Skip to main content

Securing Medical Images via a Texture and Chaotic Key Framework

  • Chapter
  • First Online:
Multimedia Security

Abstract

Healthcare information framework is a critical component in any information technology framework as patient-specific information like initial diagnosis, response to drugs, extent of recovery, etc., always resides over these systems. From the perspective of a healthcare professional, the focus is always on the best utilization of this critical data. This may be achieved by sharing such data over a network to enhance chances of better interpretation. However, this data may get compromised in terms of its integrity, confidentiality and authenticity over such an insecure network. On the other hand, Health Insurance Portability and Accountability Act (HIPAA) guidelines must be adhered to once such data flows an insecure network. Therefore, considering the importance of medical data transmission for better data interpretation and consequently better diagnosis and prognosis, we propose a texture edge map and multilevel chaotic map-driven encryption framework for medical images. The proposed technique employs texture maps obtained from Gabor filters in tandem with multiple chaotic maps: quadratic, cubic and logistic maps to enhance the key space, robustness and security of medical images over a vulnerable channel. The security and reliability of the proposed methodology are illustrated through key sensitivity analysis, statistical and performance analysis. The proposed methodology ensures large key length and pixel diffusion. Security analysis illustrates one of the prime properties of key sensitivity to initial conditions to withstand differential attacks. In addition to withstanding the differential attacks, the proposed technique has a large enough key space to see off brute force attacks. Considering the criticality of the transmission of medical images for use in the state-of-the-art e-healthcare systems like picture archiving and communication systems, the proposed technique is a potential candidate for addressing security vulnerabilities of medical images over the communication networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hurrah N, Parah S, Loan N, Sheikh J (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gener Comput Syst 94:654–673

    Google Scholar 

  2. Gull S, Loan NA, Parah SA et al (2020) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Human Comput 11:1799–1808. https://doi.org/10.1007/s12652-018-1158-8

    Article  Google Scholar 

  3. Gull S, Parah SA (2019) Color image authentication using dual watermarks. In: 2019 fifth international conference on image information processing (ICIIP), Shimla, India, pp 240–245. https://doi.org/10.1109/ICIIP47207.2019.8985760

  4. Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017) Hiding electronic patient record (EPR) in medical images: a high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inf 73:125–136. ISSN 1532-0464. https://doi.org/10.1016/j.jbi.2017.08.002

  5. Parah SA, Loan NA, Shah AA et al (2018) A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dyn 93:1933–1951. https://doi.org/10.1007/s11071-018-4299-6

    Article  Google Scholar 

  6. Parah S, Sheikh J, Ahad F, Loan N, Bhat G Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools Appl 76(8):10599–10633

    Google Scholar 

  7. Parah SA, Ahad F, Sheikh JA, Loan NA, Bhat GM (2017) A new reversible and high capacity data hiding technique for E-healthcare applications. Multimedia Tools Appl 76:3:3943–3975. https://doi.org/10.1007/s11042-016-4196-2

  8. Loan NA, Parah SA, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6(1):19876–19897

    Article  Google Scholar 

  9. Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40(1):70–82. https://doi.org/10.1016/j.compeleceng.2013.11.006

  10. Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2015) A secure and robust information hiding technique for covert communication. Int J Electron 102(8):1253–1266. https://doi.org/10.1080/00207217.2014.954635

    Article  Google Scholar 

  11. Parah SA, Sheikh JA, Bhat GM (2014) A secure and efficient spatial domain data hiding technique based on pixel adjustment

    Google Scholar 

  12. Giri KJ, Peer MA, Nagabhushan P (2014) A channel wise color image watermarking scheme based on discrete wavelet transformation. In: 2014 international conference on computing for sustainable global development (INDIACom), New Delhi, pp 758–762. https://doi.org/10.1109/IndiaCom.2014.6828064

  13. Giri KJ, Peer MA, Nagabhushan P (2015) A robust color image watermarking scheme using discrete wavelet transformation. IJ Image, Graph Sig Process

    Google Scholar 

  14. Giri KJ, Bashir R (2017) Digital watermarking: a potential solution for multimedia authentication. In: Intelligent techniques in signal processing for multimedia security. Studies in computational intelligence, vol 660. Springer, Berlin

    Google Scholar 

  15. Giri KJ, Bashir R (2018) A block based watermarking approach for color images using discrete wavelet transformation. Int J Inf Tecnol 10:139–146. https://doi.org/10.1007/s41870-017-0075-y

    Article  Google Scholar 

  16. Giri KJ, Bashir R, Bhat JI (2019) A discrete wavelet based watermarking scheme for authentication of medical images. Int J E-Health Med Commun (IJEHMC) 10(4)

    Google Scholar 

  17. Mitra S, Uma Shankar B (2015) Medical image analysis for cancer management in natural computing framework. Inf Sci 306:111–131

    Google Scholar 

  18. Phophalia A, Rajwade A, Mitra SK (2014) Rough set based image denoising for brain MR images. Signal Process 103:24–35

    Article  Google Scholar 

  19. Ji Z, Xia Y, Sun Q, Cao G, Chen Q (2015) Active contours driven by local likelihood image fitting energy for image segmentation. Inf Sci 301:285–304

    Article  Google Scholar 

  20. Wu H, Huang J, Shi Y (2015) A reversible data hiding method with contrast enhancement for medical images. J Vis Commun Image Represent 31:146–153

    Article  Google Scholar 

  21. Jung H, Sung K, Nayak KS, Kim EY, Ye JC (2009) k-t focus: a general compressed sensing framework for high resolution dynamic MRI. Magnet Reson 61:103–116

    Article  Google Scholar 

  22. Lou LDC, Hua MC, Liua JL (2009) Multiple layer data hiding scheme for medical images. Comput Stand Interfaces 31(2):329–335

    Article  Google Scholar 

  23. Hu JK, Han FL (2009) A pixel-based scrambling scheme for digital medical images protection. J Netw Comput Appl 32(4):788–794

    Google Scholar 

  24. Lin CF, Chung CH, Lin JH (2009) A chaos-based visual encryption mechanism for clinical EEG signals. Med Biol Eng Comput 47(7):757–762

    Article  Google Scholar 

  25. Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729

    Article  Google Scholar 

  26. Das S, Kundu MK (2012) Effective management of medical information through a novel blind watermarking technique. J Med Syst 36(5):3339–3351

    Article  Google Scholar 

  27. Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10(4):722–732

    Article  Google Scholar 

  28. LiXW KimST (2013) Optical 3D watermark based digital image watermarking for telemedicine. Opt Lasers Eng 51(12):1310–1320

    Article  Google Scholar 

  29. Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85(4):883–894

    Article  Google Scholar 

  30. Deng X, Chen Z, Zeng F, Zhang Y, Mao Y (2013) Authentication and recovery of medical diagnostic image using dual reversible digital watermarking. J Nanosci Nanotechnol 13(3):2099–2107

    Article  Google Scholar 

  31. Hong J, Abdurahman K, Yangling L (2016) Asymmetric color pathological image encryption scheme based on complex hyper chaotic system. Optik 127:5812–5819

    Google Scholar 

  32. Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press

    Google Scholar 

  33. Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314–327

    Article  Google Scholar 

  34. Abdmouleh AKMK, Bouhlel MS (2013) Dynamic chaotic look-up table for MRI medical image encryption. In: Proceedings of the 2013 international conference on systems, control, signal processing and informatics, pp 241–246

    Google Scholar 

  35. Ashtiyani M, Birgani PM, Hosseini HM (2008) Chaosbased medical image encryption using symmetric cryptography. In: 3rd international conference on information and communication technologies: from theory to applications, ICTTA. IEEE, pp 1–5

    Google Scholar 

  36. Fu C et al (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010

    Article  Google Scholar 

  37. Sarker MZH, Parvez MS (2005) A cost effective symmetric key crypto-graphic algorithm for small amount of data. In: Proceedings of the 9th IEEE international multi topic conference, pp 1–6

    Google Scholar 

  38. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  39. Scharinger J (1998) Fast encryption of image data using chaotic Kolmogorov flows. J Electron Imaging 7(2):318–325

    Article  Google Scholar 

  40. Chen GR, Mao YB, Chui CK (2004) Asymmetric image encryption scheme basedon 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  41. Mao YB, Chen GR, Lian SG (2004) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurcation Chaos 14(10):3613–3624

    Article  MathSciNet  MATH  Google Scholar 

  42. Belkhouche F, Gokcen I, Qidwai U (2005) Chaotic gray-level image transformation. J Electron Imaging 14(4):043001

    Article  Google Scholar 

  43. Behnia S, Akhshani A, Mahmodi H (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35(2):408–419

    Article  MathSciNet  MATH  Google Scholar 

  44. Patidar V, Pareek NK, Sud KK (2009) A new substitution–diffusion based image cipher using chaotic standard and logistic maps. Commun Non-Linear Sci Numer Simulation 14(7):3056–3075

    Article  Google Scholar 

  45. Gao TG, Chen ZQ (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394–400

    Google Scholar 

  46. Gao TG, Chen ZQ (2008) Image encryption based on a new total shuffling algorithm. Chaos, Solitons Fractals 38(1):213–220

    Article  MathSciNet  MATH  Google Scholar 

  47. Sun FY, Liu ST, Li ZQ (2008) A novel image encryption scheme based on spatial chaos map. Chaos, Solitons Fractals 38(3):631–640

    Article  MathSciNet  MATH  Google Scholar 

  48. Puech W, Rodrigues JM (2005) Crypto-compression of medical images by selective encryption of DCT. In: EUSIPCO’05: European signal processing conference, Antalya, Turkey

    Google Scholar 

  49. Zhou Y, Panetta K, Agaian S (2009) A lossless encryption method for medical images using edge maps. In: Engineering in medicine and biology society. Annual international conference of the IEEE. IEEE, pp 3707–3710

    Google Scholar 

  50. Rao YS, Mitra A, Prasanna SM (2006) A partial image encryption method with pseudo random sequences. In: Information systems security. Springer, Berlin, Heidelberg, pp. 315–325

    Google Scholar 

  51. Panduranga HT, Naveen Kumar SK (2013) Selective image encryption for medical and satellite images. Int J Eng Sci Tech 5(2)

    Google Scholar 

  52. Panduranga HT, Naveenkumar SK (2013) Partial image encryption using block wise shuffling and chaotic maps. In: 2013 international conference on optical imaging sensor and security (ICOSS). IEEE, pp 1–5

    Google Scholar 

  53. Ou Y, Sur C, Rhee KH (2007) Region-based selective encryption for medical imaging. In: Proceedings of the 1st annual international conference on frontiers in algorithmics. Springer, Berlin Heidelberg, pp 62–73

    Google Scholar 

  54. Brahimi Z, Bessalah H, Tarabet A, Kholladi MK (2008) Selective encryption techniques of JPEG2000 codestream for medical images transmission. WSEAS Trans Circuits Syst 7(7):718–727

    Google Scholar 

  55. Xiang T, Wong KW, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos: Interdiscip J Nonlinear Sci 17(2)

    Google Scholar 

  56. Liu JL (2006) Efficient selective encryption for JPEG 2000 images using private initial table. Pattern Recogn 39(8):1509–1517

    Article  MATH  Google Scholar 

  57. Som S, Sen S (2013) A non-adaptive partial encryption of grayscale images based on chaos. Procedia Tech 10:663–671

    Article  Google Scholar 

  58. Shang Z, Ren H, Zhang J (2008) A block location scrambling algorithm of digital image based on Arnold transformation. In: 9th IEEE international conference for young computer scientists, 978-0-7695-3398-8/08/$25.00

    Google Scholar 

  59. Zhu L, Li W, Liao L, Li H (2006) A novel algorithm for scrambling digital image based on cat chaotic mapping. In: Proceedings of the 2006 international conference on intelligent information hiding and multimedia signal processing (IIH-MSP'06), 0-7695-2745-0/2006© IEEE

    Google Scholar 

  60. Banday SA, Mir AH (2017) Statistical textural feature and deformable model based brain tumor segmentation and volume estimation. Multimed Tools Appl 76:3809–3828. https://doi.org/10.1007/s11042-016-3979-9

    Article  Google Scholar 

  61. Banday, SA, Ajaz HM (2016) Statistical textural feature and deformable model based MR brain tumor segmentation. In: 2016 international conference on advances in computing, communications and informatics (ICACCI), pp 657–663

    Google Scholar 

  62. Materka A, Strzelecki M (1998) Texture analysis methods–A review. Technical University of Lodz, Institute of Electronics, COST B11 Report, Brussels, pp 9–11

    Google Scholar 

  63. Daugman JG (1985) Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by 2D visual cortical filters. J Opt Soc A2(7):1160–1169

    Google Scholar 

  64. Lee TS (1996) Image representation using 2D gabor wavelets. IEEE Trans Pattern Anal Mach Intell 18(10):959–971

    Article  Google Scholar 

  65. Alvarez E, Fernandez A, Jimenez GP, Marcano A (1999) New approach to chaotic encryption. Phys Lett A 263:373–375

    Article  Google Scholar 

  66. Wong WK, Lee LP, Wong KW (2000) A modified chaotic cryptographic method. Comput Phys Commun 138:23–236

    MATH  Google Scholar 

  67. Wong KW (2002) A fast chaotic cryptography scheme with dynamic look-up table. Phys Lett A 298:238–242

    Article  MathSciNet  MATH  Google Scholar 

  68. Khan MK, Zhang J (2008) Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71(13–15):3026–3031

    Article  Google Scholar 

  69. Pareek NK, Patidar V, Sud KK (2003) Discrete chaotic cryptography using external key. Phys Lett A 309:75–82

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shoaib Amin Banday .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Banday, S.A., Pandit, M.K., Khan, A.R. (2021). Securing Medical Images via a Texture and Chaotic Key Framework. In: Giri, K.J., Parah, S.A., Bashir, R., Muhammad, K. (eds) Multimedia Security. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-8711-5_1

Download citation

Publish with us

Policies and ethics