1
|
Khan AN, Mehmood A, Bhutta MNM, Khan IA, Khan AUR. An efficient and compromise-resilient image encryption scheme for resource-constrained environments. PLoS One 2024; 19:e0297534. [PMID: 38635816 PMCID: PMC11025941 DOI: 10.1371/journal.pone.0297534] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/13/2023] [Accepted: 01/08/2024] [Indexed: 04/20/2024] Open
Abstract
The secret keys produced by current image cryptosystems, which rely on chaotic sequences, exhibit a direct correlation with the size of the image. As the image dimensions expand, the generation of extensive chaotic sequences in the encryption and decryption procedures becomes more computationally intensive. Secondly, a common problem in existing image encryption schemes is the compromise between privacy and efficiency. Some existing lightweight schemes reveal patterns in encrypted images, while others impose heavy computational burdens during encryption/decryption due to the need for large chaotic sequences. In this study, we introduce a lightweight image encryption scheme that involves partitioning the image into uniformly sized tiles and generating a chaotic sequence accordingly. This approach diminishes the necessity to create extensive chaotic sequences equal to the tile size, which is significantly smaller than the original image. As a result, it alleviates the processing burden associated with generating sequences equivalent to the original image size. The results confirm that our proposed scheme is lightweight and secure compared to the latest state-of-the-art image encryption schemes. Additionally, sensitivity analysis demonstrates that the proposed image encryption technique, with a UACI value of 33.48 and NPRC value of 99.96, affirms its resistance to differential attacks.
Collapse
Affiliation(s)
- Abdul Nasir Khan
- COMSATS University Islamabad, Abbottabad Campus, Khyber Pakhtunkhwa, Pakistan
| | - Abid Mehmood
- Department of Computer Science and Information Technology, College of Engineering, Abu Dhabi University, Abu Dhabi, UAE
| | - Muhammad Nasir Mumtaz Bhutta
- Department of Computer Science and Information Technology, College of Engineering, Abu Dhabi University, Abu Dhabi, UAE
| | - Iftikhar Ahmed Khan
- COMSATS University Islamabad, Abbottabad Campus, Khyber Pakhtunkhwa, Pakistan
| | | |
Collapse
|
2
|
Chandramohan A, Krothapalli V, Augustin A, Kandagaddala M, Thomas HM, Sudarsanam TD, Jagirdar A, Govil S, Kalyanpur A. Teleradiology and technology innovations in radiology: status in India and its role in increasing access to primary health care. THE LANCET REGIONAL HEALTH. SOUTHEAST ASIA 2024; 23:100195. [PMID: 38404514 PMCID: PMC10884973 DOI: 10.1016/j.lansea.2023.100195] [Citation(s) in RCA: 4] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/27/2022] [Revised: 02/19/2023] [Accepted: 03/27/2023] [Indexed: 02/27/2024]
Abstract
Background There is an inequitable distribution of radiology facilities in India. This scoping review aimed at mapping the available technology instruments to improve access to imaging at primary health care; to identify the facilitators and barriers, and the knowledge gaps for widespread adaptation of technology solutions. Methods A search was conducted using broad inclusive terms non-specific to subtypes of medical imaging devices or informatics. Work published in the English language between 2005 and 2022, conducted primarily in India, and with full manuscripts were included. Two authors independently screened the abstracts against the inclusion criteria for full-text review and a senior author settled discrepancies. Data were extracted using DistillerSR software. Findings 43 original articles and 52 non-academic materials were finally reviewed. The data was from 10 Indian states with n = 9 from rural settings. The broad trends in original articles were: connectivity using teleradiology (n = 7), mobile digital imaging units (n = 9), artificial intelligence (n = 16); mobile devices and smartphone applications (n = 7); data security (n = 7) and web-based technology (n = 2); public-private partnership (n = 9); cost (n = 2); concordance (n = 19); evaluation (n = 4); implementation (n = 2). Interpretation Available evidence suggests that teleradiology when combined with AI and mobile digital imaging units can address radiologist shortages; strengthen programs aimed at population screening and emergency care. However, there is insufficient data on the scale of teleradiology networks within India; needs assessment; cost; facilitators, and barriers for implementation of technologies solutions in primary healthcare settings. Regulations governing quality standards, data protection, and confidentiality are unclear. Funding The authors are The Lancet Citizen's Commission fellows. The Lancet Commission has received financial support from the Lakshmi Mittal and Family South Asia Institute, Harvard University; Christian Medical College, Vellore (CMC), Vellore; Azim Premji Foundation, Infosys; Kirloskar Systems Ltd.; Mahindra & Mahindra Ltd.; Rohini Nilekani Philanthropies; and Serum Institute of India. The views expressed are those of the author(s) and not necessarily those of the Lancet Citizens' Commission or its partners.
Collapse
Affiliation(s)
| | | | - Ann Augustin
- Department of Radiology, Christian Medical College, Vellore, 632004, India
| | | | | | | | | | - Shalini Govil
- Department of Radiology, Christian Medical College, Vellore, 632004, India
- Naruvi Hospital, Vellore, India
- Pun Hlaing Hospital, Myanmar
| | - Arjun Kalyanpur
- Teleradiology Solutions, Whitefield, Bengaluru, Karnataka, 560048, India
| |
Collapse
|
3
|
Zhang B, Rahmatullah B, Wang SL, Almutairi HM, Xiao Y, Liu X, Liu Z. A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode. Med Biol Eng Comput 2023; 61:2971-3002. [PMID: 37542682 DOI: 10.1007/s11517-023-02874-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/25/2022] [Accepted: 06/20/2023] [Indexed: 08/07/2023]
Abstract
Since the COVID-19 pandemic, telemedicine or non-face-to-face medicine has increased significantly. In practice, various types of medical images are essential to achieve effective telemedicine. Medical image encryption algorithms play an irreplaceable role in the fast and secure transmission and storage of these medical images. However, most of the existing medical image encryption algorithms are full encryption algorithms, which are inefficient and time-consuming, so they are not suitable for emergency medical scenarios. To improve the efficiency of encryption, a small number of works have focused on partial or selective encryption algorithms for medical images, in which different levels of encryption strategies were adopted for different information content regions of medical images. However, these encryption algorithms have inadequate security more or less. In this paper, based on the Logistic map, we designed an improved variable dimension map. Then, an encryption algorithm for medical images was proposed based on it. This algorithm has two modes: (1) full encryption mode and (2) semi-full encryption mode, which can better adapt to different medical scenarios, respectively. In full encryption mode, all pixels of medical images are encrypted by using the confusion-diffusion structure. In semi-full encryption mode, the region of interest of medical images is extracted. The confusion was first adopted to encrypt the region of interest, and then, the diffusion was adopted to encrypt the entire image. In addition, no matter which encryption mode is used, the algorithm provides the function of medical image integrity verification. The proposed algorithm was simulated and analyzed to evaluate its effectiveness. The results show that in semi-full encryption mode, the algorithm has good security performance and lower time consumption; while in full encryption mode, the algorithm has better security performance and is acceptable in time.
Collapse
Affiliation(s)
- Bin Zhang
- School of Computer Science, Baoji University of Arts and Sciences, Baoji, China
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia
| | - Bahbibi Rahmatullah
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia.
| | - Shir Li Wang
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia
| | | | - Yan Xiao
- School of Computer Science, Baoji University of Arts and Sciences, Baoji, China
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia
| | - Xinjuan Liu
- School of Computer Science, Baoji University of Arts and Sciences, Baoji, China
| | - Zhaoyan Liu
- School of Cyber Engineering, Xidian University, Xi'an, China
| |
Collapse
|
4
|
Efficient SCAN and Chaotic Map Encryption System for Securing E-Healthcare Images. INFORMATION 2023. [DOI: 10.3390/info14010047] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/15/2023] Open
Abstract
The largest source of information in healthcare during the present epidemic is radiological imaging, which is also one of the most difficult sources to interpret. Clinicians today are forced to rely heavily on therapeutic image analysis that has been filtered and sometimes performed by worn-out radiologists. Transmission of these medical data increases in frequency due to patient overflow, and protecting confidentiality, along with integrity and availability, emerges as one of the most crucial components of security. Medical images generally contain sensitive information about patients and are therefore vulnerable to various security threats during transmission over public networks. These images must be protected before being transmitted over this network to the public. In this paper, an efficient SCAN and chaotic-map-based image encryption model is proposed. This paper describes pixel value and pixel position manipulation based on SCAN and chaotic theory. The SCAN method involves translating an image’s pixel value to a different pixel value and rearranging pixels in a predetermined order. A chaotic map is used to shift the positions of the pixels within the block. Decryption follows the reverse process of encryption. The effectiveness of the suggested strategy is evaluated by computing the histogram chi-square test, MSE, PSNR, NPCR, UACI, SSIM, and UQI. The efficiency of the suggested strategy is demonstrated by comparison analysis. The results of analysis and testing show that the proposed program can achieve the concept of partial encryption. In addition, simulation experiments demonstrate that our approach has both a faster encryption speed and higher security when compared to existing techniques.
Collapse
|
5
|
Zhang B, Rahmatullah B, Wang SL, Liu Z. A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map. MULTIMEDIA TOOLS AND APPLICATIONS 2022; 82:15735-15762. [PMID: 36185323 PMCID: PMC9510328 DOI: 10.1007/s11042-022-13744-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/13/2022] [Revised: 04/18/2022] [Accepted: 08/29/2022] [Indexed: 06/16/2023]
Abstract
Modern medical examinations have produced a large number of medical images. It is a great challenge to transmit and store them quickly and securely. Existing solutions mainly use medical image encryption algorithms, but these encryption algorithms, which were developed for ordinary images, are time-consuming and must cope with insufficient security considerations when encrypting medical images. Compared with ordinary images, medical images can be divided into the region of interest and the region of background. In this paper, based on this characteristic, a plain-image correlative semi-selective medical image encryption algorithm using the enhanced two dimensional Logistic map was proposed. First, the region of interest of a plain medical image is permuted at the pixel level, then for the whole medical image, substitution is performed pixel by pixel. An ideal compromise between encryption speed and security can be achieved by full-encrypting the region of interest and semi-encrypting the region of background. Several main types of medical images and some normal images were selected as the samples for simulation, and main image cryptanalysis methods were used to analyze the results. The results showed that the cipher-images have a good visual quality, high information entropy, low correlation between adjacent pixels, as well as uniformly distribute histogram. The algorithm is sensitive to the initial key and plain-image, and has a large keyspace and low time complexity. The time complexity is lower when compared with the current medical image full encryption algorithm, and the security performance is better when compared with the current medical image selective encryption algorithm.
Collapse
Affiliation(s)
- Bin Zhang
- Data Intelligence and Knowledge Management, Faculty of Arts, Computing and Creative Industry, Sultan Idris Education University (UPSI), Tanjong Malim, Perak Malaysia
- School of Computer Science, Baoji University of Arts and Sciences, Baoji, China
| | - Bahbibi Rahmatullah
- Data Intelligence and Knowledge Management, Faculty of Arts, Computing and Creative Industry, Sultan Idris Education University (UPSI), Tanjong Malim, Perak Malaysia
| | - Shir Li Wang
- Data Intelligence and Knowledge Management, Faculty of Arts, Computing and Creative Industry, Sultan Idris Education University (UPSI), Tanjong Malim, Perak Malaysia
| | - Zhaoyan Liu
- School of Cyber Engineering, Xidian University, Xi’an, China
| |
Collapse
|