Microsoft Word - brain_2_2.doc 5 Access Management in Medical Image Databases Based on New Format and Contents Protection with Inverse Pyramid Decomposition Roumen Kountchev Technical University – Sofia, Sofia, Bulgaria rkountch@tu-sofia.bg Barna Iantovics Petru Maior University Tg. Mures, Romania barni_300@yahoo.com Vladimir Todorov T&K Engineering, Sofia, Bulgaria todorov_vl@yahoo.com Roumiana Kountcheva T&K Engineering, Sofia, Bulgaria kountcheva_r@yahoo.com Abstract: In the paper is presented one new approach for creation and management of medical image databases with multi-layer access, based on the Inverse Pyramid Decomposition (IPD). The archived visual data is compressed using the special IDP format, presented in detail in this paper. The new approach offers flexible tools for multi-layer transfer of the processed information with consecutively quality improvement, together with reliable content protection ensured by digital watermark insertion and data hiding. The IDP permits insertion of multiple watermarks in same file. Part of the visual information (specific regions of interest in the medical images) is hidden for the low access levels and could be revealed by authorized users only. Keywords: Hierarchical access in medical image databases, management of image databases, image content protection, compressed file format. 1. Introduction The multimedia databases (MD) are increasingly important part of computer and information sciences. Recently the large consortiums of hospitals in Western Europe already have or are in process of creating their own patients information systems, which enable total interchange of data and together with this, are still compatible with the individual way of working of each hospital. Electronic medical health records (EMHR) contain wide variety of multimedia objects (images, electronic documents, video, audio, etc.). The management of such databases should satisfy significant number of contradictory requirements: easy and reliable data access, hierarchical access structure, content protection, efficient archiving, high quality, etc. Additional important requirements arose concerning the feature extraction, quality level, and information filtering. In spite of the already performed work in image and audio processing, image analysis and pattern recognition are still not adequately addressed. The usual approach in the contemporary practice is to use Digital Imaging and Communications in Medicine (DICOM) standard [1]: the images are compressed and stored and their accessibility and content protection depends on the MD management. In medicine to date, virtually all picture archive and communication systems (PACS) retrieve images simply by indices based on patient name, technique, or some observer-coded text of diagnostic findings [2, 3]. There are a number of uses for medical image databases, each of which would make different requirements on database organization. Classification of images into named or coded diagnostic categories may suffice for retrieving groups of images for teaching purposes. One of the most powerful contemporary tools for image archiving is the JPEG2000 image compression standard, which offers many features that support interactive access to large images [4, 5] (high- BRAINovations BRAIN. Broad Research in Artificial Intelligence and Neuroscience Volume 2, Issue 2, May-June 2011, ISSN 2067-3957 (online), ISSN 2068 - 0473 (print) 6 efficiency compression, resolution scalability, quality scalability, and spatial random access). The main disadvantage is that JPEG2000 does not offer tools for layered content protection and access. In the paper is presented one new approach for creation and management of medical image databases with multi-layer access, based on the Inverse Pyramid Decomposition (IPD), which offers various tools for layered transfer of the processed visual information with consecutively quality improvement, together with reliable content protection through insertion of resistant and fragile watermarks: the resistant watermark is used to prove the document authenticity, while the fragile watermark is used to prevent the access to some important parts of the archived information. For lower access levels part of the information is hidden, such as: (for example) personal patients’ data, specific regions of interest (ROI) in the corresponding medical images, etc., and could be revealed by authorized users only (in the higher access levels). The paper is arranged as follows: In Section 2 is presented the main idea of the IPD decomposition; in Section 3 is described the new format, created for the IDP image decomposition; in Section 4 is described the method for multi-layer watermarking and data hiding; in Section 5 is presented the approach for the database management, and Section 6 contains the Conclusions. 2. Basic principles of the IPD decomposition The 2D matrix [B], which represents the digital image, could be transformed using the Inverse Pyramid Decomposition (IPD) [6]. For this, the image matrix is first divided into blocks of size 2n×2n. The corresponding sub-matrix for each image block [B(2n)] is decomposed in accordance with the relation: )](R[)](E ~ [)](B ~ [)](B[ n r p n p nn 2222 1 10 ++= ∑ = − , for r < n-1, (1) where the number of decomposition components is (r+2). Here )](R[ n2 is a residual component, which is equal to zero for r = n - 1. Each component in Eq. (1) is a matrix of size 2n×2n, corresponding to the decomposition layer р. The First decomposition component, )](B~[ n20 calculated for the layer p = 0, is a coarse approximation of the block [B(2n)]. It is obtained through 2D inverse orthogonal transform (OT) of the block )](S ~ [ n20′ in correspondence with the relation: 1 00 1 00 2222 −− ′= )](T)][(S ~ [)](T[)](B ~ [ nnnn , (2) where: 1 0 2 −)](T[ n - the 2D OT matrix, )](S ~ [ n20′ , of size 2 n×2n; )]}}(S{[FQ{FQ)]}(S ~ {[FQ)](S ~ [ nnn 222 00 1 00 1 00 −− ==′ . (3) The terms }{FQ •0 and }{FQ • −1 0 are correspondingly operators for filtration and quantization of )](S[ n20 and for dequantization of )](S ~ [ n20 in the decomposition layer р = 0. In result of the operation, performed by }{FQ •0 , are selected and quantized the pre-selected high- energy coefficients in the matrix )](S[ n20 , which define )](S ~ [ n20′ . In result of the performance of the inverse operator }{FQ •−10 and after the inverse operation, represented in Eq. (2), is calculated the component )](B~[ n20 . The term )](S[ n20 in Eq. (3) is calculated after direct 2D OT of the matrix [B(2n)], i.e.: R. Kountchev, B. Iantovics, V. Todorov, and R. Kountcheva - Access Management in Medical Image Databases Based on New Format and Contents Protection with Inverse Pyramid Decomposition 7 )](T)][(B)][(T[)](S[ nnnn 2222 000 = . (4) Here )](T[ n20 is the matrix for 2D OT, of size 2 n×2n, which could be of any kind: (DFT, DCT, etc.), and whose inverse matrix is 10 2 −)](T[ n . The remaining decomposition components from Eq. (1) are the approximating matrices )](E ~ [ pnp −2 for decomposition levels p = 1, 2,.., r. These matrices comprise the sub-matrices )](E~[ pnkp p −2 , of size 2n-p×2n-p for kp=1,2,…,4p, obtained as a result of the quad-tree division of )](E ~ [ pnp −2 . Each sub-matrix )](E~[ pnkp p −2 is then defined as: 11 1 2222 −−−−−− − ′= ])(T][)(S ~ [])(T[])(E ~ [ pnp pnk p pn p pnk p pp for kp=1,2,..,4p, (5) where 4p is the number of the quad-tree branches in the decomposition level p; 12 −− ])(T[ pnp is a matrix of size 2 n-p×2n-p in the decomposition level p, used for the inverse 2D OT; )]}}(S{[FQ{FQ)]}(S ~ {[FQ)](S ~ [ pnkppp pnk pp pnk p ppp −−−−− ==′ 222 11 ; (6) The terms }{FQ p • and }{FQ p • −1 are correspondingly the operators for filtration and quantization of )](S[ pnkp p −2 and for dequantization of )](S ~ [ n20 in the layer р. Each transform is defined by the equation: )](T)][(E)][(T[)](S[ pnp nk p pn p pnk p pp − − −− = 2222 1 , (7) where ])(T[ pnp −2 is a matrix of size 2n-p×2n-p in the level p for each block )](E[ pnkp p −2 when kp=1,2,…,4p in the difference matrix, defined by the relation: ⎩ ⎨ ⎧ =− = = − − − − − r.2,3,..,p for -)] (2E~[)](E[ ;1p for )] (2B ~ [-)](B[ )](E[ p-n p pn p n 0 n pn p 22 1 2 2 2 (8) In result of the decomposition (Eq. 1) for each block [B(2n)] are defined the following spectrum coefficients: - from the level p = 0 - all non-zero coefficients in )](S ~ [ n20′ ; - from levels p = 1, 2, . . , r - all non-zero coefficients )](S ~ [ pnkp p −′ 2 for kp=1,2,..,4p. The spectrum coefficients of same spatial frequency from all image sub-blocks are arranged in common massifs in accordance with the decomposition level, and then - losslessly coded. With this the image coding is finished. The processing of color images is performed in the way already presented above for grayscale images. For this, the kind of color transform is first selected. This could be RGB, RCT, Rec.601-2, KLT (Karhunen-Loeve Transform), etc. The color data coding could be one of the kind: 8:8:8, 4:4:4, 4:2:2, or 4:2:0. Depending on the color transform, 3 pyramids are built, corresponding BRAIN. Broad Research in Artificial Intelligence and Neuroscience Volume 2, Issue 2, May-June 2011, ISSN 2067-3957 (online), ISSN 2068 - 0473 (print) 8 to the main components. The decomposition follows the rules, given above for the image brightness processing. In result, significant compression of the archived image is obtained. 3. IPD format The everyday medical practice requires flexible approach in image compression and transfer. The approach, based on the IDP decomposition offers fast initial image transfer (the image approximation, which corresponds to the low decomposition level) without many details, which are after that sent on request only. For such applications the IDP method is extremely suitable because it permits layered image transfer with increasing resolution and quality. Additional ability is to permit setting of Regions of Interest (ROI), which to be immediately accessed and then restored with highest quality. In such applications the data structure is more complicated, because the header should comprise not only the information for each decomposition layer, but information about the ROI size and position as well. The implementation of the IDP decomposition and its applications aimed at the medical image databases management require the creation of a new format. The information, which accompanies the coded data, should comprise the basic characteristics of the decomposition: the number of decomposition levels used; the orthogonal transform, selected for each level and the corresponding sets of coefficients (i.e. the masks of retained coefficients); the kind of color transform (for color images); the quantization values; the pixels scanning direction (vertical, horizontal, diagonal), and the kind of entropy and run-length coding of coefficients’ data. This information is saved in the coded data header and is needed for the proper decoding. The header comprises 3 main parts: general header, special data sub-header and sub-header for color data. The coded data information is divided into 3 big groups: lowest level (No.1), middle levels (from level 2 up to level N-1) and highest level (N), in accordance with the decomposition. The interactively selected ROI is processed as a kind of a sub-block or as a group of sub-blocks. The data structure of the compressed image file after IDP decomposition is shown in Table 1. The brief definition of the basic header data is given below. The names are created as abbreviations of their contents. Table 1. Description of the IDP file Main Header Main header Special data sub-header Sub-header color data Additional data Packet 1 (Lowest level) Sub-header for level 2 Data Packet 2 Sub-header for level 3 Data Packet 3 ---------------------------------------------------------------------- ----------- Sub-header for level N-1 Data Packet N-1 Sub-header for level N Data Packet N The compressed file header comprises following: Kuhdr - main header Rlbytecnt (unsigned 32 bit) - number of bytes after run-length coding; Bytecnt (unsigned 32 bit) - final number of bytes, after entropy coding; Prgprm (unsigned, 16 bit) - program parameters, containing all 1-bit parameters (flags), as follows: the way of picture scanning, data arrangement, kind of color transform, etc. Prgprm1 (unsigned, 16 bit) - initial and end level of the truncated pyramid and maximum possible number of pyramid levels for the processed image. R. Kountchev, B. Iantovics, V. Todorov, and R. Kountcheva - Access Management in Medical Image Databases Based on New Format and Contents Protection with Inverse Pyramid Decomposition 9 Kusdh - special data sub-header Definition of the retained coefficients: ILVFL (unsigned, 16 bit) - mask defining the retained coefficients in the initial (lowest) pyramid level; MLVFL (unsigned, 16 bit) - mask defining the retained coefficients in the middle pyramid levels (from 2 up to N-1); ELVFL (unsigned, 16 bit) - mask defining the retained coefficients in the highest pyramid level (N); Lossless data coding: Rltype (unsigned char) – defining the kind of Run-length, used for the lossless coding of the coefficients’ values. Information about the quantization used: DivCC (char) - division coefficient for the first pyramid level Approximation methods: LVLidp (unsigned char) - defines the selected approximation method for each level (WHT, DCT, etc). Global information about the processed image: Nn (unsigned, 16 bit) - size of the original image (vertical) NHn (unsigned, 16 bit) - size of the original image (horizontal direction) The color data is processed in similar way. Kusdhc - sub-header for color data Global information: ILVc (unsigned char) - initial pyramid level ELVc (unsigned char) - end pyramid level Definition of the retained coefficients: ILVFLс (unsigned 16 bit) - mask defining the retained coefficients in the initial pyramid level; MLVFLс (unsigned 16 bit) - mask defining the retained coefficients in the middle pyramid levels; ELVFLс (unsigned 16 bit) - mask defining the retained coefficients in the highest pyramid level; Information about the quantization used: DivCCc (char) - division coefficient for the first pyramid level; Approximation methods: LVLidpc (unsigned char) - defines the selected approximation method for each level (WHT, DCT, etc). Global information about the processed image: Nnc (unsigned, 16 bit) - the size of the original image (vertical) NHnc (unsigned, 16 bit) - the size of the original image (horizontal) Uvpxlc (unsigned, 16 bit) - used color standard (4:1:1, 4:2:2, etc.) BRAIN. Broad Research in Artificial Intelligence and Neuroscience Volume 2, Issue 2, May-June 2011, ISSN 2067-3957 (online), ISSN 2068 - 0473 (print) 10 The additional data comprises information about other parameters, necessary for definition of the selected kind of lossless data coding or when multi-view or multi-spectral images are processed. As it is easy to notice, the number of bits used for the representation of the main parameters permits to add more information about various kinds of image processing. 4. Resistant image watermarking, based on the 2D-CHT For the resistant watermarking is used IDP decomposition with Complex Hadamard Transform. Specific for this transform is that the transform coefficients have real and imaginary parts. The watermark data is inserted in the phases of selected spectrum coefficients, obtained with 2D Complex Hadamard Transform (2D-CHT) using “arranged” Complex Hadamard matrix for the image matrix [B(N)] [7] processing. 4.1. Resistant watermark embedding The method for resistant watermark embedding could be used for any kind of images, grayscale or color. The watermark could be a binary image or a data sequence. The basic requirement is the watermark data to be smaller than the protected image. The watermark is embedded in the brightness information of the protected image. The mathematical presentation of the method follows below. The image matrix [B(2n)] of size N×N (N=2n) is first processed with direct 2D-CHT: )](CH)][(B)][(CH[)](S[ nnnn 2222 = . (9) Here )]2(S[ n is the matrix of the discrete image spectrum; )]2(CH[ n - arranged matrix, defined by the natural complex Hadamard matrix )]2(CH[ n0 with elements: )q,t(hj)q,t(ch 0 tq 0 = for t, q = 0,1,..,2 n -1, (10) ⎪⎩ ⎪ ⎨ ⎧ = ∑ − = = ⎥⎦ ⎥ ⎢⎣ ⎢ ⎥⎦ ⎥ ⎢⎣ ⎢ − = − 3,4,..n for )( 2;n for 1 q)(t,h r n r r qt 0 1 3 1 221 The arranged matrix )]2(CH[ n is obtained from the natural one, )]2(CH[ n0 after rearranging its rows in such a way, that the number of sign changes for the elements in the row q to be increased by one in the next row, (q+1). The coefficients of the matrix )]2(S[ n0 , are: ∑ ∑ − = − = +− = 12 0i 12 0k 00 vk)(uij 0 n n 2 π k)(v,i)h(u,hek)B(i,v)(u,s for u, v = 0,1,..,2n-1, (11) where B(i,k) is the element of the original image [B(2n)]. For the calculation of coefficients )v,u(s , obtained using the matrix )](CH[ n2 , is necessary to rearrange the coefficients )v,u(s0 . Each complex coefficient )v,u(s0 is then represented as: ,e)v,u(M)v,u(js)v,u(s)v,u(s )v,u(j Im,Re, 0 0000 ϕ−=−= (12) where: R. Kountchev, B. Iantovics, V. Todorov, and R. Kountcheva - Access Management in Medical Image Databases Based on New Format and Contents Protection with Inverse Pyramid Decomposition 11 )],vkui(cos[)k,v(h)i,u(h)k,i(B)v,u(s n n i k Re, += ∑ ∑ − = − = π 12 0 12 0 2000 (13) )]vkui(sin[)k,v(h)i,u(h)k,i(B)v,u(s n m i k Im, += ∑ ∑ − = − = π 12 0 12 0 2000 . (14) From all spectrum coefficients as suitable for watermarking are chosen the complex- conjugated couples )v,u(s and )v,u(s∗ (with phases )v,u()v,u( ∗ϕ−=ϕ and modules )v,u(M)v,u(M ∗= ) correspondingly. Each consecutive bit wr(р) of the watermark data р is inserted in the phases of coefficients )v,u(s and )v,u(s∗ only, in correspondence with the relation: ⎩ ⎨ ⎧ =Δ−ϕ =Δ+ϕ=ϕ−=ϕ ∗ .)р(wif,)v,u( ;)р(wif,)v,u()v,u()v,u( r r )p(w)p(w rr 0 1 (15) Here )v,u()p(wrϕ and )v,u()p(wr ∗ϕ are the phases of the watermarked coefficients )v,u(s )p(wr and )v,u(s )p(wr ∗ . The watermark data is represented by the binary sequence wr(р) for r = 1,2,..,R (R is the number of the watermark binary elements). The parameter Δ is the angle, which defines the watermark “depth”, “transparency” and the resistance against pirates’ attacks. The sequence of bits wr(р) is obtained after performing operation “XOR” both for each bit of the watermark and the corresponding bit from a pseudorandom sequence, which represents a secret (private) or public key, used for the watermark encryption. In this case the autocorrelation function of the sequence wr(р) is chosen to be of the kind “delta-pulse”. This ensures high accuracy for the watermark detection and extraction. In case that the currently processed complex spectrum coefficient, which should be watermarked, has zero amplitude, the corresponding binary value of the watermark is omitted and the binary symbol from the pseudorandom sequence only remains, because “XOR” is not applied. In result, the errors in the extracted watermark elements are reduced, because the spectrum coefficients of zero amplitude have zero phases as well, and they are practically not suitable for watermark elements extraction. The coefficients of the rearranged spectrum matrix )](S[ nw 2 are: )v,u(j )p(w )p(rw r e)v,u(M)v.u(s ϕ−= (16) The matrix )](S[ nw 2 is processed with inverse 2D-CHT and as a result is obtained: ∗∗−= )](CH)][(S[)](CH[)](B[ nnw nnn w 22242 , (17) where 1222 −∗ = )](CH[)](CH[ nnn . The pixels of the watermarked image are defined by the relation: ∑ ∑ − = − = + = 12 0u 12 0v 00 vk)(uij ww n n 2 π k)(v,i)h(u,he)v,u(s)k,i(B for i, k = 0,1,..,2n-1. (18) BRAIN. Broad Research in Artificial Intelligence and Neuroscience Volume 2, Issue 2, May-June 2011, ISSN 2067-3957 (online), ISSN 2068 - 0473 (print) 12 The method for resistant watermarking, presented above, has two main advantages: • The watermark is “transparent”, i.e., not noticeable, because the watermark data is embedded in the phases of the selected coefficients; • The method permits to insert significant number of watermark data (higher than for other similar methods), because for the watermarking could be used each of the decomposition layers. These advantages of the new method make it extremely suitable for the presented application (content protection in medical image databases), because the quality of the archived images is of highest importance. 4.2. Watermark detection For the resistant watermark detection in unknown image are performed the operations, represented by Eqs. (11-14) above. The presumption here is that the searched watermark is one of a set of known watermarks, i.e. it is checked if the document had been watermarked with one of these watermarks. The watermark detection is performed as follows: First, should be checked whether in the image had been inserted the watermark р, which is one of the known D possible signs. For this is calculated the mutual correlation p,mC between the m th and рth watermark, the first of which is one of the D possible, and the second is used for watermarking of the complex-conjugated coefficients )v,u(s and )v,u(s∗ of the unknown image: )m,p(B)m(A)m()]p()v,u([C r R r rp,m +=ΔΔ+ϕ= ∑ =1 (19) for p, m =1,2,..,D, where D is the number of searched watermarks; )v,u()]p()v,u([ )p(wr rϕ=Δ+ϕ is the phase of the marked spectrum coefficient )v,u(s )p(wr of the matrix )](S[ n w 2 , which contains the р th watermark data; ∑∑ == ΔΔ=>>≈Δϕ= ⎩ ⎨ ⎧ =Δ− =Δ+=Δ−=Δ p r R r rr R r r r r)p(w r ).m()p()mp,B( 1,R for )p()v,u()m(A ,)p( wif ;)p( wif )()p( 11 0 0 11 (20) In case that the investigated spectrum coefficients are not marked, 0)р(r =Δ and 0C b,m ≈ ; else: ⎪ ⎪ ⎩ ⎪⎪ ⎨ ⎧ ≠≈ == ≈ ∑ ∑ = = R 1r rr R 1r 22 r pm, p.m if 0(p)(m)ΔΔ p;m if RΔ(m)][Δ C (21) The decision for the watermark data р detection is taken in accordance with the relation: R. Kountchev, B. Iantovics, V. Todorov, and R. Kountcheva - Access Management in Medical Image Databases Based on New Format and Contents Protection with Inverse Pyramid Decomposition 13 ⎩ ⎨ ⎧ θ≥Δ= cases. other in - No, ;])R/C[ if Yes,p p,m 2 for m, p = 1, 2,…, D, (22) where θ is a pre-defined threshold in the range 0 < θ < 1. The so described watermark detection is “blind”, i.e. it does not need the original image, but the watermark only. 4.3. Resistant watermark extraction For the resistant watermark extraction is needed the original image. The presumption is, that the owner is the person, authorized to embed the watermark and he/she has the original. After the phase spectrums of the original and the watermarked images had been calculated, the phases of the corresponding coefficients are subtracted and is defined the sequence, obtained after applying the “XOR” function on the watermark and the pseudorandom sequence, which is the encryption key. The watermark is obtained after performing “XOR” for the sequences of phase differences and the key. 4.4. Fragile watermark insertion The IPD decomposition permits insertion of fragile watermark also. In general, this is an additional decomposition layer. The watermark data is first losslessly coded and the so-obtained data is then added to some of the decomposition levels data. In the quality of a fragile watermark could be used any image of size equal or smaller than that of the protected one. After image restoration, the fragile watermark is visualized overlaid on the corresponding decomposition level, which prevents (hides) the visualization of the approximation. The removal of the fragile “hiding” watermark is carried out using a password. 5. Access Management in medical image databases The layered approach for image archiving, based on the IPD decomposition, permits to develop special flexible tools for image database management. The basic idea is that any image in the database could be visualized layer by layer with increasing resolution. The visualization starts with the coarse approximation of the archived image, calculated from the lowest decomposition level data, which corresponds to lower access also. The next approximation (of higher quality) is visualized only in case that the user has permission for this, and proves it (for example, with a password). Together with the better quality, the system reveals on request (and if password is available) additional personal information. In case, that the image (or a part of it, containing a ROI) is hidden, it is visualized only if the permission (password) for the corresponding decomposition level is provided. The image preparation for the image database with layered access is shown on Fig. 1. The image is archived layer by layer and the watermarks are inserted together with the image processing. The ROI (if there is one in the image) is processed in such a way, that to permit direct access for authorized users (separate pyramid is developed for the ROI representation). The structure of the hierarchical access to the image database contents is shown on Fig. 2. BRAIN. Broad Research in Artificial Intelligence and Neuroscience Volume 2, Issue 2, May-June 2011, ISSN 2067-3957 (online), ISSN 2068 - 0473 (print) 14 ROI ROI ROI First (coarse) image approximation Second approximation (good visual quality) Best representation of the basic image Watermarks for lowest layer inserted; ROI selected Watermark for middle layer inserted ROI - higher quality. Watermark for highest security level inserted Original digital image ROIBestrepresentation of ROI Representation of database image (ROIs are represented with higher quality) than the remaining part of the image Figure1. Three-layer image decomposition with content protection R. Kountchev, B. Iantovics, V. Todorov, and R. Kountcheva - Access Management in Medical Image Databases Based on New Format and Contents Protection with Inverse Pyramid Decomposition 15 Hiding watermark removal; ROI access Image visualization in lower quality; No access to private data and ROIs Access to basic visual information and metadata only High access level Middle access levesl Lowest access level Password needed Password needed No password needed Special data access level Personal data reveal Password needed Hirerarchical access levels Access request Access request Access request Access request Access request Image database Figure 2. Hierarchical access to the image DB 6. Conclusions The proposed method for creation of medical databases with image content protection, based on the IPD, offers various tools for image processing and archiving. The general part of the database information could be used for various applications: disease description, disease history and treatment, statistics, information exchange, students learning, etc [8]. The main advantages of the new method are: • It offers flexible layered access to the archived information, depending on the user authorization; • It ensures immediate access to preset ROIs for authorized users; • It offers reliable content protection with multiple resistant and fragile watermarks, inserted in the consecutive decomposition levels. The knowledge of the algorithm and the possession BRAIN. Broad Research in Artificial Intelligence and Neuroscience Volume 2, Issue 2, May-June 2011, ISSN 2067-3957 (online), ISSN 2068 - 0473 (print) 16 of the decoding tools do not permit watermark extraction and visualization of the protected visual information. For this is needed a password, or other similar tool; • The special IDP format could be further developed with minor changes (additions) in order to cover more applications; • Any change, noticed in the fragile watermark, proves unauthorized access and image editing; • The detection or extraction of the resistant watermark prove the document authenticity; • The ability to insert more than one watermark in the same image ensures higher security for the original image content; • The resistant watermark is inserted in the phases of the transform coefficients, and as a result, the watermark is “transparent”, i.e. – invisible; • The layered approach for image processing permits the creation of general models for object description and representation. In the case, when RST-invariant transformations are used (for example, the 2D Mellin-Fourier transform) the objects representation is RST-invariant as well, which could be used for object classification and evaluation; • A modification of the RST-invariant object representation method permits the description to be contrast-invariant as well [9]; • The proposed database management corresponds to the contemporary methods for content- and context-based data search. It permits to implement some up-to-date methods, based on Neural networks; • The IDP method and the flexible database management offer layered object search in image databases, similar with the human way for object recognition (starting from slight similarity and continuing up to higher similarity and sure identification). The proposed database management permits further development aimed at efficient archiving of sequences of medical images. Acknowledgement This work was supported by the Joint Research Project Bulgaria-Romania (2010-2012): “Electronic Health Records for the Next Generation Medical Decision Support in Romanian and Bulgarian National Healthcare Systems”. References [1] Camapum J., Rocha A., Evangelista N., Amemiya E. (2009) DICOM database for medical imaging. Proc. XV Congreso Argentino de Bioingieneria:1-4. [2] Huang H. and Taira R. (1992) Infrastructure design of a picture archiving and communication system. American Journal of Roentgenology, Vol 158, 743-749. [3] Alsen A., Broderick L., Winer H., Brodley C., Kak A., Pavlopoulou C., Marchlori A. (2003) Automated storage and retrieval of thin-section CT images to assist diagnosis: system description and preliminary assessment. Radiology, 228: 265-270. [4] Taubman D., Marcellin M. (2002) JPEG2000: Image Compression Fundamentals, Standards and Practice, Kluwer Academic Publishers, Boston. [5] Information Technology–JPEG 2000 Image Coding System: Part 9–Interactivity tools, APIs and protocols, no. 15444-9, ISO/IEC JTC1/SC29/WG1 IS, final publication draft, revision 3 (2003). [6] Kountchev R., Kountcheva R. (2008) Image Representation with Reduced Spectrum Pyramid. In: G. Tsihrintzis, M. Virvou, R. Howlett, L. Jain (Eds): New Directions in Intelligent Interactive Multimedia, Springer-Verlag: 275-284. [7] Kountchev R., Todorov Vl., Kountcheva R. (2010) Fragile and Resistant Image Watermarking Based on Inverse Difference Pyramid Decomposition. WSEAS Trans. on Signal Processing. Issue 3, Vol. 6: 101-112. R. Kountchev, B. Iantovics, V. Todorov, and R. Kountcheva - Access Management in Medical Image Databases Based on New Format and Contents Protection with Inverse Pyramid Decomposition 17 [8] Kountchev, R., Iantovics, B., Kountcheva, R. (2010). Efficient Management of Medical Image Databases. The 5th International Conference on Virtual Learning (ICVL’10), Oct. 29-31, 2010, Târgu-Mureş, Romania, pp. 395-401. [9] Kountchev, R., Todorov, V., Kountcheva, R. (2010). RSTC-Invariant object representation with modified 2D Mellin-Fourier transform. WSEAS Trans. on Signal Processing. Issue 4, Vol. 6: 196- 207