yuan Li, Hui Li. Adaptive
generalized-LSB data embedding. IEEE Transactions on Reversible Watermarking with Improved Embedding
image processing 2005; 14:253–266. Capacity. Elsevier Journal of Systems and Software 2013;
8. Chao H M, Hsu C M, Miaou S G. A data-hiding technique 86:2841-2848.
with authentication, integration, and confidentiality for 18. Tan, C K, Ng, C, Xu, X, Poh, C L, Guan, Y L, Sheah, K.
electronic patient records. IEEE Transactions on Security protection of DICOM medical images using dual-
Information Technology in Biomedicine 2002; 6:46-53. layer reversible watermarking with tamper detection
9. Dalel Bouslimi, Gouenou Coatrieux, Michel Cozic, capability. Journal of Digital Imaging 2011; 24:528-540.
Christian Roux. A Joint Encryption/Watermarking System

Cite this article as:

Amudha K et al. Hybrid baker map with AES in Cipher block


chaining mode in medical images. Int. Res. J. Pharm.
2017;8(4):67-73 http://dx.doi.org/10.7897/2230-8407.080451

Source of support: Nil, Conflict of interest: None Declared

Disclaimer: IRJP is solely owned by Moksha Publishing House - A non-profit publishing house, dedicated to publish quality research, while
every effort has been taken to verify the accuracy of the content published in our Journal. IRJP cannot accept any responsibility or liability for
the site content and articles published. The views expressed in articles by our contributing authors are not necessarily those of IRJP editor or
editorial board members.

73

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy