Open Access

Simultaneous storage of medical images in the spatial and frequency domain: A comparative study

  • Jagadish Nayak1Email author,
  • P Subbanna Bhat2,
  • Rajendra Acharya U3 and
  • Niranjan UC1
BioMedical Engineering OnLine20043:17

DOI: 10.1186/1475-925X-3-17

Received: 22 August 2003

Accepted: 05 June 2004

Published: 05 June 2004

Abstract

Background

Digital watermarking is a technique of hiding specific identification data for copyright authentication. This technique is adapted here for interleaving patient information with medical images, to reduce storage and transmission overheads.

Methods

The patient information is encrypted before interleaving with images to ensure greater security. The bio-signals are compressed and subsequently interleaved with the image. This interleaving is carried out in the spatial domain and Frequency domain. The performance of interleaving in the spatial, Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) coefficients is studied. Differential pulse code modulation (DPCM) is employed for data compression as well as encryption and results are tabulated for a specific example.

Results

It can be seen from results, the process does not affect the picture quality. This is attributed to the fact that the change in LSB of a pixel changes its brightness by 1 part in 256. Spatial and DFT domain interleaving gave very less %NRMSE as compared to DCT and DWT domain.

Conclusion

The Results show that spatial domain the interleaving, the %NRMSE was less than 0.25% for 8-bit encoded pixel intensity. Among the frequency domain interleaving methods, DFT was found to be very efficient.

Background

Digital watermarking is a type of data hiding or steganography. It entails inserting some data into a digital image, a sound file or a digital video [4, 12]. This data can be used to verify ownership. A user can extract the data and compare it with the original embedded data to determine ownership of the image. Usually the mere presence of something resembling is the original embedded data is enough to justify for copyright violation purposes. Digital watermarking have several other uses, such as fingerprinting, authentication, integrity verification purposes, content labeling, usage control and content protection [19, 8]. The efficient utilization of bandwidth of communication channel and storage space can be achieved, when the reduction in data size is done. Isolated transmission of image and data requires more bandwidth in transmission and more memory space during storage. The large amount of patient information such as bio signals, word documents and medical images required to be exchanged between hospitals. Interleaving one form of data such as 1-D signal or text file over digital images can combine the advantages of data security with efficient memory utilization [13].

The watermarking techniques are divided into basic categories

Spatial domain watermarking [12], in which the Least two significant bits of the image pixel is replaced with that of watermark (1D signal or text). This method of spatial domain interleaving is susceptible to noise. Figure 1 shows the proposed method for interleaving in spatial domain.
Figure 1

Scheme for storage in spatial domain Interleaving

Frequency domain watermarking, in which the image is first transformed to the frequency domain and then the low frequency components are modified to contain the text or signal. Watermarking can be applied in the frequency domain by applying transforms like Discrete Fourier Transform (DFT), Discrete Cosine Transform Discrete Wavelet Transform (DWT). Since high frequencies will be lost by compression or scaling, the watermark signal is applied to the lower frequencies or applied adaptively to frequencies that contain important information of the original picture. Since watermarks applied to the frequency domain will be dispersed over the entirety of the image upon inverse transformation, this method is not susceptible to defeat by cropping as in the spatial domain.

Many authors have proposed the protecting the ownership rights through the watermarking [7, 10, 13, 1517]. Swanson et al, have proposed the robust data hiding techniques for images [2325]. And also authors have implemented adaptive watermarking in the DCT domain [3, 5, 14, 26]. Many authors have implemented the Wavelet based watermarking techniques in the Wavelet domain [1, 6, 20, 27]. Rajendra et al has interleaved the patient information and heart rate data in the various medical images [21]. Figure 1 shows the scheme for interleaving in the spatial domain. In this work, the interleaving is extended to the DFT, DCT and DWT domain. A gray scale image file (128 × 128 pixels) is used in all the interleaving process.

Methods

Encryption of text file

The information to be stored is encrypted before watermarking to enhance the security. Highly secured algorithm called as Advanced Encryption Standard (AES), which is developed by National Institute of standards and Technology, is used for the encryption of text data. This algorithm is also called as Rijndael algorithm, which is designed by John Daemen and Vincent Rijmen. Rijndael's key length is defined to be either 128, or 192 or 256 bits in accordance with the requirements of the AES [9]. Figure 2(a) and 2(b) shows the original patient data and the encrypted data respectively.
Figure 2

Encryption of patient information: (a) Original patient information, (b) Encrypted patient information

Encryption of bio-signal graph

The Differential Pulse Code Modulation (DPCM) technique is extensively used to reduce the dynamic range of the signal. The DPCM is used here for encrypting the ECG signal. The differential error output (which is random and uncorrelated) is used as the encrypted version of the original signal. The DPCM is a predictive coding technique where in the present sample x n in a signal is expressed as a sum of linearly weighted past sample x n-1and error signal e n [11, 22].

x n = px n-1+ e n     (1)

The predictor coefficient p is determined by the least square technique, as

The differential error e n is stored along with the first sample x 0 and the linear predictor coefficient p. The ECG signal x n can be reconstructed from the error signal by auto-regression technique (Eq. (1)). Thus, the symbol pair (p, x 0) forms the key for the encrypted ECG signal e n . This quantized e n is interleaved with the LSB of image DCT/DWTs. As the dynamic range of the error signal e n is very small, it is coded with only 4 bits.

Interleaving in spatial domain

The ASCII code of the encrypted text is swapped with the least significant bit of the pixels in the image. Each bit in the ASCII code of the text is placed at last bit of the pixels in the image. This procedure is repeated for all the ASCII codes of given text. It can be seen that one ASCII code can be hidden in eight pixels of the given image. Similarly the graphic files of bio-signals are also interleaved in the pixels using above said procedure. The graphic file is encrypted using DPCM. In this study ECG is used as a bio-signal which is encrypted as given in the section 3.2 of this paper. Fig. 3(a),3(b) and 3(c) are the original, reconstructed and error signals of the DPCM.
Figure 3

Results of DPCM techniques: a) Original signal b) Reconstructed ECG signal C) Error signal

Interleaving in DFT domain

DFT magnitude is robust to translation or shift attacks in the domain since cyclic translation of image in the spatial domain does not affect DFT amplitude. DFT offers the possibility of interleaving either in the magnitude or the phase of the DFT coefficients. The phase is far more important than the magnitude of the DFT coefficients for the intelligibility of an image. Hence the interleaving is done in the magnitude coefficients of the DFT coefficients. The DFT is taken for the blocks 8 × 8 pixels of the image, selected in raster fashion. All the DFT coefficients are not modified. The low frequency components of the image are perceptually more significant ones and any modification of them deteriorates the image fidelity. Therefore interleaving should be carried out in the high frequency region. The high frequency components are less significant in terms of fidelity. Hence the compression techniques use this property and suppress the high frequency coefficients. Hence the interleaving is done in the bandpass coefficients of the magnitude of the DFT coefficients. Figure 4 shows the interleaving procedure adopted in the DFT domain.
Figure 4

Scheme for Interleaving in DFT Domain

Interleaving in DCT domain

Blocks of 8 × 8 pixels are selected in a raster fashion from the image to be compressed. This forms the input to the encoder. Applying DCT to these blocks transforms the image from spatial domain to frequency domain. The DCT contains the DC coefficient, which measures the zero frequency, and 63 AC coefficients. The DCT coefficients are quantized according to perceptual criteria. For interleaving the LSB of each DCT coefficient is replaced by the text data (after the quantization and zigzag encoding). The eight bits of ASCII code in the text file will replace the LSB of eight consecutive DCT coefficients of the image from the middle frequency range onwards (from 32 to 63 coefficients). If the data file is a graphic signal having 16-bit word, 16 consecutive DCT coefficients are used for interleaving a single word. The LSB is chosen for data interleaving because, the resulting degradation of image is minimal. In the decoding side, the interleaved text or graphical signal can be obtained by de-interleaving i.e., extracting the LSBs and concatenating the same, before, inverse quantization, zigzag coding and inverse DCT. The Interleaving procedure implemented in DCT domain is shown in figure 5.
Figure 5

Scheme for Interleaving in DCT Domain

Interleaving in Wavelet domain

Wavelets are the functions defined over a finite interval and having average value zero. The basic idea of the Wavelet transform is to represent any arbitrary function f(t) as a superposition of a set of such wavelets or basis functions. These basis functions are obtained from a single prototype Wavelet called the mother Wavelet, by dilations or contractions (scaling) and translations (shifts). Besides the usage of DCT in JPEG, a new compression technique called JPEG2000 uses Discrete Wavelet Transform. The blocking artifacts of DCT in JPEG are noticeable and annoying. In Wavelet based compression we get higher compression and blocking artifacts are avoided. The Wavelet transform can be implemented using filter banks [Mallat, 1998]. The signal is decomposed into various subbands octave-band decomposition is most widely used. Figure 6 shows the scheme used for DWT domain interleaving process. The Figure 7. shows three level octave band decomposition. The DWT gives three parts of multiresolution representation and one part of multiresolution approximation [Mallat, 1998]. It is similar to hierarchical subband system, where subbands are logarithmically spaced in frequency. The subbands labeled LH1, HL1, HH1 of multiresolution representation represent the finest scale Wavelet coefficients. To obtain next coarser scale of the Wavelet coefficients, the subband LL1 i.e. multiresolution approximation is further decomposed and critically subsampled. We perform three level decomposition of the image and embed the text/Graphic file information into High frequency region band respectively (Starting from the 32nd coefficient to 64th coefficient). The text and graphic file can be extracted from the DWT coefficients before inverse quantization, inverse zigzag coding and taking inverse discrete Wavelet transform and to recover the original image.
Figure 6

Scheme for Interleaving in DWT Domain

Figure 7

Scheme for DWT decomposition of an image

Results

Three types of medical images CT, MRI and Angiogram images of size 128 × 28 pixels are chosen. The text and the error signal (of DPCM) data size is 130 bytes. The ASCII codes of the encrypted text shown in Fig. 2b are broken into bits and interleaved into the DFT coefficients of the pixels of CT image (Fig. 8a). The resulting image is shown in Fig. 8b. The error signal en obtained from DPCM shown in Fig. 3c, is interleaved into the DCT coefficients of the MRI image (Fig. 9a). The resulting interleaved images are shown in Fig. 9b. The ASCII code of the encrypted text (Fig. 2b) is again interleaved into the DWT coefficients of Angiogram image (Fig. 10a). And the result is shown in Fig. 10b. It can be seen from results, the process does not affect the picture quality. This is attributed to the fact that the change in LSB of a pixel changes its brightness by 1 part in 256. Fig. 11a and 11b show the intensity histograms of the original and interleaved (with encrypted text data of Fig. 2b) Angiogram images. It can be seen that the shape of the histogram bears resemblance to that of the original image. The change in the population of pixels of a specific intensity is definite in nature. There will be change in the pixel value of 1 or 0 depending on the bit used for interleaving. Hence, the modified histogram has the resemblance of the original histogram. A quantitative assessment of the method is obtained by evaluating the normalized root mean square error (NRMSE) as defined below:
Figure 8

Result of interleaving text in the CT Image in DFT domain: a) Original image b) Interleaved image

Figure 9

Result of interleaving DPCM error in the MRI Image in DCT domain: a) Original image b) Interleaved image

Figure 10

Result of interleaving in text in the Angiogram Image in DWT Domain: a) Original image b) Interleaved image

Figure 11

Histogram of CT images: a) Original Image b) Interleaved Image

where N = Total number of columns; M = Total number of rows in the image.

f(x, y) = The original pixel intensity; f w (x, y) = The modified (interleaved) pixel intensity

From the table 1, 2, 3 and 4, we can infer that, the %NMRSE is less for DFT and spatial domain interleaving. In DFT domain, the interleaving is done in the band pass coefficients of the magnitude of the DFT coefficients. In DCT and DWT domain the error is more due to the quantization.
Table 1

Results of the interleaving data with the image in spatial domain

Image

%NRMSE Text

%NRMSE Graphic Signal

CT

0.1986

0.1425

MRI

0.2435

0.1595

Angiogram

0.1845

0.1446

Table 2

Results of interleaving data with image in the DFT domain

Image

%NRMSE Text

%NRMSE Graphic Signal

% NRMSE For Non Interleaved image

CT

0.0346

0.0301

0.0258

MRI

0.0398

0.0350

0.0312

Angiogram

0.0349

0.0314

0.0275

Table 3

Results of interleaving data with image in the DCT domain

Image

%NRMSE Text

%NRMSE Graphic Signal

% NRMSE For Non Interleaved image

CT

0.2926

0.2684

0.2189

MRI

0.3416

0.3137

0.2597

Angiogram

0.2969

0.2892

0.2405

Table 4

Results of interleaving data with image in the DWT domain

Image

%NRMSE Text

%NRMSE Graphic Signal

% NRMSE For Non Interleaved image

CT

0.3612

0.3111

0.2713

MRI

0.4380

0.3766

0.3503

Angiogram

0.2605

0.1645

0.0064

Conclusion

Interleaving of the patient information such as text documents and physiological signals with medical images in the spatial and frequency domain is presented for efficient storage. Text files are encrypted using Rijndael algorithm and ECG signal is encrypted by DPCM technique, prior to interleaving. In the spatial domain the interleaving, the NRMSE was less than 0.25% for 8-bit encoded pixel intensity. Among the frequency domain interleaving methods, DFT was found to be very efficient. The NRMSE was found to be less than 0.04%. But the quantity of data interleaved will be less. Security of information can be further enhanced by choosing the position of the interleaved bit according to a specific plan known only to the authorized users.

Author Contribution

JN carried out analysis and implementation. PSB participated in the study and testing of the results.

RAU is coordinated in testing the results. NUC is participated in testing the results.

All authors read and approved the final manuscript.

Declarations

Authors’ Affiliations

(1)
Department of E & C Engg., Manipal Institute Of Technology
(2)
Department of E & C Engg., National Institute Of Technology Karnataka
(3)
Dept. of E&C, School of Engineering, Ngee Ann Polytechnic

References

  1. Antonini M, Barlaud M, Mathieu P, Daubechies I: Image Coding using wavelet transform. IEEE Transactions on Image Processing 1992,1(2):205–220. 10.1109/83.136597View ArticleGoogle Scholar
  2. Barni M, Bartolini F, Piva A: Copyright protection of digital images by means of frequency domain watermarking. Mathematics of Data/Image Coding, Compression and Encryption, Proceedings of SPIE 1998, 3456: 25–35.View ArticleGoogle Scholar
  3. Barni M, Bartolini F, Piva A: Improved Wavelet-Based Watermarking Through Pixel-Wise Masking. IEEETransactions on Image Processing 2001,10(5):783–791. 10.1109/83.918570View ArticleGoogle Scholar
  4. Bender W, Gruhl D, Morimoto N, Lu A: Techniques for data hiding. IBM System Journal 1996,35(3):313–336.View ArticleGoogle Scholar
  5. Bros AG, Pitas I: Image Watermarking using DCT domain constraints. Proceedings of IEEE international Conference on Image Processing 1996, 3: 231–234.View ArticleGoogle Scholar
  6. Cao JG, Fower JE, Younan NH: An Image-Adaptive Watermark Based on a Redundant Wavelet Transform. Proceedings of the International Conference on Image Processing, Greece 2001, 277–280.Google Scholar
  7. Cox J, Miller ML, Bloom JA: Digital Watermarking. San Fransisco, CA: Morgan Kauffman 2002.Google Scholar
  8. Craver , Scott , Boon-Lock , Yeung Minerva: Technical Trials and Legal Tribulations. Communications of ACM 1998,45(9):45–54. 10.1145/278476.278486View ArticleGoogle Scholar
  9. Daemen , Rijmen V: AES Proposal Rijndael, version 2. 1999. [http://citeseer.nj.nec.com/daemen98aes.html]Google Scholar
  10. Fabien AP, Petitcolas , Anderson Ross A, Kuhn Marcus G: Information hiding: A Survey. Proceedings of the IEEE 1999,85(7):1062–1077.Google Scholar
  11. Gonzalez RC, Wintz P: Digital Image Processing Addison-Wesley Publishing Co 1987.Google Scholar
  12. Berghel Hal, O' Grossman Lawrence: Protecting Ownership Rights Through Watermarking. IEEE Computer 1996, 101–103.Google Scholar
  13. Berghel Hal: Watermarking Cyberspace. Communications of the ACM 1997,40(11):19–24. 10.1145/265684.265687View ArticleGoogle Scholar
  14. Juan RHMA, Perez-Gonzalez F: DCT-Domain Watermarking Techniques for Still images: Detector Performance Analysis and a New Structure. IEEE Transactions on Image Processing 2000, 9: 55–68. 10.1109/83.817598View ArticleGoogle Scholar
  15. Knopp R, Robert A: Detection Theory and Digital Watermarking. Proceedings of SPIE 2000, 3971: 14–23.View ArticleGoogle Scholar
  16. Langelaar G, Setyawan I, Lagendijk R: Watermarking digital image and video data: a state-of-art overview. IEEE Signal Processing Magazine 2000, 17: 20–46. 10.1109/79.879337View ArticleGoogle Scholar
  17. LIN ET, DELP EJ: A review of data hiding in digital images. Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference, PICS'99, Savannah, Georgia 274–278. April 25–28, 1999
  18. Mallat S: A theory of multiresolution signal decomposition. IEEE Transactions on Pattern Analysis and Machine Intelligence 1989, 11: 674–694. 10.1109/34.192463View ArticleGoogle Scholar
  19. Memon , Nasir , Wong Ping wah: Protecting Digital Media Content. Communications of the ACM 1998,35(8):35–43. 10.1145/278476.278485View ArticleGoogle Scholar
  20. Ohnishi J, Matsui K: Embedding a seal into a picture under orthogonal wavelet transform. Proceeding of International Conference on Multimedia Computing and Systems 1996, 514–521.Google Scholar
  21. Acharya U Rajendra, Anand Deepthi, Bhat P Subbanna, UC Niranjan: Compact storage of medical images with patient information. IEEE Transactions on Information Technology in Biomedicine 2001,5(4):320–323. 10.1109/4233.966107View ArticleGoogle Scholar
  22. Haykins Simon: Communication Systems Wiley Eastern 1996.Google Scholar
  23. Swanson MD, Zhu B, Tewfik AH: Robst data hiding for images. Proceedings of the IEEE Digital Signal Processing Workshop, Leon, Norway 1996, 37–40.Google Scholar
  24. Swanson MD, Zhu B, Tewfik AH: Data Hiding for Video in Video. Proceedings of International Conference on Image Processing (ICIP'97) 1997, II: 676–679.View ArticleGoogle Scholar
  25. Swanson MD, Zhu B, Tewfik AH: Transparent robust image watermarking. Proceedings of IEEE International Conference on Image Processing 1996, 3: 211–214. 10.1109/ICIP.1996.560421View ArticleGoogle Scholar
  26. Tao B, Dickenson B: Adaptive Watermarking in the DCT Domain. Proceedings of International Conference on Accoustics, Speech and Signal Processing (ICASSP'97), Santa Barbara, California 1997, 4: 676–679.Google Scholar
  27. Tokur Y, Ercelebi E: Wavelet-Based Digital Image Watermarking for Copyright Protection. IJCI Proceedings of International XII, Turkish Symposium on Artificial Intelligence and Neural Networks 2003,1(1):47–49.Google Scholar

Copyright

© Nayak et al; licensee BioMed Central Ltd. 2004

This article is published under license to BioMed Central Ltd. This is an Open Access article: verbatim copying and redistribution of this article are permitted in all media for any purpose, provided this notice is preserved along with the article's original URL.

Advertisement