A Digital Watermarking Based Authentication Scheme for the Prevention of Medical Identity Theft in Healthcare Sector
The modern type of healthcare is evolving with advances in technology. The latest developments of the technology are now electronic medical records and sensor networks integrated to track the in-home medical over the internet. And as such, there is a need to eliminate the security issue associated with data over the internet. This is because of any modifications to medical records may have a detrimental impact on the patient. A digital watermarking is proposed in this work which will detect any attempt to modify patient data. Before the embedding process, a discrete wavelet transformation is created with 8*8 non-overlapping medical test image blocks. A 64-bit binary number, the equivalent of the patient entry date numbers and the file ID embedded in the respective patient's medical image by quantizing the coefficient of each row of the highest frequency components. The watermark is extracted after the medical image is moved to its desired destination for authentication check and comparison with the original watermark. The mean value of the peak signal to noise ratio (PSNR) that indicates the level of imperceptibility is found to be 82,88 dB, moreover, the mean square error values that indicate the level of distortion of the watermarked image is 7.9e-4. The watermarked image was subjected to several attacks, and each was identified by the proposed scheme. Consequently, the proposed scheme allows for the simple and excellent identification capability of any changes made to the medical image.
Al-Qershi, O. M., & Khoo, B. E. (2011). Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. Journal of Digital Imaging, 24(1), 114-125.
Ali, N. a., Khalifa, O., & Abd Manaf, A. (2013). ICT in telemedicine: Conquering privacy and security issues in health care services. Electronic Journal of Computer Science and Information Technology: eJCIST, 4(1).
Gao, T., & Gu, Q. (2007). Reversible image authentication based on combination of reversible and LSB algorithm. Paper presented at the 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).
Hajjaji, M. A., Bourennane, E.-B., Ben Abdelali, A., & Mtibaa, A. (2014). Combining Haar wavelet and Karhunen Loeve transforms for medical images watermarking. BioMed research international, 2014.
Hajjaji, M. A., Bourennane, E.-B., Mtibaa, A., & Ochoa-Ruiz, G. (2013). A digital watermarking algorithm based on quantization of the DCT: Application on medical imaging. Paper presented at the 2013 International Conference on Control, Decision and Information Technologies (CoDIT).
HIPPA. (2013). Survey of Medical Identity Theft. Retrieved from http://www.ama-asn.org/ama/pub/physician-resources/solutions-mamaging-your-practice/coding-billing-insurance/hippahealth-insurance-portability-accountability-act
Hung, K.-M., Chen, T.-W., Su, W.-K., & Kao, C.-N. (2012). Automatic image authentication and recovery using multiple watermarks. Paper presented at the 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).
Kannammal, A., & Rani, S. S. (2012). Authentication of medical images using integer wavelet transforms. International Journal of Emerging Technology and Advanced Engineering, 2(9), 104-108.
Kannammal, A., & Subha Rani, S. (2014). Two level security for medical images using watermarking/encryption algorithms. International Journal of Imaging Systems and Technology, 24(1), 111-120.
Olanrewaju, R., Khalifa, O., Abdulla, A., & Khedher, A. M. (2011). Detection of alterations in watermarked medical images using Fast Fourier Transform and Complex-Valued Neural Network. Paper presented at the 2011 4th International Conference on Mechatronics (ICOM).
Olanrewaju, R. F., Yahuza, M., Ali, N. a. B., & Khalifa, O. (2014). Investigation of medical identity theft in healthcare sector: Its statistics, effects and way out. Paper presented at the 4th International Cryptology and Information Security Conference 2014, Cryptology 2014.
Pournaghshband, V. (2008). A new watermarking approach for relational data. Paper presented at the Proceedings of the 46th annual southeast regional conference on XX.
Wu, J. H., Chang, R.-F., Chen, C.-J., Wang, C.-L., Kuo, T.-H., Moon, W. K., & Chen, D.-R. (2008). Tamper detection and recovery for medical images using near-lossless information hiding technique. Journal of Digital Imaging, 21(1), 59-76.