so the original data can always be retrieved.
However, with the tuneable quantization stepsize
parameter, the fidelity of the MREG sequences
carrying the EEG signal can be controlled. Best
quality figures are attained with low down-sampling.
ROI segmentation reduces capacity so different
quantization stepsizes were tested finding out that
fair fidelity is maintained with the use of 64
histogram bins in embedding or higher. In those
cases, PSNR was maintained over 40 dB which is
generally considered a threshold when it comes to
imperceptibility.
There are certain cases where the image requires
absolute fidelity which practically means that it
should be visually identical to the original MREG
throughout all its phases of use. This also concerns
usage before data is extracted and reversed for the
analyses’ purposes. For instance in applications
requiring preview of the MREG, it is important that
higher quantization is avoided, and thus ROI
segmentation should preferably not be considered.
Otherwise visible artefacts which can be disturbing
might appear on the MREG. Alternatively, EEG
compression can be a solution for this problem
because lower quantization can be enough for the
required capacity.
5 CONCLUSIONS
This paper presented a method for hiding EEG or
other physiological signals into MREG with a main
purpose of providing efficiency in data management
and storage. Furthermore, the paper addressed
security issues, i.e. confidentiality, availability and
reliability of content. Tamper proofing capabilities
are additionally provided as small alterations on the
host image affect hidden data and thus illegitimate
extracted data or digital signatures imply data
tampering. The data hiding method can guarantee
with the proper quantization settings high fidelity
between the original MREG sequence and its
version that carries hidden data. Moreover
reversibility is available. Along extraction of data,
the method reverses the MREG that carries hidden
data to its original state. Last, temporal
synchronization between EEG and MREG data is
always maintained.
In future work, we will develop methods for
increasing data hiding capacity. The purpose is to
combine more data modalities hosted in medical
data.
REFERENCES
Collberg, C., and Nagra, J., 2010. Surreptitious software.
Addison-Wesley, Upper Saddle River, NJ, 1
st
edition.
Coatrieux, G., Lecornu, L., Sankur, B., and Roux, C.,
2006. A review of image watermarking applications in
healthcare, In Engineering in Medicine and Biology
Society, 28th Annual International Conference of the
IEEE, pages 4691–4694.
Cox, I., Miller, M., Bloom, J., Fridrich, J., and Kalker, T.,
2007. Digital watermarking and steganography.
Morgan Kaufmann. Burlington, MA, 2
nd
edition.
Czisch, M., Wehrle, R., Kaufmann, C., Wetter, T. C.,
Holsboer, F., Pollmacher, T., and Auer, D. P., 2004.
Functional MRI during sleep: BOLD signal decreases
and their electrophysiological correlates. In European
Journal of Neuroscience, volume 20, pages 566–574.
Dharwadkar, N. V., Amberker, B., Panchannavar, S., and
Panchannavar, P., 2010. Reversible fragile medical
image watermarking with zero distortion. In Int’l
Conference in Computer and Communication
Technology, IEEE, pages 248–254.
Fallahpour, M., Megias, D., and Ghanbari, M., 2011.
Reversible and highcapacity data hiding in medical
images. In IET Image Processing, 5(2):190–197.
Goldberger, A. L., Amaral, L. A., Glass, L., Hausdorff, J.
M., Ivanov, P. C., Mark, R. G., Mietus, J. E., Moody
G. B., Peng C. K., and Stanley, H. E., 2000.
Physiobank, physiotoolkit, and physionet components
of a new research resource for complex physiologic
signals. In Circulation, 101(23):215–220.
Gonzalez, R. C., Woods, R. E., 2002. Digital image
processing, Prentice-Hall. Upper Saddle River, NJ, 3
rd
edition.
Grover, D., 1997. The protection of computer software -
its technology and applications, Cambridge University
Press. NY.
Jacobs, J., Stich, J., Zahneisen, B., Assländer, J.,
Ramantani, G., Schulze-Bonhage A., Korinthenberg,
R., Hennig, J., and LeVan, P., 2014. Fast fMRI
provides high statistical power in the analysis of
epileptic networks. in Neuroimage, volume 88, pages
282–294.
Jenkinson, M., Pechaud, M., and Smith. S., 2005. BET2:
MR-based estimation of brain, skull and scalp
surfaces. In Eleventh Annual Meeting of the
Organization for Human Brain Mapping, volume 17.
Makeig, S., Westerfield, M., Jung, T. P., Enghoff, S.,
Townsend, J., Courchesne, E., and Sejnowski, T. J.,
2002. Dynamic brain sources of visual evoked
responses. In Science, volume 295, pages 690–694.
Menon, V., and Crottaz-Herbette, S., 2005. Combined
EEG and fMRI studies of human brain function. In
International Review of Neurobiology, volume 66,
pages 291–321.
National Institute of Standards and Technology, 2014.
Descriptions of SHA-256, SHA-384, and SHA-512.
csrc.nist.gov/groups/STM/cavp/documents/shs/sha256
-384-512.pdf.