medical image protection (2d/3d) data hiding, selective...

27
Medical image protection (2D/3D) data hiding, selective encryption and secret sharing William PUECH ICAR (Image & Interaction) LIRMM - CNRS, Univ. Montpellier November 14, 2019 William PUECH (ICAR) Medical image protection November 14, 2019 1 / 12

Upload: others

Post on 10-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Medical image protection (2D/3D)data hiding, selective encryption and secret sharing

William PUECH

ICAR (Image & Interaction)LIRMM - CNRS, Univ. Montpellier

November 14, 2019

William PUECH (ICAR) Medical image protection November 14, 2019 1 / 12

Page 2: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

During ...

StorageAccess control: identification and authorizationAvailability

TransmissionConfidentialityIntegrityAuthentication

Visualization

William PUECH (ICAR) Medical image protection November 14, 2019 2 / 12

Page 3: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

From CISCO, visual data (image and video) = 80% of the globalinternet traffic en 2019 (against 67% en 2014)Need to propose specific methods to protect visual data:

Data hiding (watermarking, steganography)Image forensicsBiometricsImage encryption

William PUECH (ICAR) Medical image protection November 14, 2019 2 / 12

Page 4: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

Data hiding

William PUECH (ICAR) Medical image protection November 14, 2019 2 / 12

Page 5: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

Image forensics

William PUECH (ICAR) Medical image protection November 14, 2019 2 / 12

Page 6: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

Biometrics

William PUECH (ICAR) Medical image protection November 14, 2019 2 / 12

Page 7: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

Image encryption

William PUECH (ICAR) Medical image protection November 14, 2019 2 / 12

Page 8: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

Hybrid coding for safe transmission

Encryption, data hiding and compressionImages, image sequences, videos and 3D objects

William PUECH (ICAR) Medical image protection November 14, 2019 3 / 12

Page 9: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

Hybrid coding for safe transmission

Encryption, data hiding and compressionImages, image sequences, videos and 3D objects

Image compression

William PUECH (ICAR) Medical image protection November 14, 2019 3 / 12

Page 10: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

Hybrid coding for safe transmission

Encryption, data hiding and compressionImages, image sequences, videos and 3D objects

Image encryption

William PUECH (ICAR) Medical image protection November 14, 2019 3 / 12

Page 11: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

Hybrid coding for safe transmission

Robust to noiseCompatible with compressionFast: access in real timeThe secret is based on a key (secrete or private key)

The Algorithm is knownPrinciple of Kerckhoffs [KER 83]

Norms and standards

A. Kerckhoffs.La cryptographie militaire.Journal des sciences militaires, vol. 9, pp. 5–38, 1883.

William PUECH (ICAR) Medical image protection November 14, 2019 4 / 12

Page 12: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

Image data hiding

The art to embed a message in a image [COX 08] :invisibility: statistically invisibleno removable: robust to transformationspayload: size of the hidden messagesecurity: robust to attackscomplexity: real time application

Data hiding: large payloadSteganography: invisibilityWatermarking: robust to attacks

I. Cox.Digital Watermarking and Steganography.The Morgan Kaufmann Series in Multimedia Information and Systems, M. Kaufmann, Ed. Morgan Kaufmann Publishers,2008.

William PUECH (ICAR) Medical image protection November 14, 2019 5 / 12

Page 13: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Visual data security

Image security

Image encryption

The art to mask the data:confidentiality: data protectionauthentication: emitter and receiverintegrity: ensure the totality and the content of the datanon repudiation: ACK

For visual data:Image encryption example

Image encryption another example

Perceptual signature example

I. Cox.Digital Watermarking and Steganography.The Morgan Kaufmann Series in Multimedia Information and Systems, M. Kaufmann, Ed. Morgan Kaufmann Publishers,2008.

William PUECH (ICAR) Medical image protection November 14, 2019 5 / 12

Page 14: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Medical image protection

Medical image protection (2D/3D): data hiding,selective encryption and secret sharing

Outline

1) Entropy measurement2) High capacity RDHEI3) Secret image sharing

William PUECH (ICAR) Medical image protection November 14, 2019 6 / 12

Page 15: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Conclusion

Image security is necessary ...... and should become mandatory.

Image encryption can be used for several applications.

In the case of RDHEI: cryptanalysis ans steganalysis(2016-CNRS PEPS project: WESTERN).Confidentiality metrics.

GT/action Sécurité et données multimédia

William PUECH (ICAR) Medical image protection November 14, 2019 7 / 12

Page 16: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Remerciements

William PUECH (ICAR) Medical image protection November 14, 2019 8 / 12

Page 17: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Visual data security: quality metric

William PUECH (ICAR) Medical image protection November 14, 2019 9 / 12

Page 18: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Visual data security: quality metric

William PUECH (ICAR) Medical image protection November 14, 2019 9 / 12

Page 19: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Visual data security: quality metric

William PUECH (ICAR) Medical image protection November 14, 2019 9 / 12

Page 20: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Visual data security: quality metric

William PUECH (ICAR) Medical image protection November 14, 2019 9 / 12

Page 21: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Visual data security: quality metric

William PUECH (ICAR) Medical image protection November 14, 2019 9 / 12

Page 22: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Visual data security: quality metric

William PUECH (ICAR) Medical image protection November 14, 2019 9 / 12

Page 23: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Perceptual signatures: data integrity

Signature of a text

M1 = “Aujourd’hui il fait beau dans le sud de la France, même si il y a un peude vent...”S1 = Ox2534A8C08E12F4A8M2 = “Aujourd’hui il fait beau dans le sud de la France, même si il y a un peude mistral...”S2 = Ox3D68AB9310E38B51

Signature of an image

S1(original image (760 kB)) = S2(compressed image (224 kB))

back

William PUECH (ICAR) Medical image protection November 14, 2019 10 / 12

Page 24: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Perceptual signatures: data integrity

Signature of a text

M1 = “Aujourd’hui il fait beau dans le sud de la France, même si il y a un peude vent...”S1 = Ox2534A8C08E12F4A8M2 = “Aujourd’hui il fait beau dans le sud de la France, même si il y a un peude mistral...”S2 = Ox3D68AB9310E38B51

Signature of an image

S1(original image (760 kB)) = S2(compressed image (224 kB))

back

William PUECH (ICAR) Medical image protection November 14, 2019 10 / 12

Page 25: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Image encryption

(a) (b)

(c) (d)

a) Original image, b) histogram, c) encrypted image by scrambling, d) histogram of the encrypted image.

William PUECH (ICAR) Medical image protection November 14, 2019 11 / 12

Page 26: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Image encryption

(a) (b)

(c) (d)

a) Original image, b) histogram, c) encrypted image with a stream cipher algorithm, d) histogram of the encrypted image.

back

William PUECH (ICAR) Medical image protection November 14, 2019 11 / 12

Page 27: Medical image protection (2D/3D) data hiding, selective ...wpuech/enseignement/master_informatique/H… · Hybrid coding for safe transmission Encryption, data hiding and compression

Conclusion

Image encryption

XOR encryption.

back

William PUECH (ICAR) Medical image protection November 14, 2019 12 / 12