Abstract
Security of medical images over an unsecured channel is a challenging task, and for this, several methods have been designed recently. The present paper is also in the same direction, and is an attempt to improve the security of the existing methods. In this paper, a cryptosystem is proposed, which performs encryption and decryption in the CBC (Cipher Block Chaining) mode of operation, and attains the confusion-diffusion properties using the PSN (Permutation-Substitution Network) of cryptography. The permutation is performed by a composite operation, consisting of rotation (via special orthogonal group), reflection, flipping, and pixel-wise shuffling, while substitution is performed by a composite operation of multiplication and multiplicative inverse over Galois field. The Archimedes’ constant is utilized for constructing Initialization Vector (IV) to be used in the CBC mode of encryption (and decryption). The proposed approach is able to encrypt monochrome (8-bit, 10-bit, 12-bit, and 16-bit), palette color, and 24-bit color medical images, simultaneously into noisy-like images from the human visual as well as the statistical point of view. The designed approach is empirically assessed via several statistical and security evaluation metrics, such as key sensitivity, chi-squared test, number of pixel change rate, avalanche effect, poker test, peak signal-to-noise ratio, etc. The results of these metrics support the objectives of our proposed approach. Moreover, a thorough comparison is also made with the recent state-of-the-art existing methods.
Similar content being viewed by others
References
Abdel-Rehim WMF, Ismail IA, Morsy E (2012) Testing randomness: Poker test with hands of three numbers. J Comput Sci 8(8):1353–1357
Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inf Secur J: A Glob Perspect 29(2):91–101. https://doi.org/10.1080/19393555.2020.1718248
Ali TS, Ali R (2020) A novel medical image signcryption scheme using TLTS and Henon chaotic map. IEEE Access 8:71974–71992. https://doi.org/10.1109/ACCESS.2020.2987615
Alqazzaz SF, Elsharawy GA, Eid HF (2022) Robust 4-D hyperchaotic DNA framework for medical image encryption. Int J Comput Netw Inf Secur 14 (2):67–76. https://doi.org/10.5815/ijcnis.2022.02.06
Arndt J, Haenel C (2006) Pi – Unleashed. Springer, Berlin, Heidelberg
Available from https://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio. Accessed 06 Oct 2022
Available from https://mathworld.wolfram.com/Pi.html. Accessed 06 Oct 2022
Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu MK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42:208. https://doi.org/10.1007/s10916-018-1053-z
Barik RC, Changder S (2021) A novel and efficient amino acid codon based medical image encryption scheme colligating multiple chaotic maps. Multimed Tools Appl 80:10723–10760. https://doi.org/10.1007/s11042-020-09930-2
Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667–36681. https://doi.org/10.1109/ACCESS.2019.2906292
Biham E, Shamir A (1993) Differential cryptanalysis of the Data Encryption Standard (DES). Springer, New York
Bogart S (1999) What is pi, and how did it originate? Scientific American. Available from: https://www.scientificamerican.com/article/what-is-pi-and-how-did-it-originate/. Accessed 06 Oct 2022
CT-Training-BE001 database Available from: https://data.iplantcollaborative.org/dav-anon/iplant/projects/TCIA/SPIE-AAPM%20Lung%20CT%20Challenge/CT-Training-BE001/1.2.840.113704.1.111.2112.1167842143.1/1.2.840.113704.1.111.2112.1167842347.17/. Accessed 06 Oct 2022
Castro JCH, Sierra JM, Seznec A, Izquierdo A, Ribagorda A (2005) The strict avalanche criterion randomness test. Math Comput Simul 68(1):1–7
Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Netw 2017:6729896. https://doi.org/10.1155/2017/6729896
Chen J, Chen L, Zhang LY, Zhu ZL (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96:301–322. https://doi.org/10.1007/s11071-019-04791-3
Cochran WG (1952) The chi-square test of goodness of fit. Ann Math Stat 23(3):315–345
Computed tomography images of Mikael Häggström’s brain Available from: https://commons.wikimedia.org/wiki/Category:Computed_tomography_images_of_Mikael_H%C3%A4ggstr%C3%B6m%27s_brain. Accessed 06 Oct 2022
CrypTool (2017) An open-source windows program for cryptography and cryptanalysis. Available from: https://www.cryptool.org/en/. Accessed 06 Oct 2022
Dagadu JC, Li JP, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun 108:591–612. https://doi.org/10.1007/s11277-019-06420-z
Dagadu JC, Li J, Aboagye EO, Deynu FK (2019) Medical image encryption scheme based on multiple chaos and DNA coding. Int J Netw Secur 21 (1):83–90. https://doi.org/10.6633/IJNS.20190121(1).10
Dai Y, Wang H (2016) Chaotic medical image encryption algorithm based on bit-plane decomposition. Int J Pattern Recognit Artif Intell 30(4):1–15. https://doi.org/10.1142/S0218001416570019
Digital Imaging and Communications in Medicine (DICOM) documentation Available from: http://medical.nema.org/standard.html. Accessed 06 Oct 2022
Dummit D, Foote R (2004) Abstract algebra, 3rd. Wiley, New Jersey
ECRYPT II yearly report on algorithms and keysizes (2011–2012) Editor Nigel Smart (BRIS). Available from: https://www.ecrypt.eu.org/ecrypt2/documents/D.SPA.20.pdf. Accessed 06 Oct 2022
Euclidean Algorithm Encyclopedia of Mathematics. Available from: http://encyclopediaofmath.org/index.php?title=Euclidean_algorithm&oldid=35888. Accessed 06 Oct 2022
Field. Encyclopedia of Mathematics. Available from http://encyclopediaofmath.org/index.php?title=Field&oldid=17014. Accessed 06 Oct 2022
Fiestel H (1973) Cryptography and computer privacy. Sci Am 228 (5):15–23. https://doi.org/10.1038/scientificamerican0573-15
Fisher RA, Yates F (1958) Statistical Methods for Research Workers, 13th edn. US, New York: Hafner
Gafsi M, Abbassi N, Hajjaji MA, Malek J, Mtibaa A (2020) Improved chaos-based cryptosystem for medical image encryption and decryption. Sci Program 2020(6612390):1–22. https://doi.org/10.1155/2020/6612390
Galois field. Encyclopedia of Mathematics. Available from http://encyclopediaofmath.org/index.php?title=Galois_field&oldid=34238. Accessed 06 Oct 2022
Gaurav A, Psannis K, Peraković D (2022) Security of cloud-based Medical Internet of Things (MIoTs): A survey. Int J Software Sci Comput Intell 14(1):1–16. https://doi.org/10.4018/IJSSCI.285593
Guesmi R, Farah MAB (2021) A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimed Tool Appl 80:1925–1944. https://doi.org/10.1007/s11042-020-09672-1
Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144. https://doi.org/10.1016/j.sigpro.2017.10.004
Ibrahim S, Alhumyani H, Masud M, Alshamrani SS, Cheikhrouhou O, Muhammad G, Hossain MS, Abbas AM (2020) Framework for efficient medical image encryption using dynamic S-Boxes and chaotic maps. IEEE Access 8:160433–160449. https://doi.org/10.1109/ACCESS.2020.3020746
Ismail R, Fattah A, Saqr HM, Nasr ME (2022) An efficient medical image encryption schemefor (WBAN) based on adaptive DNA and modern multi-chaotic map. Multimed Tool Appl. https://doi.org/10.1007/s11042-022-13343-8
Jeevitha S, Prabha NA (2021) Novel medical image encryption using DWT block based scrambling and edge maps, vol 12. https://doi.org/10.1007/s12652-020-02399-9
Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855–37865. https://doi.org/10.1109/ACCESS.2021.3063237
Kumar S, Panna B, Jha RK (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 57:2517–2533. https://doi.org/10.1007/s11517-019-02037-3
Larobina M, Murino L (2014) Medical image file formats. J Digit Imaging 27:200–206. https://doi.org/10.1007/s10278-013-9657-9
Li M, Pan S, Meng W, Guoyong W, Ji Z, Wang L (2022) Medical image encryption algorithm based on hyper-chaotic system and DNA coding. Cognitive Computation and Systems, pp 1–13. https://doi.org/10.1049/ccs2.12070
Li S, Zhao L, Yang N (2021) Medical image encryption based on 2D zigzag confusion and dynamic diffusion. Secur Commun Netw 6624809:1–23. https://doi.org/10.1155/2021/6624809
Lima JB, Madeiro F, Sales FJR (2015) Encryption of medical images based on the cosine number transform. Signal Process: Image Commun 35:1–8. 10.1016/j.image.2015.03.005
Liu J, Tang S, Lian J, Ma Y, Zhang X (2019) A novel fourth order chaotic system and its algorithm for medical image encryption. Multidimens Syst Signal Process 30:1637–1657. https://doi.org/10.1007/s11045-018-0622-0
Medical Image Samples Available from: https://barre.dev/medical/samples/. Accessed 06 Oct 2022
Mortajez S, Tahmasbi M, Zarei J, Jamshidnezhad A (2020) A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images. Inform Med Unlocked 20:100396. https://doi.org/10.1016/j.imu.2020.100396
Mullican T (2019) Calculating pi: My attempt at breaking the pi world record. Bits and Bytes. Available from: https://blog.timothymullican.com/calculating-pi-my-attempt-breaking-pi-record. Accessed 06 Oct 2022
Mullican T (2020) Most accurate value of pi. Guinness World Records. Available from: https://www.guinnessworldrecords.com/world-records/66179-most-accurate-value-of-pi. Accessed 06 Oct 2022
NIH image database Available from: https://nihcc.app.box.com/v/ChestXray-NIHCC/folder/37178474737 (images_001.tar.gz folder). Accessed 06 Oct 2022
NLM’s MedPix database Available from: https://medpix.nlm.nih.gov/search?allen=true&allt=true&alli=true&query=Synpic57851. Accessed 06 Oct 2022
Nematzadeh H, Enayatifar R, Motameni H, Guimarães FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:24–32. https://doi.org/10.1016/j.optlaseng.2018.05.009
Orthogonal group. Encyclopedia of Mathematics. Available from: http://encyclopediaofmath.org/index.php?title=Orthogonal_group&oldid=34320. Accessed 06 Oct 2022
Pareek NK, Patidar V (2016) Medical image protection using genetic algorithm operations. Soft Comput 20:763–772. https://doi.org/10.1007/s00500-014-1539-7
Pearson K (1895) Contributions to the mathematical theory of evolution.–II. Skew variation in homogeneous material. Philos Trans Royal Soc: A Math Phys Eng Sci 186:343–414
Pearson K (1900) On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. Philos Mag 50(5):302:157–175
Reyad O, Hamed K, Karar ME (2020) Hash-enhanced elliptic curve bit-string generator for medical image encryption. J Intell Fuzzy Syst 39 (5):7795–7806. https://doi.org/10.3233/JIFS-201146
Shafique A, Ahmed J, Rehman MU, Hazzazi MM (2021) Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain. IEEE Access 9:59108–59130. https://doi.org/10.1109/ACCESS.2021.3071535
Shankar K, Elhoseny M, Chelvi ED, Lakshmanaprabu SK, Wanqing WU (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145–77154. https://doi.org/10.1109/ACCESS.2018.2874026
Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech 28(4):656–715
Singh LD, Singh KM (2017) Medical image encryption based on improved ElGamal encryption technique. Optik – Int J Light Electron Optics 147:88–102. doi:10.1016/j.ijleo.2017.08.028
Stalin S, Maheshwary P, Shukla PK, Maheshwari M, Gour B, Khare A (2019) Fast and secure medical image encryption based on nonlinear 4D logistic map and DNA sequences. J Med Syst 43:267. https://doi.org/10.1007/s10916-019-1389-z
The mini-MIAS database of mammograms (2022) Available from: http://peipa.essex.ac.uk/pix/mias/. Accessed 06 Oct 2022
Wahballa O, Wahaballa A, Li F, Idris II, Xu C (2017) Medical image encryption scheme based on Arnold transformation and ID-AK protocol. Int J Netw Secur 19(5):776–784. https://doi.org/10.6633/IJNS.201709.19(5).15
Wang N, Di G, Lv X, Hou M, Liu D, Zhangi J, Duan X (2019) Galois field-based image encryption for remote transmission of tumor ultrasound images. IEEE Access 7:49945–49950. https://doi.org/10.1109/ACCESS.2019.2910563
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Journal of Selected Areas in Telecommunications, pp 31–38
Yasser I, Khalil AT, Mohamed MA, Samra AS, Khalifa F (2022) A robust chaos-based technique for medical image encryption. IEEE Access 10:244–257. https://doi.org/10.1109/ACCESS.2021.3138718
Yin S, Li H (2020) GSAPSO-MQ: Medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system. Evolutionary Intelligence. https://doi.org/10.1007/s12065-020-00440-6
Yin S, Liu J, Teng L (2019) Improved elliptic curve cryptography with homomorphic encryption for medical image encryption. Int J Netw Secur 22(3):421–426. https://doi.org/10.6633/IJNS.20200522(3).07
Funding
This work was partially supported by UGC (University Grants Commission), New Delhi, India under grant No. [415024]
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Joshi, A.B., Gaffar, A. & Singh, S. Security of medical images based on special orthogonal group and Galois field. Multimed Tools Appl 82, 44277–44308 (2023). https://doi.org/10.1007/s11042-023-15033-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15033-5