By Topic

Watermarking to Enforce Medical Image Access and Usage Control Policy

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Wei Pan ; Inst. Telecom, Technopole Brest-Iroise, Brest, France ; Coatrieux, G. ; Cuppens-Boulahia, N. ; Cuppens, F.
more authors

In this paper, we propose integrating watermarking technology and access control model in order to enhance the protection of medical images in distributed healthcare infrastructures. For that purpose, we consider the well known organization based access control model (OrBAC) to express policy due to the intrinsic dynamic nature of the healthcare environment. OrBAC advantage is that it can specify contextual authorizations and obligations using "context", a native notion of this model, which may be viewed as a set of conditions to be satisfied when activating a given authorization or obligation. We suggest the embedding of some useful information into one image, information that can be used for tracing or controlling the access/usage of this image. In a more general way, we discuss how loss less or reversible watermarking can be instrumented by the OrBAC model. The loss less property preserves the image diagnostic value but imposes some other constraints. We illustrate the potential of such a watermarking OrBAC access and usage rules based on a new reversible watermarking scheme we proposed. Based on its performances regarding different image modalities, we analyze how this one can be used to convey such access control elements.

Published in:

Signal-Image Technology and Internet-Based Systems (SITIS), 2010 Sixth International Conference on

Date of Conference:

15-18 Dec. 2010