Skip to main content
Log in

Selective medical image encryption based on 3D Lorenz and Logistic system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Medical images contain very sensitive and confidential information about the patient and are huge in terms of size. Therefore, there is a need to develop encryption schemes that reduce computational time without compromising the security level. Selective image encryption is one such technique that can reduce time and complexity. In this paper, we propose a selective image encryption scheme that can be used to encrypt medical images. The medical image is first decomposed into non-overlapping blocks, and then the variance of each block is calculated and compared to a preset threshold value. The blocks for which variance is greater than the threshold value are considered significant and encrypted. The pixels within each significant block are permutated with a hybrid sequence (which is different for each block) obtained from Logistic maps. The diffusion operation is performed using a different hybrid sequence obtained from a 1-D Logistic map and a 3-D Lorenz map, which also is different for every block. Finally, the cipher image is formed by concatenating the encrypted significant and insignificant blocks. The proposed encryption scheme has been tested on several grayscale and color medical images to validate its performance in terms of security provided and computational time. It has been found resilient to differential cryptanalysis, as the NPCR and UACI values are greater than 99.60% and 33.20%, respectively besides having a large key space of the order of \({10}^{108}.\) The PSNR values for all encrypted images are less than 12 dB even though the images are selectively encrypted, and the entropy of the Region of Interest (ROI), i.e., encrypted blocks, is nearly equal to 8, which signifies a better security of our system. The computational time required to encrypt an image of sizes 225 × 225 and 512 × 512 is 0.06 and 0.10 s respectively making it suitable for real time applications. The experimental results show that the proposed encryption scheme provides high security with less complexity and computational time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Ibrahim S (2020) Framework for efficient medical image encryption using dynamic S-boxes and chaotic maps. IEEE Access 8:160433–160449. https://doi.org/10.1109/access.2020.3020746

    Article  Google Scholar 

  2. Sahi MA (2018) Privacy preservation in e-healthcare environments: state of the art and future directions. IEEE Access 6:464–478. https://doi.org/10.1109/access.2017.2767561

    Article  Google Scholar 

  3. Nazeh AW, Ali A, Esparham B, Marwan MD (2018) A comparison of cryptographic algorithms: DES, 3DES, AES, RSA, and blowfish for guessing attacks prevention. J Comp Sci Appl Inform Technol 3(2):1–7

    Google Scholar 

  4. Massoudi A, Lefebvre F, Vleeschouwer C, Macq B, Quisquater JJ (2008) Overview on selective encryption of image and video: Challenges and perspectives, EURASIP. EURASIP J Inf Secur 2008:1–18. https://doi.org/10.1155/2008/179290

    Article  Google Scholar 

  5. Sarosh P, Parah SA, Malik BA, Hijji M, Muhammad K (2023) Real-time medical data security solution for smart healthcare. IEEE Trans Ind Inf 19:8137–8147. https://doi.org/10.1109/TII.2022.3217039

    Article  Google Scholar 

  6. Bhatnagar G, Wu QJ (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Process 22:648–663. https://doi.org/10.1016/j.dsp.2012.02.005

    Article  MathSciNet  Google Scholar 

  7. Gayathri V (2016) A survey on security and efficiency issues in chaotic image encryption. Int J Inf Comput Secur 8:347–381. https://doi.org/10.1504/ijics.2016.080427

    Article  Google Scholar 

  8. Zhu S, Zhu C (2020) Secure image encryption algorithm based on hyperchaos and dynamic DNA coding. Entropy (Basel) 22:772. https://doi.org/10.3390/e22070772.10.3390/e22070772

    Article  MathSciNet  Google Scholar 

  9. Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78:26203–26222. https://doi.org/10.1007/s11042-019-07818-4

    Article  Google Scholar 

  10. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259–1284. https://doi.org/10.1142/s021812749800098x

    Article  MathSciNet  MATH  Google Scholar 

  11. Khashan OA, Shaikh MA (2020) Edge-based lightweight selective encryption scheme for digital medical images. Multimed Tools Appl 79:26369–26388. https://doi.org/10.1007/s11042-020-09264-z

    Article  Google Scholar 

  12. Oteko Tresor L, Sumbwanyambe M (2019) A selective image encryption scheme based on 2D DWT, Henon Map, and 4D Qi Hyper-Chaos. IEEE Access 7:103463–103472. https://doi.org/10.1109/access.2019.2929244

    Article  Google Scholar 

  13. Khan JS (2020) DNA and plaintext dependent chaotic visual selective image encryption. IEEE Access 8:159732–159744. https://doi.org/10.1109/access.2020.3020917

    Article  Google Scholar 

  14. Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inform Secur J: A Global Perspective 29:91–101. https://doi.org/10.1080/19393555.2020.1718248

    Article  Google Scholar 

  15. M. K. Abdmouleh, A. Khalfallah, and M. S. Bouhlel (2017) A novel selective encryption dwt-based algorithm for medical images, 14th International Conference on Computer Graphics, Imaging and Visualization, pp. 79–84. IEEE, https://doi.org/10.1109/cgiv.2017.10

  16. Darwish SM (2019) A modified image selective encryption-compression technique based on 3d chaotic maps and arithmetic coding. Multimed Tools Appl 78:19229–19252. https://doi.org/10.1007/s11042-019-7256-6

    Article  Google Scholar 

  17. Kulsoom A, Xiao D, Rehman AU (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 75:1–23. https://doi.org/10.1007/s11042-014-2221-x

    Article  Google Scholar 

  18. Khan JS, Ahmad J (2019) Chaos-based efficient selective image encryption. Multidimension Syst Signal Process 30:943–961. https://doi.org/10.1007/s11045-018-0589-x

    Article  MathSciNet  MATH  Google Scholar 

  19. Khan M, Ahmad J, Javaid Q, Saqib NA (2016) An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps, and substitution box. J Mod Opt 64:531–540. https://doi.org/10.1080/09500340.2016.1246680

    Article  Google Scholar 

  20. Som S, Mitra A, Palit S, Chaudhuri B (2019) A selective bitplane image encryption scheme using chaotic maps. Multimed Tools Appl 78:10373–10400. https://doi.org/10.1007/s11042-018-6539-7

    Article  Google Scholar 

  21. Krishnamoorthi R, Murali P (2017) A selective image encryption based on square-wave shuffling with orthogonal polynomials transformation suitable for mobile devices. Multimed Tools Appl 76:1217–1246. https://doi.org/10.1007/s11042-015-3027-1

    Article  Google Scholar 

  22. Rehman AU, Liao X, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74:4655–4677. https://doi.org/10.1007/s11042-013-1828-7

    Article  Google Scholar 

  23. Ullah I, Iqbal W, Masood A (2013) Selective region-based images encryption, 2nd National conference on information assurance (NCIA), pp 125–128. https://doi.org/10.1109/ncia.2013.6725336

  24. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA chaos blend to secure medical privacy. IEEE Transact Nano Biosci 16:850–858. https://doi.org/10.1109/tnb.2017.2780881

    Article  Google Scholar 

  25. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

    Article  MathSciNet  MATH  Google Scholar 

  26. Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96–109. https://doi.org/10.1016/j.sigpro.2016.10.003

    Article  Google Scholar 

  27. Chen L, Wang S (2017) Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 65:69–75. https://doi.org/10.1016/j.compbiomed.2015.07.024

    Article  Google Scholar 

  28. Kanso A, Smaoui N (2009) Logistic chaotic maps for binary numbers generations. Chaos, Solitons Fractals 40:2557–2568. https://doi.org/10.12732/ijpam.v83i1.9

    Article  MATH  Google Scholar 

  29. Mirjalili S (2020) Chaotic Biogeography based Optimisation (CBBO) algorithm. https://www.mathworks.com/matlabcentral/fileexchange/47313-chaotic-biogeography-based-optimisation-cbbo-algorithm

  30. Song W, Liang J (2013) Difference equation of Lorenz system. Int J Pure Appl Math 83:101–110. https://doi.org/10.12732/ijpam.v83i1.9

    Article  Google Scholar 

  31. Sharma N, Saini I, Yadav A, Singh P (2017) Phase-image encryption based on 3d-Lorenz chaotic system and double random phase encoding. 3D Res 8(4):39. https://doi.org/10.1007/s13319-017-0149-4

    Article  Google Scholar 

  32. Ott E (1994) Chaos in dynamical systems. Cambridge university press, vol. 47, pp. 45. https://doi.org/10.1063/1.2808369

  33. Wu Y, Noonan JP, Agaian S (2011) Npcr and uaci randomness tests for image encryption. Cyber J: multidisciplinary journals in science and technology Journal of Selected Areas in Telecommunications (JSAT) 1:31–38. https://doi.org/10.1007/978-981-16-8896-6_16

    Article  Google Scholar 

  34. Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM, 20th International Conference on Pattern Recognition, pp. 2366- 2369. https://doi.org/10.1109/icpr.2010.579

  35. Kiran P, Parameshachari BD (2022) Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocess Microsyst 91:104546. https://doi.org/10.1016/j.micpro.2022.104546

    Article  Google Scholar 

  36. Kumar A, N.S. Raghava, Wavelet Based Selective Image Encryption Scheme Using Tinkerbell Chaotic Map. Communication, Networks, and Computing. Communications in Computer and Information Science, Springer, vol. 1502, pp 198–208, (2021). https://doi.org/10.1007/978-981-16-8896-6_16

  37. Kiran, Parameshachari BD (2020) Selective image encryption of medical images based on threshold entropy and arnold cat map. Biochem Biophys Res Commun 13:194–202

    Google Scholar 

  38. Liu H, Liu J, Ma C (2022) Constructing dynamic strong S-box using 3D chaotic map and application to image encryption. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-12069-x

    Article  Google Scholar 

  39. Liu H, Kadir A, Liu J (2019) Color pathological image encryption algorithm using arithmetic over Galois field and coupled hyper chaotic system. Opt Lasers Eng 122:123–133. https://doi.org/10.1016/j.optlaseng.2019.05.027

    Article  Google Scholar 

  40. Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. Int J Bifurcation Chaos 30:2050173. https://doi.org/10.1142/S0218127420501734

    Article  MathSciNet  MATH  Google Scholar 

  41. Liu H, Liu J, Ma C (2023) Correction to: constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-12069-x

    Article  Google Scholar 

  42. Gupta MD, Chauhan RK (2021) Secure image encryption scheme using 4D-hyperchaotic systems based reconfigurable pseudo-random number generator and S-box. Integration 81:137–159

    Article  Google Scholar 

  43. Hosny KM, Kamal ST, Darwish MM, Papakostas GA (2021) New image encryption algorithm using hyperchaotic system and fibonacci Q-matrix. Electronics 10:1066. https://doi.org/10.3390/electronics10091066

    Article  Google Scholar 

  44. Kumar A, Raghava NS (2019) Selective colour image encryption using Hénon chaotic system with a keyless substitution cipher. Eng Appl Sci Res 47:66–76

    Google Scholar 

  45. Jan A, Parah SA, Malik BA (2022) IEFHAC: image encryption framework based on hessenberg transform and chaotic theory for smart health. Multimed Tools Appl 81:18829–18853. https://doi.org/10.1007/s11042-022-12653-1

    Article  Google Scholar 

  46. Mansoor S, Parah SA (2023) HAIE: a hybrid adaptive image encryption algorithm using chaos and DNA computing. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-14542-7

    Article  Google Scholar 

  47. Lyle M, Sarosh P, Parah SA (2022) Adaptive image encryption based on twin chaotic maps. Multimed Tools Appl 81:8179–8198. https://doi.org/10.1007/s11042-022-11917-0

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabir A. Parah.

Ethics declarations

Conflict of interests

• The authors have no relevant financial or non-financial interests to disclose.

• The authors have no competing interests to declare that are relevant to the content of this article.

• All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

• The authors have no financial or proprietary interests in any material discussed in this article.

Data availability

Data cannot be made available due to Intuition policy.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lyle, M., Sarosh, P. & Parah, S.A. Selective medical image encryption based on 3D Lorenz and Logistic system. Multimed Tools Appl (2023). https://doi.org/10.1007/s11042-023-16996-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-023-16996-1

Keywords

Navigation