Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications

被引:85
作者
El-Shafai, Walid [1 ,2 ,3 ]
Khallaf, Fatma [2 ,3 ]
El-Rabaie, El-Sayed M. [2 ]
El-Samie, Fathi E. Abd [2 ,4 ]
机构
[1] Prince Sultan Univ, Comp Sci Dept, Secur Engn Lab, Riyadh 11586, Saudi Arabia
[2] Menoufia Univ, Dept Elect & Elect Commun Engn, Fac Elect Engn, Menoufia 32952, Egypt
[3] Ahram Canadian Univ, Dept Elect Engn, Fac Engn, Giza, Egypt
[4] Princess Nourah Bint Abdulrahman Univ, Dept Informat Technol, Coll Comp & Informat Sci, Riyadh 21974, Saudi Arabia
关键词
Medial image encryption; DNA technology; PWLCM; Logistic chaos map; Healthcare and telemedicine applications; Security systems; ALGORITHM;
D O I
10.1007/s12652-020-02597-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security of healthcare and telemedicine systems is a critical issue that must be significantly investigated. Several smart telemedicine applications are expected to be adopted in the medical sector in the incoming years. Healthcare smart products that are connected through Internet to be accessible anytime and anywhere are expected to deal with critical and confidential information such as personal medical images. Therefore, medical image encryption is an important task in telemedicine and healthcare applications. This paper presents an efficient cryptosystem for medical image security based on exploiting the advantages of the de-oxyribo nucleic acid (DNA) rules and chaos maps. In the proposed medical image cryptosystem, logistic chaos map, piecewise linear chaotic map (PWLCM), and DNA encoding are employed. The PWLCM is employed to generate a secret key image. Then, the DNA rules are utilized for encoding the secret key image and the input plain image by rows that are encoded with the logistic chaos map. After that, the proposed logistic map is employed to obtain an intermediate image as another secret key image to set DNA functions row-by-row on the coded original image. Moreover, the intermediate image is decoded in the following stage. Finally, the previous actions are iterated through image columns once again to obtain the best ciphered image. The experimental results reveal that the suggested cryptosystem has a high security with an acceptable processing time. In addition, it can resist various kinds of attacks, such as known-plaintext and chosen-plaintext attacks.
引用
收藏
页码:9007 / 9035
页数:29
相关论文
共 53 条
[1]   Cryptanalysis of "an improvement over an image encryption method based on total shuffling" [J].
Akhavan, A. ;
Samsudin, A. ;
Akhshani, A. .
OPTICS COMMUNICATIONS, 2015, 350 :77-82
[2]   Selective medical image encryption using DNA cryptography [J].
Akkasaligar, Prema T. ;
Biradar, Sumangala .
INFORMATION SECURITY JOURNAL, 2020, 29 (02) :91-101
[3]  
Akkasaligar PT, 2016, 2016 IEEE INT C COMP, P1, DOI 10.1109/ICCIC.2016.7919681
[4]   A Novel Hybrid Cryptosystem for Secure Streaming of High Efficiency H.265 Compressed Videos in IoT Multimedia Applications [J].
Alarifi, Abdulaziz ;
Sankar, Syam ;
Altameem, Torki ;
Jithin, K. C. ;
Amoon, Mohammed ;
El-Shafai, Walid .
IEEE ACCESS, 2020, 8 :128548-128573
[5]  
Amin ST, 2006, PROCEEDINGS OF THE SECOND IASTED INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, P116
[6]   Research on image encryption technology based on multi chaotic mapping [J].
Awudong, Buhailiqiemu ;
Li, Guodong .
2017 INTERNATIONAL CONFERENCE ON SMART CITY AND SYSTEMS ENGINEERING (ICSCSE 2017), 2017, :127-131
[7]   Novel Medical Image Encryption Scheme Based on Chaos a DNA Encoding [J].
Belazi, Akram ;
Talha, Muhammad ;
Kharbech, Sofiane ;
Xiang, Wei .
IEEE ACCESS, 2019, 7 :36667-36681
[8]   A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation [J].
Ben Farah, M. A. ;
Guesmi, R. ;
Kachouri, A. ;
Samet, M. .
OPTICS AND LASER TECHNOLOGY, 2020, 121
[9]   An improved reversible and secure patient data hiding algorithm for telemedicine applications [J].
Bhardwaj, Rupali .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) :2915-2929
[10]  
Boriga Radu Eugen, 2014, IAENG International Journal of Computer Science, V41, P249