Security of medical images based on special orthogonal group and Galois field | Multimedia Tools and Applications
Skip to main content

Security of medical images based on special orthogonal group and Galois field

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Security of medical images over an unsecured channel is a challenging task, and for this, several methods have been designed recently. The present paper is also in the same direction, and is an attempt to improve the security of the existing methods. In this paper, a cryptosystem is proposed, which performs encryption and decryption in the CBC (Cipher Block Chaining) mode of operation, and attains the confusion-diffusion properties using the PSN (Permutation-Substitution Network) of cryptography. The permutation is performed by a composite operation, consisting of rotation (via special orthogonal group), reflection, flipping, and pixel-wise shuffling, while substitution is performed by a composite operation of multiplication and multiplicative inverse over Galois field. The Archimedes’ constant is utilized for constructing Initialization Vector (IV) to be used in the CBC mode of encryption (and decryption). The proposed approach is able to encrypt monochrome (8-bit, 10-bit, 12-bit, and 16-bit), palette color, and 24-bit color medical images, simultaneously into noisy-like images from the human visual as well as the statistical point of view. The designed approach is empirically assessed via several statistical and security evaluation metrics, such as key sensitivity, chi-squared test, number of pixel change rate, avalanche effect, poker test, peak signal-to-noise ratio, etc. The results of these metrics support the objectives of our proposed approach. Moreover, a thorough comparison is also made with the recent state-of-the-art existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abdel-Rehim WMF, Ismail IA, Morsy E (2012) Testing randomness: Poker test with hands of three numbers. J Comput Sci 8(8):1353–1357

    Article  Google Scholar 

  2. Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inf Secur J: A Glob Perspect 29(2):91–101. https://doi.org/10.1080/19393555.2020.1718248

    Google Scholar 

  3. Ali TS, Ali R (2020) A novel medical image signcryption scheme using TLTS and Henon chaotic map. IEEE Access 8:71974–71992. https://doi.org/10.1109/ACCESS.2020.2987615

    Article  Google Scholar 

  4. Alqazzaz SF, Elsharawy GA, Eid HF (2022) Robust 4-D hyperchaotic DNA framework for medical image encryption. Int J Comput Netw Inf Secur 14 (2):67–76. https://doi.org/10.5815/ijcnis.2022.02.06

    Google Scholar 

  5. Arndt J, Haenel C (2006) Pi – Unleashed. Springer, Berlin, Heidelberg

    MATH  Google Scholar 

  6. Available from https://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio. Accessed 06 Oct 2022

  7. Available from https://mathworld.wolfram.com/Pi.html. Accessed 06 Oct 2022

  8. Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu MK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42:208. https://doi.org/10.1007/s10916-018-1053-z

    Article  Google Scholar 

  9. Barik RC, Changder S (2021) A novel and efficient amino acid codon based medical image encryption scheme colligating multiple chaotic maps. Multimed Tools Appl 80:10723–10760. https://doi.org/10.1007/s11042-020-09930-2

    Article  Google Scholar 

  10. Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667–36681. https://doi.org/10.1109/ACCESS.2019.2906292

    Article  Google Scholar 

  11. Biham E, Shamir A (1993) Differential cryptanalysis of the Data Encryption Standard (DES). Springer, New York

    Book  MATH  Google Scholar 

  12. Bogart S (1999) What is pi, and how did it originate? Scientific American. Available from: https://www.scientificamerican.com/article/what-is-pi-and-how-did-it-originate/. Accessed 06 Oct 2022

  13. CT-Training-BE001 database Available from: https://data.iplantcollaborative.org/dav-anon/iplant/projects/TCIA/SPIE-AAPM%20Lung%20CT%20Challenge/CT-Training-BE001/1.2.840.113704.1.111.2112.1167842143.1/1.2.840.113704.1.111.2112.1167842347.17/. Accessed 06 Oct 2022

  14. Castro JCH, Sierra JM, Seznec A, Izquierdo A, Ribagorda A (2005) The strict avalanche criterion randomness test. Math Comput Simul 68(1):1–7

    Article  MathSciNet  MATH  Google Scholar 

  15. Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Netw 2017:6729896. https://doi.org/10.1155/2017/6729896

    Article  Google Scholar 

  16. Chen J, Chen L, Zhang LY, Zhu ZL (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96:301–322. https://doi.org/10.1007/s11071-019-04791-3

    Article  Google Scholar 

  17. Cochran WG (1952) The chi-square test of goodness of fit. Ann Math Stat 23(3):315–345

    Article  MATH  Google Scholar 

  18. Computed tomography images of Mikael Häggström’s brain Available from: https://commons.wikimedia.org/wiki/Category:Computed_tomography_images_of_Mikael_H%C3%A4ggstr%C3%B6m%27s_brain. Accessed 06 Oct 2022

  19. CrypTool (2017) An open-source windows program for cryptography and cryptanalysis. Available from: https://www.cryptool.org/en/. Accessed 06 Oct 2022

  20. Dagadu JC, Li JP, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun 108:591–612. https://doi.org/10.1007/s11277-019-06420-z

    Article  Google Scholar 

  21. Dagadu JC, Li J, Aboagye EO, Deynu FK (2019) Medical image encryption scheme based on multiple chaos and DNA coding. Int J Netw Secur 21 (1):83–90. https://doi.org/10.6633/IJNS.20190121(1).10

    Google Scholar 

  22. Dai Y, Wang H (2016) Chaotic medical image encryption algorithm based on bit-plane decomposition. Int J Pattern Recognit Artif Intell 30(4):1–15. https://doi.org/10.1142/S0218001416570019

    Article  Google Scholar 

  23. Digital Imaging and Communications in Medicine (DICOM) documentation Available from: http://medical.nema.org/standard.html. Accessed 06 Oct 2022

  24. Dummit D, Foote R (2004) Abstract algebra, 3rd. Wiley, New Jersey

    MATH  Google Scholar 

  25. ECRYPT II yearly report on algorithms and keysizes (2011–2012) Editor Nigel Smart (BRIS). Available from: https://www.ecrypt.eu.org/ecrypt2/documents/D.SPA.20.pdf. Accessed 06 Oct 2022

  26. Euclidean Algorithm Encyclopedia of Mathematics. Available from: http://encyclopediaofmath.org/index.php?title=Euclidean_algorithm&oldid=35888. Accessed 06 Oct 2022

  27. Field. Encyclopedia of Mathematics. Available from http://encyclopediaofmath.org/index.php?title=Field&oldid=17014. Accessed 06 Oct 2022

  28. Fiestel H (1973) Cryptography and computer privacy. Sci Am 228 (5):15–23. https://doi.org/10.1038/scientificamerican0573-15

    Article  Google Scholar 

  29. Fisher RA, Yates F (1958) Statistical Methods for Research Workers, 13th edn. US, New York: Hafner

  30. Gafsi M, Abbassi N, Hajjaji MA, Malek J, Mtibaa A (2020) Improved chaos-based cryptosystem for medical image encryption and decryption. Sci Program 2020(6612390):1–22. https://doi.org/10.1155/2020/6612390

    Google Scholar 

  31. Galois field. Encyclopedia of Mathematics. Available from http://encyclopediaofmath.org/index.php?title=Galois_field&oldid=34238. Accessed 06 Oct 2022

  32. Gaurav A, Psannis K, Peraković D (2022) Security of cloud-based Medical Internet of Things (MIoTs): A survey. Int J Software Sci Comput Intell 14(1):1–16. https://doi.org/10.4018/IJSSCI.285593

    Article  Google Scholar 

  33. Guesmi R, Farah MAB (2021) A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimed Tool Appl 80:1925–1944. https://doi.org/10.1007/s11042-020-09672-1

    Article  Google Scholar 

  34. Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144. https://doi.org/10.1016/j.sigpro.2017.10.004

    Article  Google Scholar 

  35. Ibrahim S, Alhumyani H, Masud M, Alshamrani SS, Cheikhrouhou O, Muhammad G, Hossain MS, Abbas AM (2020) Framework for efficient medical image encryption using dynamic S-Boxes and chaotic maps. IEEE Access 8:160433–160449. https://doi.org/10.1109/ACCESS.2020.3020746

    Article  Google Scholar 

  36. Ismail R, Fattah A, Saqr HM, Nasr ME (2022) An efficient medical image encryption schemefor (WBAN) based on adaptive DNA and modern multi-chaotic map. Multimed Tool Appl. https://doi.org/10.1007/s11042-022-13343-8

  37. Jeevitha S, Prabha NA (2021) Novel medical image encryption using DWT block based scrambling and edge maps, vol 12. https://doi.org/10.1007/s12652-020-02399-9

  38. Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855–37865. https://doi.org/10.1109/ACCESS.2021.3063237

    Article  Google Scholar 

  39. Kumar S, Panna B, Jha RK (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 57:2517–2533. https://doi.org/10.1007/s11517-019-02037-3

    Article  Google Scholar 

  40. Larobina M, Murino L (2014) Medical image file formats. J Digit Imaging 27:200–206. https://doi.org/10.1007/s10278-013-9657-9

    Article  Google Scholar 

  41. Li M, Pan S, Meng W, Guoyong W, Ji Z, Wang L (2022) Medical image encryption algorithm based on hyper-chaotic system and DNA coding. Cognitive Computation and Systems, pp 1–13. https://doi.org/10.1049/ccs2.12070

  42. Li S, Zhao L, Yang N (2021) Medical image encryption based on 2D zigzag confusion and dynamic diffusion. Secur Commun Netw 6624809:1–23. https://doi.org/10.1155/2021/6624809

    Google Scholar 

  43. Lima JB, Madeiro F, Sales FJR (2015) Encryption of medical images based on the cosine number transform. Signal Process: Image Commun 35:1–8. 10.1016/j.image.2015.03.005

    Google Scholar 

  44. Liu J, Tang S, Lian J, Ma Y, Zhang X (2019) A novel fourth order chaotic system and its algorithm for medical image encryption. Multidimens Syst Signal Process 30:1637–1657. https://doi.org/10.1007/s11045-018-0622-0

    Article  MATH  Google Scholar 

  45. Medical Image Samples Available from: https://barre.dev/medical/samples/. Accessed 06 Oct 2022

  46. Mortajez S, Tahmasbi M, Zarei J, Jamshidnezhad A (2020) A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images. Inform Med Unlocked 20:100396. https://doi.org/10.1016/j.imu.2020.100396

    Article  Google Scholar 

  47. Mullican T (2019) Calculating pi: My attempt at breaking the pi world record. Bits and Bytes. Available from: https://blog.timothymullican.com/calculating-pi-my-attempt-breaking-pi-record. Accessed 06 Oct 2022

  48. Mullican T (2020) Most accurate value of pi. Guinness World Records. Available from: https://www.guinnessworldrecords.com/world-records/66179-most-accurate-value-of-pi. Accessed 06 Oct 2022

  49. NIH image database Available from: https://nihcc.app.box.com/v/ChestXray-NIHCC/folder/37178474737 (images_001.tar.gz folder). Accessed 06 Oct 2022

  50. NLM’s MedPix database Available from: https://medpix.nlm.nih.gov/search?allen=true&allt=true&alli=true&query=Synpic57851. Accessed 06 Oct 2022

  51. Nematzadeh H, Enayatifar R, Motameni H, Guimarães FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:24–32. https://doi.org/10.1016/j.optlaseng.2018.05.009

    Article  Google Scholar 

  52. Orthogonal group. Encyclopedia of Mathematics. Available from: http://encyclopediaofmath.org/index.php?title=Orthogonal_group&oldid=34320. Accessed 06 Oct 2022

  53. Pareek NK, Patidar V (2016) Medical image protection using genetic algorithm operations. Soft Comput 20:763–772. https://doi.org/10.1007/s00500-014-1539-7

    Article  Google Scholar 

  54. Pearson K (1895) Contributions to the mathematical theory of evolution.–II. Skew variation in homogeneous material. Philos Trans Royal Soc: A Math Phys Eng Sci 186:343–414

    Google Scholar 

  55. Pearson K (1900) On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. Philos Mag 50(5):302:157–175

    MathSciNet  MATH  Google Scholar 

  56. Reyad O, Hamed K, Karar ME (2020) Hash-enhanced elliptic curve bit-string generator for medical image encryption. J Intell Fuzzy Syst 39 (5):7795–7806. https://doi.org/10.3233/JIFS-201146

    Article  Google Scholar 

  57. Shafique A, Ahmed J, Rehman MU, Hazzazi MM (2021) Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain. IEEE Access 9:59108–59130. https://doi.org/10.1109/ACCESS.2021.3071535

    Article  Google Scholar 

  58. Shankar K, Elhoseny M, Chelvi ED, Lakshmanaprabu SK, Wanqing WU (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145–77154. https://doi.org/10.1109/ACCESS.2018.2874026

    Article  Google Scholar 

  59. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423

    Article  MathSciNet  MATH  Google Scholar 

  60. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech 28(4):656–715

    Article  MathSciNet  MATH  Google Scholar 

  61. Singh LD, Singh KM (2017) Medical image encryption based on improved ElGamal encryption technique. Optik – Int J Light Electron Optics 147:88–102. doi:10.1016/j.ijleo.2017.08.028

    Article  Google Scholar 

  62. Stalin S, Maheshwary P, Shukla PK, Maheshwari M, Gour B, Khare A (2019) Fast and secure medical image encryption based on nonlinear 4D logistic map and DNA sequences. J Med Syst 43:267. https://doi.org/10.1007/s10916-019-1389-z

    Article  Google Scholar 

  63. The mini-MIAS database of mammograms (2022) Available from: http://peipa.essex.ac.uk/pix/mias/. Accessed 06 Oct 2022

  64. Wahballa O, Wahaballa A, Li F, Idris II, Xu C (2017) Medical image encryption scheme based on Arnold transformation and ID-AK protocol. Int J Netw Secur 19(5):776–784. https://doi.org/10.6633/IJNS.201709.19(5).15

    Google Scholar 

  65. Wang N, Di G, Lv X, Hou M, Liu D, Zhangi J, Duan X (2019) Galois field-based image encryption for remote transmission of tumor ultrasound images. IEEE Access 7:49945–49950. https://doi.org/10.1109/ACCESS.2019.2910563

    Article  Google Scholar 

  66. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Journal of Selected Areas in Telecommunications, pp 31–38

  67. Yasser I, Khalil AT, Mohamed MA, Samra AS, Khalifa F (2022) A robust chaos-based technique for medical image encryption. IEEE Access 10:244–257. https://doi.org/10.1109/ACCESS.2021.3138718

    Article  Google Scholar 

  68. Yin S, Li H (2020) GSAPSO-MQ: Medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system. Evolutionary Intelligence. https://doi.org/10.1007/s12065-020-00440-6

  69. Yin S, Liu J, Teng L (2019) Improved elliptic curve cryptography with homomorphic encryption for medical image encryption. Int J Netw Secur 22(3):421–426. https://doi.org/10.6633/IJNS.20200522(3).07

    Google Scholar 

Download references

Funding

This work was partially supported by UGC (University Grants Commission), New Delhi, India under grant No. [415024]

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anand B. Joshi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Joshi, A.B., Gaffar, A. & Singh, S. Security of medical images based on special orthogonal group and Galois field. Multimed Tools Appl 82, 44277–44308 (2023). https://doi.org/10.1007/s11042-023-15033-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15033-5

Keywords