IJIGSP Vol. 15, No. 5, 8 Oct. 2023
Cover page and Table of Contents: PDF (size: 864KB)
Full Text (PDF, 864KB), PP.88-99
Views: 0 Downloads: 0
Image Encryption, Logistic Chaotic map, Sine Chaotic map, Secure transmission, e-healthcare
E-healthcare systems (EHSD), medical communications, digital imaging (DICOM) things have gained popularity over the past decade as they have become the top contenders for interoperability and adoption as a global standard for transmitting and communicating medical data. Security is a growing issue as EHSD and DICOM have grown more usable on any-to-any devices. The goal of this research is to create a privacy-preserving encryption technique for EHSD rapid communication with minimal storage. A new 2D logistic-sine chaotic map (2DLSCM) is used to design the proposed encryption method, which has been developed specifically for peer-to-peer communications via unique keys. Through the 3D Lorenz map which feeds the initial values to it, the 2DLSCM is able to provide a unique keyspace of 2544 bits (2^544bits) in each go of peer-to-peer paired transmission. Permutation-diffusion design is used in the encryption process, and 2DLSCM with 3DLorenz system are used to generate unique initial values for the keys. Without interfering with real-time medical transmission, the approach can quickly encrypt any EHSD image and DICOM objects. To assess the method, five distinct EHSD images of different kinds, sizes, and quality are selected. The findings indicate strong protection, speed, and scalability when compared to existing similar methods in literature.
Devisha Tiwari, Bhaskar Mondal, Anil Singh, "Fast Encryption Scheme for Secure Transmission of e-Healthcare Images", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.15, No.5, pp. 88-99, 2023. DOI:10.5815/ijigsp.2023.05.07
[1]Bhaskar Mondal, Dilip Kumar, and Tarni Mandal. Security challenges in internet of things. International Journal of Software and Web Sciences, pages 8–12, June-August 2015. ISSN 2279-0071.
[2]Bhaskar Mondal and Jyoti Prakash Singh. A lightweight image encryp- tion scheme based on chaos and diffusion circuit. Multimedia Tools and Applications, pages 1–25, 2022.
[3]Satyabrata Roy, Umashankar Rawat, and Jyotirmoy Karjee. A lightweight cellular automata-based encryption technique for IoT applications. IEEE Access, 7:39782–39793, 2019.
[4]Yushu Zhang and Di Xiao. An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Communications in Nonlinear Science and Numerical Simulation, 19(1):74–82, 2014.
[5]Tahir Sajjad Ali and Rashid Ali. A new chaos-based color image encryp- tion algorithm using permutation substitution and boolean operation. Multimedia Tools and Applications, 79(27):19853–19873, 2020.
[6]Bhaskar Mondal, Tarni Mandal, Danish A Khan, and Tanupriya Choudhury. A secure image encryption scheme using chaos and wavelet transformations. Recent Patents on Engineering, 12(1):5–14, 2018.
[7]Xiuli Chai, Jitong Zhang, Zhihua Gan, and Yushu Zhang. Medical image encryption algorithm based on latin square and memristive chaotic system. Multimedia Tools and Applications, 78(24):35419–35453, 2019.
[8]Khalid M. Hosny, Sara T. Kamal, and Mohamed M. Darwish. A novel color image encryption based on fractional shifted gegenbauer moments and 2d logistic-sine map. The Visual Computer, January 2022. doi: 10.1007/s00371-021-02382-1.https://doi.org/10.1007/ s00371-021-02382-1.
[9]Joshua C Dagadu, Jian-Ping Li, and Emelia O Aboagye. Medical image encryption based on hybrid chaotic DNA diffusion. Wireless Personal Communications, 108(1):591–612, 2019.
[10]Ali Mansouri and Xingyuan Wang. Image encryption using shuffled Arnold map and multiple values manipulations. The Visual Computer, 37(1): 189–200, January 2020. doi: 10.1007/s00371-020-01791-y. https://doi.org/10.1007/s00371-020-01791-y.
[11]Li-bo Zhang, Zhi-liang Zhu, Ben-qiang Yang, Wen-yuan Liu, Hong-feng Zhu, and Ming-yu Zou. Medical image encryption and compression scheme using compressive sensing and pixel swapping based permutation approach. Mathematical Problems in Engineering, 2015, 2015.
[12]Xingyuan Wang, Yining Su, Lin Liu, Hao Zhang, and Shuhong Di. Color image encryption algorithm based on fisher-yates scrambling and DNA subsequence operation. The Visual Computer, October 2021. doi: 10.1007/s00371-021-02311-2. https://doi.org/10.1007/ s00371-021-02311-2.
[13]Mohamed Zakariya Talhaoui, Xingyuan Wang, and Mohamed Amine Midoun. A new one-dimensional cosine polynomial chaotic map and its use in image encryption. The Visual Computer, 37(3):541–551, March 2020. doi: 10.1007/s00371-020-01822-8. https://doi.org/10.1007/ s00371-020-01822-8.
[14]Xianglian Xue, Haiyan Jin, Dongsheng Zhou, and Changjun Zhou. Medical image protection algorithm based on deoxyribonucleic acid chain of dynamic length. Frontiers in Genetics, 12:266, 2021.
[15]Shalini Stalin, Priti Maheshwary, Piyush Kumar Shukla, Manish Maheshwari, Bhupesh Gour, and Ankur Khare. Fast and secure medical image encryption based on nonlinear 4d logistic map and dna sequences (nl4dlm dna). Journal of medical systems, 43(8):1–17, 2019.
[16]Ji Xu, Jun Mou, Jian Liu, and Jin Hao. The image compres- sion–encryption algorithm based on the compression sensing and fractional-order chaotic system. The Visual Computer, 38(5):1509–1526, March 2021. doi: 10.1007/s00371-021-02085-7. https://doi.org/10. 1007/s00371-021-02085-7.
[17]Abdelhalim Kamrani, Khalid Zenkouar, and Said Najah. A new set of image encryption algorithms based on discrete orthogonal moments and chaos theory. Multimedia Tools and Applications, 79(27):20263–20279,2020.
[18]Anvita Gupta, Dilbag Singh, and Manjit Kaur. An efficient image encryp- tion using non-dominated sorting genetic algorithm-iii based 4-d chaotic maps. Journal of Ambient Intelligence and Humanized Computing, 11(3): 1309–1324, 2020.
[19]Prema T Akkasaligar and Sumangala Biradar. Medical image compression and encryption using chaos based dna cryptography. In 2020 IEEE Ban- galore Humanitarian Technology Conference (B-HTC), pages 1–5. IEEE, 2020.
[20]Bhaskar Mondal. Cryptographic image scrambling techniques. In Cryptographic and Information Security, pages 37–65. CRC Press, 2018.
[21]Mustapha Benssalah, Yasser Rhaskali, and Mohamed Salah Azzaz. Medical images encryption based on elliptic curve cryptography and chaos theory. In 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT), pages 222–226. IEEE, 2018.
[22]Baoru Han, Yuanyuan Jia, Guo Huang, and Lisha Cai. A medical image encryption algorithm based on hermite chaotic neural network. In 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), volume 1, pages 2644–2648. IEEE, 2020.
[23]Mohamed A Wahby Shalaby, Marwa T Saleh, and Hesham N Elmahdy. Enhanced Arnold’s cat map-aes encryption technique for medical images. In 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES), pages 288–295. IEEE, 2020.
[24]Rajiv Ranjan Suman, Bhaskar Mondal, and Tarni Mandal. A secure encryption scheme using a composite logistic sine map (clsm) and sha-256. Multimedia Tools and Applications, pages 1–22, 2022.
[25]Zhongyun Hua, Fan Jin, Binxuan Xu, and Hejiao Huang. 2d logistic- sine-coupling map for image encryption. Signal Processing, 149:148–161, 2018.
[26]Walid El-Shafai, Fatma Khallaf, El-Sayed M El-Rabaie, and Fathi E Abd El-Samie. Robust medical image encryption based on dna-chaos cryptosystem for secure telemedicine and healthcare applications. Journal of Ambient Intelligence and Humanized Computing, pages 1–29, 2021.