Skip to main content
Log in

Proposed neural SAE-based medical image cryptography framework using deep extracted features for smart IoT healthcare applications

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Image cryptography based on chaos algorithms is widely employed in modern security systems in telemedicine Internet of Things (IoT) applications. One of the main drawbacks of the state-of-the-art chaos encryption algorithms is that they are not sufficiently secure for image communications. When an image is only encrypted using traditional chaotic algorithms, it may be easily vulnerable to attackers. This paper presents a medical image cryptosystem, which uses a Stacked Auto-Encoder (SAE) network to produce two sets of chaotic random matrices. The first set is utilized to generate a complete shuffling matrix that changes the pixel locations in the digital input image. The second set generates an independent series of sequences employed to eradicate the correlation between the permuted encrypted medical image and the original image. The proposed cryptosystem is robust due to the benefits of parallel SAE computations, which significantly reduce the runtime and complexity. Moreover, the hybrid implementation of confusing and shuffling processes improves the ciphering performance. A comparative study between the proposed medical image cryptosystem and other related works is presented. The simulation tests reveal the security, efficiency, and immunity of the proposed cryptosystem for various forms of attacks compared to the traditional cryptosystems. The obtained results reveal that the suggested framework can be valuable and appropriate for medical sector services. It can be recommended for real-time healthcare cloud and IoT applications because of its superior accomplishments in terms of robustness, security, and computational complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. El-Shafai W, El-Rabaie ESM, El-Halawany M, Abd El-Samie FE (2018) Efficient multi-level security for robust 3D color-plus-depth HEVC. Multimed Tools Appl 77(23):30911–30937

    Article  Google Scholar 

  2. Raghuwanshi P, Nair JS, Jain S (2016) A secure transmission of 2D image using randomized chaotic mapping. In: 2016 Symposium on Colossal Data Analysis and Networking (CDAN), pp 1–5. IEEE

  3. El-Shafai W (2015) Joint adaptive pre-processing resilience and post-processing concealment schemes for 3D video transmission. 3D Res, 6(1):10

  4. Shankar K, Elhoseny M, Chelvi ED, Lakshmanaprabu SK, Wu W (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145–77154

    Article  Google Scholar 

  5. Al-Afandy KA, El-Shafai W, El-Rabaie ESM, Abd El-Samie FE, Faragallah OS, El-Mhalaway A, Shehata AM, El-Banb GM, El-Halawany MM (2018) Robust hybrid watermarking techniques for different color imaging systems. Multimed Tools Appl 77(19):25709–25759

    Article  Google Scholar 

  6. El-Shafai W, El-Rabaie S, El-Halawany MM, Abd El-Samie FE (2018) Encoder-independent decoder-dependent depth-assisted error concealment algorithm for wireless 3D video communication. Multimed Tools Appl 77(11):13145–13172

    Article  Google Scholar 

  7. Gupta R, Pachauri R, Singh AK (2018) An effective approach of secured medical image transmission using encryption method. Mol Cell Biomech 15(2):63–83

    Google Scholar 

  8. El-Shafai W, El-Rabaie S, El-Halawany MM, Abd El-Samie FE (2019) Security of 3D-HEVC transmission based on fusion and watermarking techniques. Multimed Tools Appl 78(19):27211–27244

    Article  Google Scholar 

  9. Benssalah M, Rhaskali Y, Azzaz MS (2018) Medical images encryption based on elliptic curve cryptography and chaos theory. In: 2018 International conference on smart communications in network technologies (SaCoNeT), pp 222–226. IEEE

  10. Abdel-Nabi H, Al-Haj A (2017) Medical imaging security using partial encryption and histogram shifting watermarking. In: 2017 8th International Conference on Information Technology (ICIT), pp 802–807. IEEE

  11. Abdmouleh MK, Khalfallah A, Bouhlel MS (2017) A novel selective encryption DWT-based algorithm for medical images. In: 2017 14th international conference on computer graphics, imaging and visualization, pp. 79–84) IEEE

  12. Bharghavi G, Kumar PS, Geetha K, Devi NS (2018) An implementation of SLICE algorithm to enforce security for medical images using DNA approach. In: 2018 International conference on communication and signal processing (ICCSP), pp 0984–0988. IEEE

  13. Dagadu JC, Li JP, Shah F, Mustafa N, Kumar K (2016) DWT based encryption technique for medical images. In: 2016 13th international computer conference on wavelet active media technology and information processing (ICCWAMTIP), pp 252–255. IEEE

  14. Dagadu JC, Li J, Shah F (2017) An efficient di-chaotic diffusion based medical image cryptosystem. In 2017 14th international computer conference on wavelet active media technology and information processing (ICCWAMTIP), pp 206–210. IEEE

  15. El‐Shafai W, El‐Rabaie S, El‐Halawany MM, Abd El‐Samie FE (2018) Efficient hybrid watermarking schemes for robust and secure 3D‐MVC communication. Int J Commun Syst, 31(4): e3478

  16. Parameshachari BD, Panduranga HT, Naveenkumar SK (2017) Partial encryption of medical images by dual DNA addition using DNA encoding. In: 2017 international conference on recent innovations in signal processing and embedded systems (RISE), pp 310–314. IEEE

  17. El-Shafai W (2015) Pixel-level matching based multi-hypothesis error concealment modes for wireless 3D H. 264/MVC communication. 3D Res, 6(3): 31.

  18. Puech W(2008) Image encryption and compression for medical image security. In 2008 first workshops on image processing theory, tools and applications, pp 1–2. IEEE

  19. El-Shafai W, El-Rabaie S, El-Halawany M, Abd El-Samie FE (2017) Enhancement of wireless 3d video communication using color-plus-depth error restoration algorithms and Bayesian Kalman filtering. Wireless Pers Commun 97(1):245–268

    Article  Google Scholar 

  20. Saraswathi PV, Venkatesulu M (2017) A novel stream cipher using pesudo random binary sequence generator for medical image encryption. In: 2017 international conference on trends in electronics and informatics (ICEI), pp. 425–429. IEEE

  21. El-Shafai W, Khallaf F, El-Rabaie ESM, Abd El-Samie FE (2021) Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J Amb Intell Human Comput, 1–29

  22. Elashry IF, El-Shafai W, Hasan ES, El-Rabaie S, Abbas AM, Abd El-Samie FE, Fathi E, El-sayed HS, Faragallah OS (2020) Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl 79(29):20665–20687

    Article  Google Scholar 

  23. Faragallah OS, El-sayed HS, Afifi A, El-Shafai W (2021) Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform. Opt Lasers Eng 137:106333

    Article  Google Scholar 

  24. Faragallah OS, AlZain MA, El-Sayed HS, Al-Amri JF, El-Shafai W, Afifi A, Naeem EA, Soh B (2020) Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimed Tools Appl 79(3):2495–2519

    Article  Google Scholar 

  25. Faragallah OS, Afifi A, El-Shafai W, El-Sayed HS, Alzain MA, Al-Amri JF, Abd El-Samie FE (2020) Efficiently encrypting color images with few details based on RC6 and different operation modes for cybersecurity applications. IEEE Access 8:103200–103218

    Article  Google Scholar 

  26. Ibrahim S, Egila MG, Shawky H, Elsaid MK, El-Shafai W, Abd El-Samie FE (2020) Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed Tools Appl, 1–26

  27. Faragallah OS, Afifi A, El-Sayed HS, Alzain MA, Al-Amri JF, Abd El-Samie FE, El-Shafai W (2020) Efficient HEVC integrity verification scheme for multimedia cybersecurity applications. IEEE Access 8:167069–167089

    Article  Google Scholar 

  28. Alarifi A, Sankar S, Altameem T, Jithin KC, Amoon M, El-Shafai W (2020) A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access 8:128548–128573

    Article  Google Scholar 

  29. Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855–37865

    Article  Google Scholar 

  30. Sun YJ, Zhang H, Wang XY, Wang MX (2021) Bit-level color image encryption algorithm based on coarse-grained logistic map and fractional chaos. Multimed Tools Appl 80(8):12155–12173

    Article  Google Scholar 

  31. Gao L, Qi L, Guan L (2021) The property of frequency shift in 2D-frft domain with application to image encryption. IEEE Signal Process Lett 28:185–189

    Article  Google Scholar 

  32. Man Z, Li J, Di X (2021) Medical image encryption scheme based on self‐verification matrix. IET Image Process

  33. Vaseghi B, Mobayen S, Hashemi SS, Fekih A (2021) Fast reaching finite time synchronization approach for chaotic systems with application in medical image encryption. IEEE Access 9:25911–25925

    Article  Google Scholar 

  34. Hasan MK, Islam S, Sulaiman R, Khan S, Hashim AHA, Habib S, Islam M, Alyahya S, Ahmed MM, Kamil S, Hassan MA (2021) Lightweight encryption technique to enhance medical image security on internet of medical things applications. IEEE Access 9:47731–47742

    Article  Google Scholar 

  35. Shafique A, Ahmed J, Rehman MU, Hazzazi MM (2021) Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain. IEEE Access 9:59108–59130

    Article  Google Scholar 

  36. Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2019). Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput Appl, 1–13

  37. Rundo F, Conoci S, Banna GL, Ortis A, Stanco F, Battiato S (2018) Evaluation of Levenberg–Marquardt neural networks and stacked autoencoders clustering for skin lesion analysis, screening and follow-up. IET Comput Vision 12(7):957–962

    Article  Google Scholar 

  38. Thanikaiselvan V, Mantripragada N, Singh AP, Bhasin N (2019) Encrypting multiple images using stacked autoencoders. In 2019 international conference on vision towards emerging trends in communication and networking (ViTECoN), pp 1–6. IEEE

  39. Abdelwahab KM, Abd El-atty SM, El-Shafai W, El-Rabaie S, Abd El-Samie FE (2020) Efficient SVD-based audio watermarking technique in FRT domain. Multimed Tools Appl 79(9):5617–5648

    Article  Google Scholar 

  40. Wang X, Lin S, Li Y (2021) Bit-level image encryption algorithm based on BP neural network and gray code. Multimed Tools Appl 80(8):11655–11670

    Article  Google Scholar 

  41. Wu J, Xia W, Zhu G, Liu H, Ma L, Xiong J (2021) Image encryption based on adversarial neural cryptography and SHA controlled chaos. J Mod Opt 68(8):409–418

    Article  MathSciNet  Google Scholar 

  42. Bao Z, Xue R. Jin Y (2021) Image scrambling adversarial autoencoder based on the asymmetric encryption. Multimed Tools Appl, 1–37

  43. Guo J, Yang K, Liu H, Yin C, Xiang J, Li H, Ji R, Gao Y (2018) A stacked sparse autoencoder-based detector for automatic identification of neuromagnetic high frequency oscillations in epilepsy. IEEE Trans Med Imaging 37(11):2474–2482

    Article  Google Scholar 

  44. Srivastava S, Soman S, Rai A, Srivastava PK (2017) Deep learning for health informatics: Recent trends and future directions. In: 2017 international conference on advances in computing, communications and informatics (ICACCI) (pp. 1665–1670). IEEE.

  45. Xing F, Xie Y, Su H, Liu F, Yang L (2017) Deep learning in microscopy image analysis: a survey. IEEE Trans Neural Netw Learn Syst 29(10):4550–4568

    Article  Google Scholar 

  46. Chen J, Chen L, Zhang LY, Zhu ZL (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96(1):301–322

    Article  Google Scholar 

  47. Saha J, Chowdhury C, Biswas S (2020) Review of machine learning and deep learning based recommender systems for health informatics. In: Deep learning techniques for biomedical and health informatics, pp. 101–126. Springer, Cham

  48. Rajawat M, Tomar DS (2015) A Secure Watermarking and Tampering detection technique on RGB Image using 2 Level dwt. In: 2015 fifth international conference on communication systems and network technologies (pp. 638–642). IEEE

  49. Saif S, Biswas S, Chattopadhyay S (2020) Intelligent, secure big health data management using deep learning and blockchain technology: an overview. In: Deep Learning Techniques for Biomedical and Health Informatics, pp 187–209. Springer, Cham

  50. Jyotiyana M, Kesswani N (2020) Deep learning and the future of biomedical image analysis. In Deep Learning Techniques for Biomedical and Health Informatics, pp 329–345. Springer, Cham

  51. Miotto R, Wang F, Wang S, Jiang X, Dudley JT (2018) Deep learning for healthcare: review, opportunities and challenges. Brief Bioinform 19(6):1236–1246

    Article  Google Scholar 

  52. Zhang J, Lin F, Xiong P, Du H, Zhang H, Liu M, Hou Z, Liu X (2019) Automated detection and localization of myocardial infarction with staked sparse autoencoder and treebagger. IEEE Access 7:70634–70642

    Article  Google Scholar 

  53. Kemal ADEM, Kiliçarslan S (2019) Performance analysis of optimization algorithms on stacked autoencoder. In: 2019 3rd international symposium on multidisciplinary studies and innovative technologies (ISMSIT), pp 1–4. IEEE

  54. Pei D, Burns M, Chandramouli R, Vinjamuri R (2018) Decoding asynchronous reaching in electroencephalography using stacked autoencoders. IEEE Access 6:52889–52898

    Article  Google Scholar 

  55. Costa B, Jain J (2019) Fuzzy deep stack of autoencoders for dealing with data uncertainty. In: 2019 IEEE international conference on fuzzy systems (FUZZ-IEEE), pp. 1–6. IEEE

  56. Xu B, Ding X, Hou R, Zhu C (2018) A feature extraction method based on stacked denoising autoencoder for massive high dimensional data. In: 2018 14th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD), pp 206–210. IEEE

  57. Jia W, Muhammad K, Wang SH, Zhang YD (2019) Five-category classification of pathological brain images based on deep stacked sparse autoencoder. Multimed Tools Appl 78(4):4045–4064

    Article  Google Scholar 

  58. Faragallah OS, El-Shafai W, Sallam AI, Elashry I, EL-Rabaie ESM, Afifi A, AlZain MA, Al-Amri JF, El-Samie FEA, El-sayed HS (2021) Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J Amb Intell Human Comput, 1–25

  59. Soliman NF, Khalil MI, Algarni AD, Ismail S, Marzouk R, El-Shafai W (2021) Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimed Tools Appl 80(3):4789–4823

    Article  Google Scholar 

  60. Alarifi A, Amoon M, Aly MH, El-Shafai W (2020) Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access 8:221246–221268

    Article  Google Scholar 

  61. Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245

    Article  Google Scholar 

  62. El-Shafai W, Almomani IM, Alkhayer A (2021) Optical Bit-Plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access 9:35004–35026

    Article  Google Scholar 

  63. Sedik A, Emara HM, Hamad A, Shahin EM, El-Hag NA, Khalil A, Ibrahim F, Elsherbeny ZM, Elreefy M, Zahran O, Abd El-Samie FE (2019) Efficient anomaly detection from medical signals and images. Int J Speech Technol 22(3):739–767

    Article  Google Scholar 

  64. Podder P, Parvez AMS, Yeasmin MN, Khalil MI (2018) Relative performance analysis of edge detection techniques in iris recognition system. In: 2018 international conference on current trends towards converging technologies (ICCTCT), pp 1–6. IEEE

  65. Chai X, Zhang J, Gan Z, Zhang Y (2019) Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl 78(24):35419–35453

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walid El-Shafai.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

El-Shafai, W., Khallaf, F., El-Rabaie, ES.M. et al. Proposed neural SAE-based medical image cryptography framework using deep extracted features for smart IoT healthcare applications. Neural Comput & Applic 34, 10629–10653 (2022). https://doi.org/10.1007/s00521-022-06994-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-022-06994-z

Keywords

Navigation