Abstract
Healthcare information framework is a critical component in any information technology framework as patient-specific information like initial diagnosis, response to drugs, extent of recovery, etc., always resides over these systems. From the perspective of a healthcare professional, the focus is always on the best utilization of this critical data. This may be achieved by sharing such data over a network to enhance chances of better interpretation. However, this data may get compromised in terms of its integrity, confidentiality and authenticity over such an insecure network. On the other hand, Health Insurance Portability and Accountability Act (HIPAA) guidelines must be adhered to once such data flows an insecure network. Therefore, considering the importance of medical data transmission for better data interpretation and consequently better diagnosis and prognosis, we propose a texture edge map and multilevel chaotic map-driven encryption framework for medical images. The proposed technique employs texture maps obtained from Gabor filters in tandem with multiple chaotic maps: quadratic, cubic and logistic maps to enhance the key space, robustness and security of medical images over a vulnerable channel. The security and reliability of the proposed methodology are illustrated through key sensitivity analysis, statistical and performance analysis. The proposed methodology ensures large key length and pixel diffusion. Security analysis illustrates one of the prime properties of key sensitivity to initial conditions to withstand differential attacks. In addition to withstanding the differential attacks, the proposed technique has a large enough key space to see off brute force attacks. Considering the criticality of the transmission of medical images for use in the state-of-the-art e-healthcare systems like picture archiving and communication systems, the proposed technique is a potential candidate for addressing security vulnerabilities of medical images over the communication networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hurrah N, Parah S, Loan N, Sheikh J (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gener Comput Syst 94:654–673
Gull S, Loan NA, Parah SA et al (2020) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Human Comput 11:1799–1808. https://doi.org/10.1007/s12652-018-1158-8
Gull S, Parah SA (2019) Color image authentication using dual watermarks. In: 2019 fifth international conference on image information processing (ICIIP), Shimla, India, pp 240–245. https://doi.org/10.1109/ICIIP47207.2019.8985760
Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017) Hiding electronic patient record (EPR) in medical images: a high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inf 73:125–136. ISSN 1532-0464. https://doi.org/10.1016/j.jbi.2017.08.002
Parah SA, Loan NA, Shah AA et al (2018) A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dyn 93:1933–1951. https://doi.org/10.1007/s11071-018-4299-6
Parah S, Sheikh J, Ahad F, Loan N, Bhat G Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools Appl 76(8):10599–10633
Parah SA, Ahad F, Sheikh JA, Loan NA, Bhat GM (2017) A new reversible and high capacity data hiding technique for E-healthcare applications. Multimedia Tools Appl 76:3:3943–3975. https://doi.org/10.1007/s11042-016-4196-2
Loan NA, Parah SA, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6(1):19876–19897
Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40(1):70–82. https://doi.org/10.1016/j.compeleceng.2013.11.006
Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2015) A secure and robust information hiding technique for covert communication. Int J Electron 102(8):1253–1266. https://doi.org/10.1080/00207217.2014.954635
Parah SA, Sheikh JA, Bhat GM (2014) A secure and efficient spatial domain data hiding technique based on pixel adjustment
Giri KJ, Peer MA, Nagabhushan P (2014) A channel wise color image watermarking scheme based on discrete wavelet transformation. In: 2014 international conference on computing for sustainable global development (INDIACom), New Delhi, pp 758–762. https://doi.org/10.1109/IndiaCom.2014.6828064
Giri KJ, Peer MA, Nagabhushan P (2015) A robust color image watermarking scheme using discrete wavelet transformation. IJ Image, Graph Sig Process
Giri KJ, Bashir R (2017) Digital watermarking: a potential solution for multimedia authentication. In: Intelligent techniques in signal processing for multimedia security. Studies in computational intelligence, vol 660. Springer, Berlin
Giri KJ, Bashir R (2018) A block based watermarking approach for color images using discrete wavelet transformation. Int J Inf Tecnol 10:139–146. https://doi.org/10.1007/s41870-017-0075-y
Giri KJ, Bashir R, Bhat JI (2019) A discrete wavelet based watermarking scheme for authentication of medical images. Int J E-Health Med Commun (IJEHMC) 10(4)
Mitra S, Uma Shankar B (2015) Medical image analysis for cancer management in natural computing framework. Inf Sci 306:111–131
Phophalia A, Rajwade A, Mitra SK (2014) Rough set based image denoising for brain MR images. Signal Process 103:24–35
Ji Z, Xia Y, Sun Q, Cao G, Chen Q (2015) Active contours driven by local likelihood image fitting energy for image segmentation. Inf Sci 301:285–304
Wu H, Huang J, Shi Y (2015) A reversible data hiding method with contrast enhancement for medical images. J Vis Commun Image Represent 31:146–153
Jung H, Sung K, Nayak KS, Kim EY, Ye JC (2009) k-t focus: a general compressed sensing framework for high resolution dynamic MRI. Magnet Reson 61:103–116
Lou LDC, Hua MC, Liua JL (2009) Multiple layer data hiding scheme for medical images. Comput Stand Interfaces 31(2):329–335
Hu JK, Han FL (2009) A pixel-based scrambling scheme for digital medical images protection. J Netw Comput Appl 32(4):788–794
Lin CF, Chung CH, Lin JH (2009) A chaos-based visual encryption mechanism for clinical EEG signals. Med Biol Eng Comput 47(7):757–762
Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729
Das S, Kundu MK (2012) Effective management of medical information through a novel blind watermarking technique. J Med Syst 36(5):3339–3351
Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10(4):722–732
LiXW KimST (2013) Optical 3D watermark based digital image watermarking for telemedicine. Opt Lasers Eng 51(12):1310–1320
Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85(4):883–894
Deng X, Chen Z, Zeng F, Zhang Y, Mao Y (2013) Authentication and recovery of medical diagnostic image using dual reversible digital watermarking. J Nanosci Nanotechnol 13(3):2099–2107
Hong J, Abdurahman K, Yangling L (2016) Asymmetric color pathological image encryption scheme based on complex hyper chaotic system. Optik 127:5812–5819
Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press
Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314–327
Abdmouleh AKMK, Bouhlel MS (2013) Dynamic chaotic look-up table for MRI medical image encryption. In: Proceedings of the 2013 international conference on systems, control, signal processing and informatics, pp 241–246
Ashtiyani M, Birgani PM, Hosseini HM (2008) Chaosbased medical image encryption using symmetric cryptography. In: 3rd international conference on information and communication technologies: from theory to applications, ICTTA. IEEE, pp 1–5
Fu C et al (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010
Sarker MZH, Parvez MS (2005) A cost effective symmetric key crypto-graphic algorithm for small amount of data. In: Proceedings of the 9th IEEE international multi topic conference, pp 1–6
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284
Scharinger J (1998) Fast encryption of image data using chaotic Kolmogorov flows. J Electron Imaging 7(2):318–325
Chen GR, Mao YB, Chui CK (2004) Asymmetric image encryption scheme basedon 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761
Mao YB, Chen GR, Lian SG (2004) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurcation Chaos 14(10):3613–3624
Belkhouche F, Gokcen I, Qidwai U (2005) Chaotic gray-level image transformation. J Electron Imaging 14(4):043001
Behnia S, Akhshani A, Mahmodi H (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35(2):408–419
Patidar V, Pareek NK, Sud KK (2009) A new substitution–diffusion based image cipher using chaotic standard and logistic maps. Commun Non-Linear Sci Numer Simulation 14(7):3056–3075
Gao TG, Chen ZQ (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394–400
Gao TG, Chen ZQ (2008) Image encryption based on a new total shuffling algorithm. Chaos, Solitons Fractals 38(1):213–220
Sun FY, Liu ST, Li ZQ (2008) A novel image encryption scheme based on spatial chaos map. Chaos, Solitons Fractals 38(3):631–640
Puech W, Rodrigues JM (2005) Crypto-compression of medical images by selective encryption of DCT. In: EUSIPCO’05: European signal processing conference, Antalya, Turkey
Zhou Y, Panetta K, Agaian S (2009) A lossless encryption method for medical images using edge maps. In: Engineering in medicine and biology society. Annual international conference of the IEEE. IEEE, pp 3707–3710
Rao YS, Mitra A, Prasanna SM (2006) A partial image encryption method with pseudo random sequences. In: Information systems security. Springer, Berlin, Heidelberg, pp. 315–325
Panduranga HT, Naveen Kumar SK (2013) Selective image encryption for medical and satellite images. Int J Eng Sci Tech 5(2)
Panduranga HT, Naveenkumar SK (2013) Partial image encryption using block wise shuffling and chaotic maps. In: 2013 international conference on optical imaging sensor and security (ICOSS). IEEE, pp 1–5
Ou Y, Sur C, Rhee KH (2007) Region-based selective encryption for medical imaging. In: Proceedings of the 1st annual international conference on frontiers in algorithmics. Springer, Berlin Heidelberg, pp 62–73
Brahimi Z, Bessalah H, Tarabet A, Kholladi MK (2008) Selective encryption techniques of JPEG2000 codestream for medical images transmission. WSEAS Trans Circuits Syst 7(7):718–727
Xiang T, Wong KW, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos: Interdiscip J Nonlinear Sci 17(2)
Liu JL (2006) Efficient selective encryption for JPEG 2000 images using private initial table. Pattern Recogn 39(8):1509–1517
Som S, Sen S (2013) A non-adaptive partial encryption of grayscale images based on chaos. Procedia Tech 10:663–671
Shang Z, Ren H, Zhang J (2008) A block location scrambling algorithm of digital image based on Arnold transformation. In: 9th IEEE international conference for young computer scientists, 978-0-7695-3398-8/08/$25.00
Zhu L, Li W, Liao L, Li H (2006) A novel algorithm for scrambling digital image based on cat chaotic mapping. In: Proceedings of the 2006 international conference on intelligent information hiding and multimedia signal processing (IIH-MSP'06), 0-7695-2745-0/2006© IEEE
Banday SA, Mir AH (2017) Statistical textural feature and deformable model based brain tumor segmentation and volume estimation. Multimed Tools Appl 76:3809–3828. https://doi.org/10.1007/s11042-016-3979-9
Banday, SA, Ajaz HM (2016) Statistical textural feature and deformable model based MR brain tumor segmentation. In: 2016 international conference on advances in computing, communications and informatics (ICACCI), pp 657–663
Materka A, Strzelecki M (1998) Texture analysis methods–A review. Technical University of Lodz, Institute of Electronics, COST B11 Report, Brussels, pp 9–11
Daugman JG (1985) Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by 2D visual cortical filters. J Opt Soc A2(7):1160–1169
Lee TS (1996) Image representation using 2D gabor wavelets. IEEE Trans Pattern Anal Mach Intell 18(10):959–971
Alvarez E, Fernandez A, Jimenez GP, Marcano A (1999) New approach to chaotic encryption. Phys Lett A 263:373–375
Wong WK, Lee LP, Wong KW (2000) A modified chaotic cryptographic method. Comput Phys Commun 138:23–236
Wong KW (2002) A fast chaotic cryptography scheme with dynamic look-up table. Phys Lett A 298:238–242
Khan MK, Zhang J (2008) Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71(13–15):3026–3031
Pareek NK, Patidar V, Sud KK (2003) Discrete chaotic cryptography using external key. Phys Lett A 309:75–82
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Banday, S.A., Pandit, M.K., Khan, A.R. (2021). Securing Medical Images via a Texture and Chaotic Key Framework. In: Giri, K.J., Parah, S.A., Bashir, R., Muhammad, K. (eds) Multimedia Security. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-8711-5_1
Download citation
DOI: https://doi.org/10.1007/978-981-15-8711-5_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8710-8
Online ISBN: 978-981-15-8711-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)