Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems

In modern healthcare technology involving diagnosis through medical imaging systems, compression and data transmission play a pivotal role. Medical imaging systems play an indispensable role in several medical applications where camera/scanners generate compressed images about a patient's inter...

Full description

Bibliographic Details
Main Authors: Anirban Sengupta, Mahendra Rathor
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8949465/
id doaj-0db7ce7e2c3740a49a6479b1416b2a25
record_format Article
spelling doaj-0db7ce7e2c3740a49a6479b1416b2a252021-03-30T01:20:02ZengIEEEIEEE Access2169-35362020-01-0186543656510.1109/ACCESS.2019.29637118949465Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging SystemsAnirban Sengupta0https://orcid.org/0000-0002-8215-7903Mahendra Rathor1https://orcid.org/0000-0001-8633-7322IIT Indore, Indore, IndiaIIT Indore, Indore, IndiaIn modern healthcare technology involving diagnosis through medical imaging systems, compression and data transmission play a pivotal role. Medical imaging systems play an indispensable role in several medical applications where camera/scanners generate compressed images about a patient's internal organ and may further transmit it over the internet for remote diagnosis. However, tampered or corrupted compressed medical images may result in wrong diagnosis of diseases leading to fatal consequences. This paper aims to secure the underlying JPEG compression processor used in medical imaging systems that generates the compressed medical images for diagnosis. The proposed work targets to secure the JPEG compression processor against well-acknowledged threats such as counterfeiting/cloning and Trojan insertion using double line of defense through integration of robust structural obfuscation and hardware steganography. The second line of defense incorporates stego-key based hardware steganography that augments the following: non-linear bit manipulation using S-box (confusion property), diffusion property, alphabetic encryption, alphabet substitution, byte concatenation mode, bit-encoding (converting into stego-constraints) and embedding constraints. The results of the proposed approach achieve robust security in terms of significant strength of obfuscation, strong stego-key size (775 bits for JPEG compression processor and 610 bits for JPEG DCT core) and probability of coincidence of 9.89e-8, at nominal design cost.https://ieeexplore.ieee.org/document/8949465/Medical imagingJPEG compression processordouble line of defensethreatshardware steganographyobfuscation
collection DOAJ
language English
format Article
sources DOAJ
author Anirban Sengupta
Mahendra Rathor
spellingShingle Anirban Sengupta
Mahendra Rathor
Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems
IEEE Access
Medical imaging
JPEG compression processor
double line of defense
threats
hardware steganography
obfuscation
author_facet Anirban Sengupta
Mahendra Rathor
author_sort Anirban Sengupta
title Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems
title_short Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems
title_full Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems
title_fullStr Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems
title_full_unstemmed Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems
title_sort structural obfuscation and crypto-steganography-based secured jpeg compression hardware for medical imaging systems
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description In modern healthcare technology involving diagnosis through medical imaging systems, compression and data transmission play a pivotal role. Medical imaging systems play an indispensable role in several medical applications where camera/scanners generate compressed images about a patient's internal organ and may further transmit it over the internet for remote diagnosis. However, tampered or corrupted compressed medical images may result in wrong diagnosis of diseases leading to fatal consequences. This paper aims to secure the underlying JPEG compression processor used in medical imaging systems that generates the compressed medical images for diagnosis. The proposed work targets to secure the JPEG compression processor against well-acknowledged threats such as counterfeiting/cloning and Trojan insertion using double line of defense through integration of robust structural obfuscation and hardware steganography. The second line of defense incorporates stego-key based hardware steganography that augments the following: non-linear bit manipulation using S-box (confusion property), diffusion property, alphabetic encryption, alphabet substitution, byte concatenation mode, bit-encoding (converting into stego-constraints) and embedding constraints. The results of the proposed approach achieve robust security in terms of significant strength of obfuscation, strong stego-key size (775 bits for JPEG compression processor and 610 bits for JPEG DCT core) and probability of coincidence of 9.89e-8, at nominal design cost.
topic Medical imaging
JPEG compression processor
double line of defense
threats
hardware steganography
obfuscation
url https://ieeexplore.ieee.org/document/8949465/
work_keys_str_mv AT anirbansengupta structuralobfuscationandcryptosteganographybasedsecuredjpegcompressionhardwareformedicalimagingsystems
AT mahendrarathor structuralobfuscationandcryptosteganographybasedsecuredjpegcompressionhardwareformedicalimagingsystems
_version_ 1724187212887621632