Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 23, pp 31397–31426 | Cite as

A dynamic approach for a lightweight and secure cipher for medical images

  • Mohammad Noura
  • Hassan Noura
  • Ali Chehab
  • Mohammad M. Mansour
  • Lama Sleem
  • Raphaël Couturier
Article

Abstract

Protecting the contents of medical records is of paramount importance when it comes to preserving patients’ privacy. Most existing cryptographic-based solutions rely on traditional encryption algorithms having a multi-round structure, which introduces processing latency and requires increased resources. Medical images possess special characteristics compared to other types of images. The main goal of this paper is to leverage these characteristics to design and implement an efficient and secure encryption algorithm for such images. The proposed solution defines three variants of encryption algorithms: (a) full, (b) middle-full, and (c) selective. The full approach encrypts all sub-matrices of an image, while the middle-full variant is a middle solution between the selective and full algorithms and its goal is to just hide the type of the medical image. Selective encryption identifies a set of sub-matrices of an image according to a statistical average test, known as region of interest (ROI). In the three approaches, a high security level is ensured since each image is encrypted independently of the previous and next images. Also, all primitives of the proposed cipher, such as permutation and substitution, depend on a dynamic key. Furthermore, the encryption scheme is efficient since the proposed round function is lightweight and applied for only one round. This reduces the latency and the required resources as compared to traditional cryptographic schemes. The proposed approach is flexible as it can be applied in either selective, middle-full, or full mode. Also, the size of a sub-matrix is variable and can be changed according to the available memory size. Several security and performance tests are conducted to evaluate the effectiveness of the proposed solution. The results validate the robustness of the proposed scheme against almost all considered types of attacks and show an improvement in terms of latency and resources compared to current image-encryption schemes. Also, the results confirm the robustness of the proposed algorithm in protecting the contents of medical images.

Keywords

Selective or partial encryption algorithm Full encryption algorithm Permutation and substitution primitives Cryptographic analysis 

Notes

Acknowledgments

This paper is partially funded by the Lebanese National Council for Scientific Research and by the Labex ACTION program (contract ANR-11-LABX-01-01).

References

  1. 1.
    Abdmouleh MK, Khalfallah A, Bouhlel MS (2013) Dynamic chaotic look-up table for mri medical image encryption. In: The international conference on systems, control, signal processing and informatics (SCSI 2013), pp 16–19Google Scholar
  2. 2.
    Ali S, Cherif A (2015) Performances analysis of image encryption for medical applications. J Inf Sci Comput Technol 1(1):78–87Google Scholar
  3. 3.
    Alvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (nca) for image encryption. Commun Nonlinear Sci Numer Simul 14(11):3743–3749CrossRefGoogle Scholar
  4. 4.
    Arroyo D, Li C, Li S, Alvarez G, Halang WA (2009) Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. Chaos Solitons & Fractals 41(5):2613–2616CrossRefGoogle Scholar
  5. 5.
    Ashtiyani M, Birgani PM, Hosseini HM (2008) Chaos-based medical image encryption using symmetric cryptography. In: Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on, pages 1–5. IEEEGoogle Scholar
  6. 6.
    Babel M, Pasteau F, Strauss C, Pelcat M, Bédat L, Blestel M, Déforges O (2012) Preserving data integrity of encoded medical images: the lar compression framework. In: Advances in reasoning-based image processing intelligent systems, pp 91–125. SpringerGoogle Scholar
  7. 7.
    Baptista MS (1998) Cryptography with chaos. Phys Lett A 240(1):50–54MathSciNetCrossRefGoogle Scholar
  8. 8.
    Biham E, Shamir A (2012) Differential cryptanalysis of the data encryption standard Springer Science & Business MediaGoogle Scholar
  9. 9.
    Brahimi Z, Bessalah H, Tarabet A, Kholladi MK et al (2008) Selective encryption techniques of jpeg2000 codestream for medical images transmission. WSEAS Trans Circuits Syst 7(7):718–727Google Scholar
  10. 10.
    Bruckmann A, Uhl A (2000) Selective medical image compression techniques for telemedical and archiving applications. Comput Biol Med 30(3):153–169CrossRefGoogle Scholar
  11. 11.
    Chen L, Wang S (2015) Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 65:69–75CrossRefGoogle Scholar
  12. 12.
    Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard Springer Science & Business MediaGoogle Scholar
  13. 13.
    Dai Y, Wang X (2012) Medical image encryption based on a composition of logistic maps and chebyshev maps. In: 2012 international conference on information and automation (ICIA), pp 210–214. IEEEGoogle Scholar
  14. 14.
    Digital imaging and communications in medicine (DICOM) (2004) Part 15: Security and System Management Profiles. National Electrical Manufacturers Association and American College of RadiologyGoogle Scholar
  15. 15.
    Fornazin M, Netto DBS Jr, Cavenaghi MA, Marana AN (2008) Protecting medical images with biometric information. In: Advances in Computer and Information Sciences and Engineering, pp 284–289. SpringerGoogle Scholar
  16. 16.
    Fu C, Lin Y, Jiang H-Y, Ma H-f (2015) Medical image protection using hyperchaos-based encryption. In: 2015 9th International Symposium on Medical Information and Communication Technology (ISMICT), pp 103–107. IEEEGoogle Scholar
  17. 17.
    Ghebleh M, Kanso A, Noura H (2014) An image encryption scheme based on irregularly decimated chaotic maps. Signal Process Image Commun 29(5):618–627CrossRefGoogle Scholar
  18. 18.
    Heys HM (2002) A tutorial on linear and differential cryptanalysis. Cryptologia 26(3):189–221CrossRefGoogle Scholar
  19. 19.
    Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM. In: 2010 20th international conference on pattern recognition (ICPR), pp 2366–2369. IEEEGoogle Scholar
  20. 20.
    Huang F, Feng Y (2009) Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm. Front Electr Electron Eng Chin 4(1):5–9CrossRefGoogle Scholar
  21. 21.
    Jian XU, Wei L, Zhang Y, Wang A, Zhou F, Gao C-Z (2018) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. Journal of Network and Computer ApplicationsGoogle Scholar
  22. 22.
    Kanso A, Ghebleh M (2015) An efficient and robust image encryption scheme for medical applications. Commun Nonlinear Sci Numer Simul 24(1):98–116MathSciNetCrossRefGoogle Scholar
  23. 23.
    Kester Q-A, Nana L, Pascu AC, Gire S, Eghan JM, Quaynor NN (2015) A security technique for authentication and security of medical images in health information systems. In: 2015 15th international conference on computational science and its applications (ICCSA), pp 8–13. IEEEGoogle Scholar
  24. 24.
    Li Z, Liu RR (2015) Cryptanalyzing a novel couple images encryption algorithm based on dna subsequence operation and chaotic system. Optik-Int J Light Electron Opt 126(24):5022–5025CrossRefGoogle Scholar
  25. 25.
    Li P, Li T, Yao Z-A, Tang C-M, Li J (2017) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput 21(15):4349–4359CrossRefGoogle Scholar
  26. 26.
    Li J, Lin Q, Chuying YU, Ren X, Ping LI (2018) qdct-and svd-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput 22(1):47–65CrossRefGoogle Scholar
  27. 27.
    Lima JB, Madeiro F, Sales FJR (2015) Encryption of medical images based on the cosine number transform. Signal Process Image Commun 35:1–8CrossRefGoogle Scholar
  28. 28.
    Liu Y, Tang J, Xie T (2014) Cryptanalyzing a rgb image encryption algorithm based on dna encoding and chaos map. Opt Laser Technol 60:111–115CrossRefGoogle Scholar
  29. 29.
    Mahmood AB, Dony RD (2011) Segmentation based encryption method for medical images. In: Internet technology and secured transactions (ICITST) international conference for, pp 596–601. IEEEGoogle Scholar
  30. 30.
    Menezes AJ, Oorschot PCV, Vanstone SA (1996) Handbook of applied cryptography CRC pressGoogle Scholar
  31. 31.
    Mostefaoui A, Noura H, Fawaz Z (2015) An integrated multimedia data reduction and content confidentiality approach for limited networked devices. Ad Hoc Netw 32:149–156CrossRefGoogle Scholar
  32. 32.
    Ou Y, Sur C, Rhee KH Region-based selective encryption for medical imaging. In: Frontiers in algorithmics, pp 62–73. SpringerGoogle Scholar
  33. 33.
    Paar C, Pelzl J (2009) Understanding cryptography: a textbook for students and practitioners. Springer Science & Business MediaGoogle Scholar
  34. 34.
    Panduranga HT, Naveenkumar SK (2013) Selective image encryption for medical and satellite images. Int J Eng Technol 5(1):115–121Google Scholar
  35. 35.
    Puech W, Rodrigues JM (2005) Crypto-compression of medical images by selective encryption of dct. In: 2005 13th European signal processing conference, pp 1–4. IEEEGoogle Scholar
  36. 36.
    Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164CrossRefGoogle Scholar
  37. 37.
    Qin C, Chen X, Luo X, Zhang X, Sun X (2018) Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inform Sci 423:284–302MathSciNetCrossRefGoogle Scholar
  38. 38.
    Schneier B (1993) The idea encryption algorithm-the international data encryption algorithm (idea) may be one of the most secure block algorithms available to the public today. bruce examines its 128-bit-long key. Dr Dobb’s Journal-Software Tools for the Professional Programmer 18(13):50–57Google Scholar
  39. 39.
    Schonberg D, Draper SC, Yeo C, Ramchandran K (2008) Toward compression of encrypted images and video sequences. IEEE Trans Inf Forensics Secur 3(4):749–762CrossRefGoogle Scholar
  40. 40.
    Shi ZJ (2004) Bit permutation instructions: architecture, implementation and cryptographic properties. Princeton University, PrincetonGoogle Scholar
  41. 41.
    Smid ME, Branstad DK (1988) Data encryption standard: past and future. Proc IEEE 76(5):550–559CrossRefGoogle Scholar
  42. 42.
    Som S, Sen S (2013) A non-adaptive partial encryption of grayscale images based on chaos. Procedia Technol 10:663–671CrossRefGoogle Scholar
  43. 43.
    Usman K, Juzoji H, Nakajima I, Soegidjoko S, Ramdhani M, Hori T, Igi S (2007) Medical image encryption based on pixel arrangement and random permutation for transmission security. In: e-Health Networking, Application and Services, 2007 9th International Conference on, pages 244–247. IEEEGoogle Scholar
  44. 44.
    Wang X, Liu L (2013) Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dyn 73(1-2):795–800MathSciNetCrossRefGoogle Scholar
  45. 45.
    Wang Y-G, Zhu G, Shi Y-Q (2018) Transportation spherical watermarking IEEE Transactions on Image ProcessingGoogle Scholar
  46. 46.
    Xiang T, Wong K-W, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos: An Interdisciplinary J Nonlinear Sci 17(2):023115CrossRefGoogle Scholar
  47. 47.
    Ya LI, Wang G, Nie L, Wang Q, Tan W (2018) Distance metric optimization driven convolutional neural network for age invariant face recognition. Pattern Recogn 75:51–62CrossRefGoogle Scholar
  48. 48.
    Zhang Y, Di X (2013) Cryptanalysis of s-box-only chaotic image ciphers against chosen plaintext attack. Nonlinear Dyn 72(4):751–756MathSciNetCrossRefGoogle Scholar
  49. 49.
    Zhang L-B, Yang B-Q (2015) An efficient cryptosystem for medical image encryption. Int J Signal Process Image Process Pattern Recognit 8(7):327–340MathSciNetGoogle Scholar
  50. 50.
    Zhang X, Ren Y, Shen L, Qian Z, Feng G (2014) Compressing encrypted images with auxiliary information. IEEE Trans Multimedia 16(5):1327–1336CrossRefGoogle Scholar
  51. 51.
    Zhang X, Sun G, Shen L, Qin C (2014) Compression of encrypted images with multi-layer decomposition. Multimedia Tools Appl 72(1):489–502CrossRefGoogle Scholar
  52. 52.
    Zhang L-B, Zhu Z-L, Yang B-Q, Liu W-Y, Zhu H-F, Zou M-Y (2015) Cryptanalysis and improvement of an efficient and secure medical image protection scheme. Math Probl Eng 2015:13951–13976Google Scholar
  53. 53.
    Zhou Y, Panetta K, Agaian S (2009) A lossless encryption method for medical images using edge maps. In: Engineering in medicine and biology society, 2009. EMBC 2009. Annual International Conference of the IEEE, pp 3707–3710. IEEEGoogle Scholar
  54. 54.
    Zhou J, Liu X, Oscar CAU (2013) On the design of an efficient encryption-then-compression system. In: IEEE international conference on acoustics, speech and signal processing, pp 2872–2876. IEEEGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.FEMTO-ST InstituteUniv. Bourgogne Franche-Comté (UBFC)BelfortFrance
  2. 2.American University of Beirut, Electrical and Computer EngineeringBeirutLebanon

Personalised recommendations