An Efficient Image Encryption Scheme for Medical Image Security (original) (raw)
Related papers
Medical image encryption techniques: a technical survey and potential challenges
International Journal of Electrical and Computer Engineering (IJECE), 2023
Among the most sensitive and important data in telemedicine systems are medical images. It is necessary to use a robust encryption method that is resistant to cryptographic assaults while transferring medical images over the internet. Confidentiality is the most crucial of the three security goals for protecting information systems, along with availability, integrity, and compliance. Encryption and watermarking of medical images address problems with confidentiality and integrity in telemedicine applications. The need to prioritize security issues in telemedicine applications makes the choice of a trustworthy and efficient strategy or framework all the more crucial. The paper examines various security issues and cutting-edge methods to secure medical images for use with telemedicine systems.
Analysis of security problems in a medical image encryption system
Computers in Biology and Medicine, 2007
Recently a new system for the secure transmission and efficient storage of medical images interleaved with patient information has been proposed in 2003 by Rajendra Acharya et al. In this paper we analyse the security of this system, showing how to improve it to obtain a truly secure system.
An efficient image encryption scheme for healthcare applications
Multimedia Tools and Applications
In recent years, there has been an enormous demand for the security of image multimedia in healthcare organizations. Many schemes have been developed for the security preservation of data in e-health systems however the schemes are not adaptive and cannot resist chosen and known-plaintext attacks. In this contribution, we present an adaptive framework aimed at preserving the security and confidentiality of images transmitted through an e-healthcare system. Our scheme utilizes the 3D-chaotic system to generate a keystream which is used to perform 8-bit and 2-bit permutations of the image. We perform pixel diffusion by a key-image generated using the Piecewise Linear Chaotic Map (PWLCM). We calculate an image parameter using the pixels of the image and perform criss-cross diffusion to enhance security. We evaluate the scheme's performance in terms of histogram analysis, information entropy analysis, statistical analysis, and differential analysis. Using the scheme, we obtain the average Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) values for an image of size 256 × 256 equal to 99.5996 and 33.499 respectively. Furthermore, the average entropy is 7.9971 and the average Peak Signal to Noise Ratio (PSNR) is 7.4756. We further test the scheme on 50 chest X-Ray images of patients having COVID-19 and viral pneumonia and found the average values of variance, PSNR, entropy, and Structural Similarity Index (SSIM) to be 257.6268, 7.7389, 7.9971, and 0.0089 respectively. Furthermore, the scheme generates completely uniform histograms for medical images which reveals that the scheme can resist statistical attacks and can be applied as a security framework in AI-based healthcare.
An encryption scheme for securing multiple medical images
Journal of Information Security and Applications, 2019
With the rise in medical imaging tools and telemedicine technology, the distance barriers in providing health care have been reduced by communicating patients data over the internet. To provide patients with privacy, the data are encrypted while transmitting over the insecure network. The paper proposes an encryption scheme for multiple medical images using a new finding in elliptic curve analogue ElGamal cryptosystem and Mersenne Twister pseudo-random number generator. The new finding quickens the encryption time as well as solve the problem of data expansion associated with ElGamal cryptosystem. Results from simulation, security and statistical analyses show that the proposed encryption algorithm can be used for multiple medical images encryption.
Performances analysis of image encryption for medical applications
2015
This work is interested in securing transmission of digital images on the Internet, in public or local networks such as medical images, military or biometrics (authentication retina or fingerprint). We will implement three famous algorithms which are the RSA, DES and AES. The first one uses an asymmetric method for generating the keys (public and private) hence the second and the third algorithms are symmetric cipher block and use only private key for ciphering and deciphering. The simulation results will be presented and discussed in function of two main security parameters which are the length of the information blocks and the key length. Finally, a comparative study between the three techniques is conducted in order to classify everyone by the best performances of robustness especially with the presence of different kinds of attacks.
Techniques of medical image encryption taxonomy
Bulletin of Electrical Engineering and Informatics, 2022
Medical images are one of the most significant and sensitive data types in computer systems. Sending medical images over the internet necessitates using a robust encryption scheme that is resistant to cryptographic attacks. Confidentiality is the most critical part of the three security objectives for information systems security, namely confidentiality, integrity, and availability. Confidentiality is the most critical aspect for the secure storage and transfer of medical images. In this study, we attempt to classify various encryption methods in order to assist researchers in selecting the optimal strategy for protecting sensitive patient information while transferring medical images without alteration and outline the measures that should be adopted to address challenges and concerns relevant to techniques of medical image encryption.
Selective medical image encryption using DNA cryptography
Information Security Journal: A Global Perspective, 2020
In the medical field, advanced techniques like e-health, smart health, and telemedicine applications are in use. These techniques transmit a digital medical image via open-source networks. The digital medical image contains confidential and sensitive information of patients. The transmitted digital medical images are used for diagnosis in the remote center. Hence, providing security and maintaining the confidentiality of the medical image is a major apprehension. In this paper, DNA cryptography and dual hyperchaotic map techniques are proposed to provide high-level security for a digital medical image. The digital medical images are very large in size and require more computational time. To reduce computational time, the selective digital medical image encryption algorithm is proposed. In the proposed cryptosystem, the permutation and diffusion process are performed on selected pixels of digital medical images. To construct theDNA structure for digital medical images, all DNA encoding rules based on the pixel position of the digital medical image are used. The cipher image is attained by using all DNA decoding rules based on the pixel value of the digital medical image. The proposed cryptosystem is resistant to different types of attacks.
MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection
Journal of Sensor and Actuator Networks
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties. This right is typically protected by law through firm regulations set by healthcare authorities. However, sensitive-private data usually requires the application of further security and privacy mechanisms such as encipherment (encryption) techniques. ’Medical images’ is one such example of highly demanding security and privacy standards. This is due to the quality and nature of the information carried among these images, which are usually sensitive-private information with few features and tonal variety. Hence, several state-of-the-art encryption mechanisms for medical images have been proposed and developed; however, only a few were efficient and promising. This paper presents a hybrid crypto-algorithm, MID-Crypt, to secure the medical image communicated between medical laboratories and doctors’ accounts. MID-Crypt is...
Selective Encryption of Medical Images
Proceedings of the 10th International Conference on Computer Vision Theory and Applications, 2015
The transfer of image in the digital world plays a very important role, their security is an important issue, and encryption is one of the ways to ensure security. Few applications like medical image security needs to secure only selected region of the image. This work proposes a selective encryption approach for medical images. The approach based on Grain-128 which provides the facilities of implementation of selective image encryption and decryption. Several tests are done in order to prove the approach performance including visual tests, key sensitivity, entropy analysis and correlation coefficient analysis.