Skip to main content
Log in

A novel cross cosine map based medical image cryptosystem using dynamic bit-level diffusion

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Development in networking technology has made the remote diagnosis and treatment of patients a reality through telemedicine. At the same time, storing and transmitting medical documents over an insecure network has always been a daunting challenge. Literature shows that the existing medical image cryptosystems suffer from serious shortcomings. The present work attempts to address this crucial area and propose a suitable solution. A novel hybrid 2-Dimensional Cross Cosine Map (2D-CCM) with an improved chaotic behaviour cryptosystem is proposed. Chaotic series generated by proposed 2D-CCM is utilized in confusion and diffusion architecture. A new dynamic Bit-Flipping in diffusion approach increases the complexity to achieve good encryption results. Simulation and security level assessment is carried out by executing Statistical and differential attack analysis, key sensitivity and exhaustive attack analysis. Robustness is evidenced by the result of noise and crop attack analysis. In addition, SHA-256 is utilized to feed the seed key value of 2D-CCM to resist plaintext attacks. All the assessment and comparison results illustrate that the cipher possesses enhanced security and efficiency than the existing state of the art. Hence the proposed cipher is absolutely apt for secure medical image communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography

  2. Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. Lect Notes Comput Sci 8893:151–166. https://doi.org/10.1007/978-3-319-14054-4_10

    Article  Google Scholar 

  3. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66:806–816. https://doi.org/10.1016/j.aeue.2012.01.015

    Article  Google Scholar 

  4. Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimed Tools Appl 79:19853–19873. https://doi.org/10.1007/s11042-020-08850-5

    Article  Google Scholar 

  5. Ali TS, Ali R (2020) A novel medical image Signcryption scheme using TLTS and Henon chaotic map. IEEE Access 8:71974–71992. https://doi.org/10.1109/ACCESS.2020.2987615

    Article  Google Scholar 

  6. Attaullah JA, Shah T (2019) Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimed Tools Appl 78:31467–31484. https://doi.org/10.1007/s11042-019-07981-8

    Article  Google Scholar 

  7. Bechikh R, Hermassi H, El-latif AAA et al (2015) Signal processing : image communication breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Process Image Commun 39:151–158. https://doi.org/10.1016/j.image.2015.09.006

    Article  Google Scholar 

  8. Benvenuto CJ (2012) Galois field in cryptography. 1–11

  9. Bouslimi D, Coatrieux G, Roux C (2011) A joint encryption / watermarking algorithm for verifying the reliability of medical images : application to echographic. Comput Methods Prog Biomed 16:1–8. https://doi.org/10.1016/j.cmpb.2011.09.015

    Article  Google Scholar 

  10. CENTER ITR (2019) https://www.idtheftcenter.org/wp-content/uploads/2020/01/01.28.2020_ITRC_2019-End-of-Year-Data-Breach-Report_FINAL. 237.

  11. Chai X, Zhang J, Gan Z, Zhang Y (2019) Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl 78:35419–35453. https://doi.org/10.1007/s11042-019-08168-x

    Article  Google Scholar 

  12. Chai X, Zheng X, Gan Z, Chen Y (2020) Exploiting plaintext-related mechanism for secure color image encryption. Neural Comput & Applic 32:8065–8088. https://doi.org/10.1007/s00521-019-04312-8

    Article  Google Scholar 

  13. Chen J, Chen L, Zhang LY, Zhu Z liang (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96:301–322. https://doi.org/10.1007/s11071-019-04791-3

  14. Elashry IF, El-Shafai W, Hasan ES et al (2020) Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl 79:20665–20687. https://doi.org/10.1007/s11042-019-08322-5

    Article  Google Scholar 

  15. Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Opt Lasers Eng 51:1066–1077. https://doi.org/10.1016/j.optlaseng.2013.03.010

    Article  Google Scholar 

  16. Enayatifar R, Hanan A, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93. https://doi.org/10.1016/j.optlaseng.2013.12.003

    Article  Google Scholar 

  17. Faragallah OS, AlZain MA, El-Sayed HS et al (2020) Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimed Tools Appl 79:2495–2519. https://doi.org/10.1007/s11042-019-08190-z

    Article  Google Scholar 

  18. Fu C, Meng W, Zhan Y, Zhu ZL, Lau FCM, Tse CK, Ma HF (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43:1000–1010

    Article  Google Scholar 

  19. Guesmi R, Farah MAB (2020) A new efficient medical image cipher based on hybrid chaotic map and DNA code

  20. (2012) https://www.garykessler.net/library/byte_logic_table.html.

  21. Hu J, Han F (2009) A pixel-based scrambling scheme for digital medical images protection. J Netw Comput Appl 32:788–794. https://doi.org/10.1016/j.jnca.2009.02.009

    Article  Google Scholar 

  22. Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144. https://doi.org/10.1016/j.sigpro.2017.10.004

    Article  Google Scholar 

  23. Huang R, Liao X, Dong A, Sun S (2020) Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm. Multimed Tools Appl 79:27483–27509. https://doi.org/10.1007/s11042-020-09163-3

    Article  Google Scholar 

  24. Idrees B, Zafar S, Rashid T, Gao W (2020) Image encryption algorithm using S-box and dynamic Hénon bit level permutation. Multimed Tools Appl 79:6135–6162. https://doi.org/10.1007/s11042-019-08282-w

    Article  Google Scholar 

  25. Khashan OA, Alshaikh M (2020) Edge-based lightweight selective encryption scheme for digital medical images. 26369–26388

  26. Lima JB, Madeiro F, Sales FJR (2015) Encryption of medical images based on the cosine number transform. Signal Process Image Commun 35:1–8. https://doi.org/10.1016/j.image.2015.03.005

    Article  Google Scholar 

  27. Liu Y, Zhang J (2020) A multidimensional chaotic image encryption algorithm based on DNA coding. Multimed Tools Appl 79:21579–21601. https://doi.org/10.1007/s11042-020-08880-z

    Article  Google Scholar 

  28. Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-sine map and its application to color image encryption. Multimed Tools Appl 78:15997–16010. https://doi.org/10.1007/s11042-018-6996-z

    Article  Google Scholar 

  29. Liu Y, Qin Z, Liao X, Wu J (2020) Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled sine map. Nonlinear Dyn 100:2917–2931. https://doi.org/10.1007/s11071-020-05654-y

    Article  Google Scholar 

  30. Mondal B, Behera PK, Gangopadhyay S (2020) A secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic (SC3) map. J Real-Time Image Process 18:1–18. https://doi.org/10.1007/s11554-019-00940-4

    Article  Google Scholar 

  31. Nematzadeh H, Enayatifar R, Motameni H, Guimarães FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:24–32. https://doi.org/10.1016/j.optlaseng.2018.05.009

    Article  Google Scholar 

  32. Patro KAK, Acharya B (2020) A novel multi-dimensional multiple image encryption technique. Multimed Tools Appl 79:12959–12994. https://doi.org/10.1007/s11042-019-08470-8

    Article  Google Scholar 

  33. Rajendran S, Krithivasan K, Doraipandian M (2020) Fast pre-processing Hex chaos triggered color image cryptosystem. Multimed Tools Appl 79:12447–12469. https://doi.org/10.1007/s11042-019-08396-1

    Article  Google Scholar 

  34. Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184. https://doi.org/10.1016/j.compbiomed.2016.03.020

    Article  Google Scholar 

  35. Sahi A, Lai D, Li Y (2016) Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Comput Biol Med 78:1–8. https://doi.org/10.1016/j.compbiomed.2016.09.003

    Article  Google Scholar 

  36. Sathishkumar GA, Bhoopathybagan K, Sriraam N et al (2011) A novel image encryption algorithm using two chaotic maps for medical application. Commun Comput Inf Sci 133 CCIS:290–299. https://doi.org/10.1007/978-3-642-17881-8_28

    Article  Google Scholar 

  37. Stalin S, Maheshwary P, Shukla PK, Maheshwari M, Gour B, Khare A (2019) Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA). J Med Syst 43:267. https://doi.org/10.1007/s10916-019-1389-z

    Article  Google Scholar 

  38. Talhaoui MZ, Wang X, Midoun MA (2020) Fast image encryption algorithm with high security level using the Bülban chaotic map. J Real-Time Image Process 18:85–98. https://doi.org/10.1007/s11554-020-00948-1

    Article  Google Scholar 

  39. Tan CH, Prabowo TF, Le D (2016) Breaking an ID-based encryption based on discrete logarithm and factorization problems. Inf Process Lett 116:116–119. https://doi.org/10.1016/j.ipl.2015.09.014

    Article  MathSciNet  MATH  Google Scholar 

  40. Tong X, Liu Y, Zhang M, Shi H (2012) New chaotic image encryption algorithm based on cross-mapping. Wuhan Univ J Nat Sci 17:461–467. https://doi.org/10.1007/s11859-012-0871-y

    Article  MathSciNet  MATH  Google Scholar 

  41. Vidhya R, Brindha M (2020) A novel dynamic chaotic image encryption using butterfly network topology based diffusion and decision based permutation. Multimed Tools Appl 79:30281–30310. https://doi.org/10.1007/s11042-020-09462-9

    Article  Google Scholar 

  42. Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444–452. https://doi.org/10.1016/j.sigpro.2017.11.005

    Article  Google Scholar 

  43. Wang X, Zhao H, Wang M (2019) A new image encryption algorithm with nonlinear-diffusion based on multiple coupled map lattices. Opt Laser Technol 115:42–57. https://doi.org/10.1016/j.optlastec.2019.02.009

    Article  Google Scholar 

  44. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci (Ny) 222:323–342. https://doi.org/10.1016/j.ins.2012.07.049

    Article  MathSciNet  MATH  Google Scholar 

  45. Xiang H, Liu L (2020) An improved digital logistic map and its application in image encryption. Multimed Tools Appl 79:30329–30355. https://doi.org/10.1007/s11042-020-09595-x

    Article  Google Scholar 

  46. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25. https://doi.org/10.1016/j.optlaseng.2015.09.007

    Article  Google Scholar 

  47. Xu C, Sun J, Wang C (2020) A novel image encryption algorithm based on bit-plane matrix rotation and hyper chaotic systems. Multimed Tools Appl 79:5573–5593. https://doi.org/10.1007/s11042-019-08273-x

    Article  Google Scholar 

  48. Zhou Y, Cao W, Philip Chen CL (2014) Image encryption using binary bitplane. Signal Process 100:197–207. https://doi.org/10.1016/j.sigpro.2014.01.020

    Article  Google Scholar 

Download references

Acknowledgements

The authors of the present work thank the Department of Science and Technology, India for offering significant improvement in S&T Infrastructure in Universities and Higher Educational Institutions (SR/FST/ETI-371/2014), (SR/FST/MSI-107/2015) and Tata Realty- IT City – SASTRA Srinivasa Ramanujan Research Cell of our University and for their financial support. They wish to acknowledge SASTRA Deemed University, Thanjavur for providing the necessary infrastructural support to carry out the present work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manivannan Doraipandian.

Ethics declarations

Conflict of interest

The authors hereby declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajendran, S., Krithivasan, K. & Doraipandian, M. A novel cross cosine map based medical image cryptosystem using dynamic bit-level diffusion. Multimed Tools Appl 80, 24221–24243 (2021). https://doi.org/10.1007/s11042-021-10798-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10798-z

Keywords

Navigation