1
|
Zhang B, Rahmatullah B, Wang SL, Almutairi HM, Xiao Y, Liu X, Liu Z. A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode. Med Biol Eng Comput 2023; 61:2971-3002. [PMID: 37542682 DOI: 10.1007/s11517-023-02874-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/25/2022] [Accepted: 06/20/2023] [Indexed: 08/07/2023]
Abstract
Since the COVID-19 pandemic, telemedicine or non-face-to-face medicine has increased significantly. In practice, various types of medical images are essential to achieve effective telemedicine. Medical image encryption algorithms play an irreplaceable role in the fast and secure transmission and storage of these medical images. However, most of the existing medical image encryption algorithms are full encryption algorithms, which are inefficient and time-consuming, so they are not suitable for emergency medical scenarios. To improve the efficiency of encryption, a small number of works have focused on partial or selective encryption algorithms for medical images, in which different levels of encryption strategies were adopted for different information content regions of medical images. However, these encryption algorithms have inadequate security more or less. In this paper, based on the Logistic map, we designed an improved variable dimension map. Then, an encryption algorithm for medical images was proposed based on it. This algorithm has two modes: (1) full encryption mode and (2) semi-full encryption mode, which can better adapt to different medical scenarios, respectively. In full encryption mode, all pixels of medical images are encrypted by using the confusion-diffusion structure. In semi-full encryption mode, the region of interest of medical images is extracted. The confusion was first adopted to encrypt the region of interest, and then, the diffusion was adopted to encrypt the entire image. In addition, no matter which encryption mode is used, the algorithm provides the function of medical image integrity verification. The proposed algorithm was simulated and analyzed to evaluate its effectiveness. The results show that in semi-full encryption mode, the algorithm has good security performance and lower time consumption; while in full encryption mode, the algorithm has better security performance and is acceptable in time.
Collapse
Affiliation(s)
- Bin Zhang
- School of Computer Science, Baoji University of Arts and Sciences, Baoji, China
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia
| | - Bahbibi Rahmatullah
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia.
| | - Shir Li Wang
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia
| | | | - Yan Xiao
- School of Computer Science, Baoji University of Arts and Sciences, Baoji, China
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia
| | - Xinjuan Liu
- School of Computer Science, Baoji University of Arts and Sciences, Baoji, China
| | - Zhaoyan Liu
- School of Cyber Engineering, Xidian University, Xi'an, China
| |
Collapse
|
2
|
Alarood AA, Faheem M, Al‐Khasawneh MA, Alzahrani AIA, Alshdadi AA. Secure medical image transmission using deep neural network in e-health applications. Healthc Technol Lett 2023; 10:87-98. [PMID: 37529409 PMCID: PMC10388229 DOI: 10.1049/htl2.12049] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/28/2023] [Revised: 06/13/2023] [Accepted: 07/03/2023] [Indexed: 08/03/2023] Open
Abstract
Recently, medical technologies have developed, and the diagnosis of diseases through medical images has become very important. Medical images often pass through the branches of the network from one end to the other. Hence, high-level security is required. Problems arise due to unauthorized use of data in the image. One of the methods used to secure data in the image is encryption, which is one of the most effective techniques in this field. Confusion and diffusion are the two main steps addressed here. The contribution here is the adaptation of the deep neural network by the weight that has the highest impact on the output, whether it is an intermediate output or a semi-final output in additional to a chaotic system that is not detectable using deep neural network algorithm. The colour and grayscale images were used in the proposed method by dividing the images according to the Region of Interest by the deep neural network algorithm. The algorithm was then used to generate random numbers to randomly create a chaotic system based on the replacement of columns and rows, and randomly distribute the pixels on the designated area. The proposed algorithm evaluated in several ways, and compared with the existing methods to prove the worth of the proposed method.
Collapse
Affiliation(s)
| | - Muhammad Faheem
- School of Technology and InnovationsUniversity of VaasaVaasaFinland
| | - Mahmoud Ahmad Al‐Khasawneh
- School of Information TechnologySkyline University CollegeUniversity City SharjahSharjahUnited Arab Emirates
| | - Abdullah I. A. Alzahrani
- Department of Computer Science, Collage of Science and Humanities in Al QuwaiiyahShaqra UniversityShaqraSaudi Arabia
| | - Abdulrahman A. Alshdadi
- Department of Information Systems and Technology, College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia
| |
Collapse
|
3
|
Ahuja B, Doriya R, Salunke S, Hashmi MF, Gupta A. Advanced 5D logistic and DNA encoding for medical images. THE IMAGING SCIENCE JOURNAL 2023. [DOI: 10.1080/13682199.2023.2178097] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/06/2023]
Affiliation(s)
- Bharti Ahuja
- Department of Information Technology, National Institute of Technology Raipur, Chhattisgarh, India
| | - Rajesh Doriya
- Department of Information Technology, National Institute of Technology Raipur, Chhattisgarh, India
| | - Sharad Salunke
- Department of Electronics and Communication Engineering, Amity University Madhya Pradesh, Gwalior, India
| | - Md. Farukh Hashmi
- Department of Electronics and Communication Engineering, NIT Warangal, Warangal, India
| | - Aditya Gupta
- Department of Information and Communication Technology, University of Agder, Grimstad, Norway
| |
Collapse
|
4
|
Latha HR, Ramaprasath A. HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme. JOURNAL OF INTELLIGENT SYSTEMS 2023. [DOI: 10.1515/jisys-2022-9056] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/31/2023] Open
Abstract
Abstract
Image data play important role in various real-time online and offline applications. Biomedical field has adopted the imaging system to detect, diagnose, and prevent several types of diseases and abnormalities. The biomedical imaging data contain huge information which requires huge storage space. Moreover, currently telemedicine and IoT based remote health monitoring systems are widely developed where data is transmitted from one place to another. Transmission of this type of huge data consumes more bandwidth. Along with this, during this transmission, the attackers can attack the communication channel and obtain the important and secret information. Hence, biomedical image compression and encryption are considered the solution to deal with these issues. Several techniques have been presented but achieving desired performance for combined module is a challenging task. Hence, in this work, a novel combined approach for image compression and encryption is developed. First, image compression scheme using wavelet transform is presented and later a cryptography scheme is presented using confusion and diffusion schemes. The outcome of the proposed approach is compared with various existing techniques. The experimental analysis shows that the proposed approach achieves better performance in terms of autocorrelation, histogram, information entropy, PSNR, MSE, and SSIM.
Collapse
Affiliation(s)
| | - Alagarswamy Ramaprasath
- Department of Computer Applications, Hindustan Institute of Technology and Science , Chennai , India
| |
Collapse
|
5
|
Kumar D, Sudha V K, Ranjithkumar R. A one-round medical image encryption algorithm based on a combined chaotic key generator. Med Biol Eng Comput 2023; 61:205-227. [PMID: 36348143 DOI: 10.1007/s11517-022-02703-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/06/2021] [Accepted: 10/02/2022] [Indexed: 11/09/2022]
Abstract
Medical images of patients must be securely transmitted and kept private in telemedicine. To secure such medical images, this paper proposes a single round chaotic image encryption scheme based on a permutation-diffusion structure. A combined chaotic key generator (CCKG) is proposed to enhance key sensitivity and generation in order to improve the security of medical images to be encrypted. CCKG is used to produce the initial seeds for the fractional order chaotic system (FOCS) and Lorenz system (LS) for the permutation and diffusion processes, respectively. CCKG together with proposed permutation and diffusion methods enhances cipher image security in single round. Using zigzag transform (ZT) scanning, the plain image is first permuted block by block. The type of scanning used on each block is heavily influenced by the ZT selection from FOCS and LS. Following block-wise permutation, the permutation order (PO) generated from LS performs overall permutation. Based on the pixel positions, the overall permuted image is divided into odd and even parts. Then these parts of the images are diffused separately by the random pixel matrices generated by LS and FOCS. The cipher image is formed by combining the odd and even parts after diffusion. Secret key analysis, statistical analysis, differential attack analysis, and simulations confirm that with a single round of image encryption, the proposed system is competent, robust and effective.
Collapse
Affiliation(s)
- Kumar D
- P.A. College of Engineering and Technology, Pollachi, Tamil Nadu, India.
| | - Sudha V K
- Dr. Mahalingam College of Engineering and Technology, Pollachi, Tamil Nadu, India
| | - Ranjithkumar R
- P.A. College of Engineering and Technology, Pollachi, Tamil Nadu, India
| |
Collapse
|
6
|
Yang N, Zhang S, Bai M, Li S. Medical Image Encryption Based on Josephus Traversing and Hyperchaotic Lorenz System. JOURNAL OF SHANGHAI JIAOTONG UNIVERSITY (SCIENCE) 2022; 29:1-18. [PMID: 36588800 PMCID: PMC9791633 DOI: 10.1007/s12204-022-2555-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/28/2022] [Accepted: 05/04/2022] [Indexed: 12/27/2022]
Abstract
This study proposes a new medical image encryption scheme based on Josephus traversing and hyperchaotic Lorenz system. First, a chaotic sequence is generated through hyperchaotic system. This hyperchaotic sequence is used in the scrambling and diffusion stages of the algorithm. Second, in the scrambling process, the image is initially confused by Josephus scrambling, and then the image is further confused by Arnold map. Finally, generated hyperchaos sequence and exclusive OR operation is used for the image to carry on the positive and reverse diffusion to change the pixel value of the image and further hide the effective information of the image. In addition, the information of the plaintext image is used to generate keys used in the algorithm, which increases the ability of resisting plaintext attack. Experimental results and security analysis show that the scheme can effectively hide plaintext image information according to the characteristics of medical images, and is resistant to common types of attacks. In addition, this scheme performs well in the experiments of robustness, which shows that the scheme can solve the problem of image damage in telemedicine. It has a positive significance for the future research.
Collapse
Affiliation(s)
- Na Yang
- School of Information Engineering, Chang’an University, Xi’an, 710064 China
| | - Shuxia Zhang
- School of Information Engineering, Chang’an University, Xi’an, 710064 China
| | - Mudan Bai
- School of Information Engineering, Chang’an University, Xi’an, 710064 China
| | - Shanshan Li
- School of Information Engineering, Chang’an University, Xi’an, 710064 China
| |
Collapse
|
7
|
Daoui A, Yamni M, Karmouni H, Sayyouri M, Qjidaa H, Ahmad M, A. Abd El-Latif A. Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2022; 34:8927-8954. [DOI: 10.1016/j.jksuci.2022.08.021] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
|
8
|
Zhang B, Rahmatullah B, Wang SL, Liu Z. A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map. MULTIMEDIA TOOLS AND APPLICATIONS 2022; 82:15735-15762. [PMID: 36185323 PMCID: PMC9510328 DOI: 10.1007/s11042-022-13744-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/13/2022] [Revised: 04/18/2022] [Accepted: 08/29/2022] [Indexed: 06/16/2023]
Abstract
Modern medical examinations have produced a large number of medical images. It is a great challenge to transmit and store them quickly and securely. Existing solutions mainly use medical image encryption algorithms, but these encryption algorithms, which were developed for ordinary images, are time-consuming and must cope with insufficient security considerations when encrypting medical images. Compared with ordinary images, medical images can be divided into the region of interest and the region of background. In this paper, based on this characteristic, a plain-image correlative semi-selective medical image encryption algorithm using the enhanced two dimensional Logistic map was proposed. First, the region of interest of a plain medical image is permuted at the pixel level, then for the whole medical image, substitution is performed pixel by pixel. An ideal compromise between encryption speed and security can be achieved by full-encrypting the region of interest and semi-encrypting the region of background. Several main types of medical images and some normal images were selected as the samples for simulation, and main image cryptanalysis methods were used to analyze the results. The results showed that the cipher-images have a good visual quality, high information entropy, low correlation between adjacent pixels, as well as uniformly distribute histogram. The algorithm is sensitive to the initial key and plain-image, and has a large keyspace and low time complexity. The time complexity is lower when compared with the current medical image full encryption algorithm, and the security performance is better when compared with the current medical image selective encryption algorithm.
Collapse
Affiliation(s)
- Bin Zhang
- Data Intelligence and Knowledge Management, Faculty of Arts, Computing and Creative Industry, Sultan Idris Education University (UPSI), Tanjong Malim, Perak Malaysia
- School of Computer Science, Baoji University of Arts and Sciences, Baoji, China
| | - Bahbibi Rahmatullah
- Data Intelligence and Knowledge Management, Faculty of Arts, Computing and Creative Industry, Sultan Idris Education University (UPSI), Tanjong Malim, Perak Malaysia
| | - Shir Li Wang
- Data Intelligence and Knowledge Management, Faculty of Arts, Computing and Creative Industry, Sultan Idris Education University (UPSI), Tanjong Malim, Perak Malaysia
| | - Zhaoyan Liu
- School of Cyber Engineering, Xidian University, Xi’an, China
| |
Collapse
|
9
|
A secure gray-scale image watermarking technique in fractional DCT domain using zig-zag scrambling. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103296] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
10
|
Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:2243827. [PMID: 35978898 PMCID: PMC9377849 DOI: 10.1155/2022/2243827] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/01/2022] [Revised: 06/12/2022] [Accepted: 07/18/2022] [Indexed: 11/18/2022]
Abstract
Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an open medium, the design of secure encryption algorithms becomes essential. Encryption can be considered one of the effective solutions for accomplishing security. Although numerous models have existed in the literature, they could not adaptable to the rising number of medicinal images in the health sector. At the same time, the optimal key generation process acts as a vital part in defining the performance of the encryption techniques. Therefore, this article presents a Pigeon Inspired Optimization with Encryption-based Secure Medical Image Management (PIOE-SMIM) technique. The proposed PIOE-SMIM approach majorly concentrates on the development of secret share creation (SSC) and the encryption process. At the initial stage, the medical images are converted into a collection of 12 shares using the SSC approach. In addition, an elliptic curve cryptography (ECC) scheme is employed for the encryption process. In order to optimum key creation procedure in the ECC model, the PIO technique is exploited with the aim of maximizing PSNR. Finally, on the receiver side, the decryption and share reconstruction processes are performed to construct the original images. The PIOE-SMIM model displayed an enhanced PSNR of 59.37 dB in image 1. Improved PSNR of 59.53 dB is given for image 5 using the PIOE-SMIM model. For demonstrating an enhanced performance of the PIOE-SMIM method, a widespread experimental study is made and the results highlighted the supremacy of the PIOE-SMIM model over other techniques.
Collapse
|
11
|
MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection. JOURNAL OF SENSOR AND ACTUATOR NETWORKS 2022. [DOI: 10.3390/jsan11020024] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/10/2022]
Abstract
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties. This right is typically protected by law through firm regulations set by healthcare authorities. However, sensitive-private data usually requires the application of further security and privacy mechanisms such as encipherment (encryption) techniques. ’Medical images’ is one such example of highly demanding security and privacy standards. This is due to the quality and nature of the information carried among these images, which are usually sensitive-private information with few features and tonal variety. Hence, several state-of-the-art encryption mechanisms for medical images have been proposed and developed; however, only a few were efficient and promising. This paper presents a hybrid crypto-algorithm, MID-Crypt, to secure the medical image communicated between medical laboratories and doctors’ accounts. MID-Crypt is designed to efficiently hide medical image features and provide high-security standards. Specifically, MID-Crypt uses a mix of Elliptic-curve Diffie–Hellman (ECDH) for image masking and Advanced Encryption Standard (AES) with updatable keys for image encryption. Besides, a key management module is used to organize the public and private keys, the patient’s digital signature provides authenticity, and integrity is guaranteed by using the Merkle tree. Also, we evaluated our proposed algorithm in terms of several performance indicators including, peak signal-to-noise ratio (PSNR) analysis, correlation analysis, entropy analysis, histogram analysis, and timing analysis. Consequently, our empirical results revealed the superiority of MID-Crypt scoring the best performance values for PSNR, correlation, entropy, and encryption overhead. Finally, we compared the security measures for the MID-Crypt algorithm with other studies, the comparison revealed the distinguishable security against several common attacks such as side-channel attacks (SCA), differential attacks, man-in-the-middle attacks (MITM), and algebraic attacks.
Collapse
|
12
|
Robust Multi-Mode Synchronization of Chaotic Fractional Order Systems in the Presence of Disturbance, Time Delay and Uncertainty with Application in Secure Communications. BIG DATA AND COGNITIVE COMPUTING 2022. [DOI: 10.3390/bdcc6020051] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
Abstract
This paper investigates the robust adaptive synchronization of multi-mode fractional-order chaotic systems (MMFOCS). To that end, synchronization was performed with unknown parameters, unknown time delays, the presence of disturbance, and uncertainty with the unknown boundary. The convergence of the synchronization error to zero was guaranteed using the Lyapunov function. Additionally, the control rules were extracted as explicit continuous functions. An image encryption approach was proposed based on maps with time-dependent coding for secure communication. The simulations indicated the effectiveness of the proposed design regarding the suitability of the parameters, the convergence of errors, and robustness. Subsequently, the presented method was applied to fractional-order Chen systems and was encrypted using the chaotic masking of different benchmark images. The results indicated the desirable performance of the proposed method in encrypting the benchmark images.
Collapse
|
13
|
Magdy M, Hosny KM, Ghali NI, Ghoniemy S. Security of medical images for telemedicine: a systematic review. MULTIMEDIA TOOLS AND APPLICATIONS 2022; 81:25101-25145. [PMID: 35342327 PMCID: PMC8938747 DOI: 10.1007/s11042-022-11956-7] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/29/2021] [Revised: 12/23/2021] [Accepted: 01/03/2022] [Indexed: 06/14/2023]
Abstract
Recently, there has been a rapid growth in the utilization of medical images in telemedicine applications. The authors in this paper presented a detailed discussion of different types of medical images and the attacks that may affect medical image transmission. This survey paper summarizes existing medical data security approaches and the different challenges associated with them. An in-depth overview of security techniques, such as cryptography, steganography, and watermarking are introduced with a full survey of recent research. The objective of the paper is to summarize and assess the different algorithms of each approach based on different parameters such as PSNR, MSE, BER, and NC.
Collapse
Affiliation(s)
- Mahmoud Magdy
- Department of Digital Media Technology, Future University in Egypt (FUE), New Cairo, Egypt
| | - Khalid M. Hosny
- Department of Information Technology, Zagazig University, Zagazig, 44519 Egypt
| | - Neveen I. Ghali
- Department of Digital Media Technology, Future University in Egypt (FUE), New Cairo, Egypt
| | - Said Ghoniemy
- Department of Computer systems, Faculty of Computer and Information Sciences, Ain Shams University, Cairo, Egypt
| |
Collapse
|
14
|
|
15
|
Javan AAK, Jafari M, Shoeibi A, Zare A, Khodatars M, Ghassemi N, Alizadehsani R, Gorriz JM. Medical Images Encryption Based on Adaptive-Robust Multi-Mode Synchronization of Chen Hyper-Chaotic Systems. SENSORS (BASEL, SWITZERLAND) 2021; 21:3925. [PMID: 34200287 PMCID: PMC8200970 DOI: 10.3390/s21113925] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/10/2021] [Revised: 06/01/2021] [Accepted: 06/02/2021] [Indexed: 01/03/2023]
Abstract
In this paper, a novel medical image encryption method based on multi-mode synchronization of hyper-chaotic systems is presented. The synchronization of hyper-chaotic systems is of great significance in secure communication tasks such as encryption of images. Multi-mode synchronization is a novel and highly complex issue, especially if there is uncertainty and disturbance. In this work, an adaptive-robust controller is designed for multimode synchronized chaotic systems with variable and unknown parameters, despite the bounded disturbance and uncertainty with a known function in two modes. In the first case, it is a main system with some response systems, and in the second case, it is a circular synchronization. Using theorems it is proved that the two synchronization methods are equivalent. Our results show that, we are able to obtain the convergence of synchronization error and parameter estimation error to zero using Lyapunov's method. The new laws to update time-varying parameters, estimating disturbance and uncertainty bounds are proposed such that stability of system is guaranteed. To assess the performance of the proposed synchronization method, various statistical analyzes were carried out on the encrypted medical images and standard benchmark images. The results show effective performance of the proposed synchronization technique in the medical images encryption for telemedicine application.
Collapse
Affiliation(s)
- Ali Akbar Kekha Javan
- Faculty of Electrical Engineering, Zabol Branch, Islamic Azad University, Zabol 1939598616, Iran;
| | - Mahboobeh Jafari
- Electrical and Computer Engineering Faculty, Semnan University, Semnan 3513119111, Iran;
| | - Afshin Shoeibi
- Faculty of Electrical Engineering, Biomedical Data Acquisition Lab (BDAL), K. N. Toosi University of Technology, Tehran 1631714191, Iran;
| | - Assef Zare
- Faculty of Electrical Engineering, Gonabad Branch, Islamic Azad University, Gonabad 6518115743, Iran
| | - Marjane Khodatars
- Faculty of Engineering, Mashhad Branch, Islamic Azad University, Mashhad 91735413, Iran;
| | - Navid Ghassemi
- Computer Engineering Department, Ferdowsi University of Mashhad, Mashhad 9177948974, Iran;
| | - Roohallah Alizadehsani
- Institute for Intelligent Systems Research and Innovation (IISRI), Deakin University, Waurn Ponds, VIC 3217, Australia;
| | - Juan Manuel Gorriz
- Department of Signal Theory, Networking and Communications, Universidad de Granada, 52005 Granada, Spain;
| |
Collapse
|
16
|
Thirumarai Selvi C, Amudha J, Sudhakar R. A modified salp swarm algorithm (SSA) combined with a chaotic coupled map lattices (CML) approach for the secured encryption and compression of medical images during data transmission. Biomed Signal Process Control 2021. [DOI: 10.1016/j.bspc.2021.102465] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
|
17
|
An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Med Biol Eng Comput 2021; 59:589-605. [DOI: 10.1007/s11517-021-02328-8] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/03/2020] [Accepted: 01/24/2021] [Indexed: 10/22/2022]
|
18
|
Wang X, Zhu Z, Wang F, Ni R, Wang J, Hu Y. Medical image encryption based on biometric keys and lower-upper decomposition with partial pivoting. APPLIED OPTICS 2021; 60:24-32. [PMID: 33362069 DOI: 10.1364/ao.410329] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/30/2020] [Accepted: 11/30/2020] [Indexed: 06/12/2023]
Abstract
The security of medical image transmission in telemedicine is very important to patients' privacy and health. A new asymmetric medical image encryption scheme is proposed. The medical image is encrypted by two spiral phase masks (SPM) and the lower-upper decomposition with partial pivoting, where the SPM is generated from the iris, chaotic random phase mask, and amplitude truncated spiral phase transformation. The proposed scheme has the following advantages: First, the iris is used for medical image encryption, which improves the security of the encryption scheme. Second, the combination of asymmetric optical encryption and three-dimensional Lorenz chaos improves the key space and solves the linear problem based on double-random phase encoding. Third, compared with other encryption schemes, the proposed scheme has advantages in occlusion attacks, key space, correlation, and information entropy. Numerical simulation and optical results verify the feasibility and robustness of the encryption scheme.
Collapse
|
19
|
Banu S A, Amirtharajan R. A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach. Med Biol Eng Comput 2020; 58:1445-1458. [PMID: 32319032 DOI: 10.1007/s11517-020-02178-w] [Citation(s) in RCA: 22] [Impact Index Per Article: 4.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/10/2019] [Accepted: 04/09/2020] [Indexed: 11/28/2022]
Abstract
Today's technological era, the booming desire for e-healthcare has inflated the attention towards the security of data from cyber attacks. As the digital medical images are transferred over the public network, there is a demand to shield an adequate level of protection. One of the prominent techniques is encryption which secures the medical images. This paper recommends a DICOM image encryption based upon chaotic attractors on frequency domain by integer wavelet transform (IWT) and fused with deoxyribonucleic acid (DNA) sequence on the spatial domain. The proposed algorithm uses a chaotic 3D Lorenz attractor and logistic map to generate pseudo-random keys for encryption. The algorithm involves subsequent stages, i.e. permutation, substitution, encoding, complementary and decoding. To endorse the resistance of the proposed algorithm, various analyses have been examined for 256 × 256 DICOM images by achieving an average entropy of 7.99, larger keyspace of 10238 and non-zero correlation. The overall results confirm that the proposed algorithm is robust against the brute force attacks. Graphical abstract.
Collapse
Affiliation(s)
- Aashiq Banu S
- School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur, 613 401, India
| | - Rengarajan Amirtharajan
- School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur, 613 401, India.
| |
Collapse
|
20
|
Zhu Y, Xu W, Luo G, Wang H, Yang J, Lu W. Random Forest enhancement using improved Artificial Fish Swarm for the medial knee contact force prediction. Artif Intell Med 2020; 103:101811. [PMID: 32143807 DOI: 10.1016/j.artmed.2020.101811] [Citation(s) in RCA: 25] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/07/2019] [Revised: 01/06/2020] [Accepted: 01/28/2020] [Indexed: 10/25/2022]
Abstract
Knee contact force (KCF) is an important factor to evaluate the knee joint function for the patients with knee joint impairment. However, the KCF measurement based on the instrumented prosthetic implants or inverse dynamics analysis is limited due to the invasive, expensive price and time consumption. In this work, we propose a KCF prediction method by integrating the Artificial Fish Swarm and the Random Forest algorithm. First, we train a Random Forest to learn the nonlinear relation between gait parameters (input) and contact pressures (output) based on a dataset of three patients instrumented with knee replacement. Then, we use the improved artificial fish group algorithm to optimize the main parameters of the Random Forest based KCF prediction model. The extensive experiments verify that our method can predict the medial knee contact force both before and after the intervention of gait patterns, and the performance outperforms the classical multi-body dynamics analysis and artificial neural network model.
Collapse
Affiliation(s)
- Yean Zhu
- East China Jiaotong University, Nanchang, China.
| | - Weiyi Xu
- East China Jiaotong University, Nanchang, China.
| | - Guoliang Luo
- East China Jiaotong University, Nanchang, China.
| | - Haolun Wang
- East China Jiaotong University, Nanchang, China.
| | | | - Wei Lu
- Jiangxi Provincial People's Hospital, Nanchang, China.
| |
Collapse
|
21
|
Image Encryption and Decryption Systems Using the Jigsaw Transform and the Iterative Finite Field Cosine Transform. PHOTONICS 2019. [DOI: 10.3390/photonics6040121] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
We propose the use of the Jigsaw transform (JT) and the iterative cosine transform over a finite field in order to encrypt and decrypt images. The JT is a nonlinear operation that allows one to increase the security over the encrypted images by adding new keys to the encryption and decryption systems. The finite field is a finite set of integer numbers where the basic mathematical operations are performed using modular arithmetic. The finite field used in the encryption and decryption systems has an order given by the Fermat prime number 257. The iterative finite field cosine transform (FFCT) was used in our work with the purpose of obtaining images that had an uniform random distribution. We used a security key given by an image randomly generated and uniformly distributed. The JT and iterative FFCT was utilized twice in the encryption and decryption systems. The encrypted images presented a uniformly distributed histogram and the decrypted images were the same original images used as inputs in the encryption system. The resulting decrypted images had a high level of image quality in comparison to the image quality of the decrypted images obtained by the actual optical decryption systems. The proposed encryption and decryption systems have three security keys represented by two random permutations used in the JTs and one random image. The key space of the proposed encryption and decryption systems is larger. The previous features of the security system allow a better protection of the encrypted image against brute force and statistical analysis attacks.
Collapse
|