Skip to main content
Log in

Healthcare with datacare—a triangular DNA security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

One of the fastest-growing industries in recent years has been e-Healthcare. Many cyberattacks and threats against patient confidentiality exist in electronic health records (EHRs). To shield EHRs from data breaches and to secure the data with integrity, DNA subsequences, SHA-256, and Hyper Chaotic Multi Attractors Chen System (HCMACS) are proposed for effective medical image encryption. A combined HCMACS produces a pseudorandom key sequence to strengthen its resiliency. The two significant advantages of the proposed technique are integrity and robustness, where the secret keys are susceptible to initial states determined by the original image’s hash value. Furthermore, the encrypted image is uploaded to a cloud-based service where an authorised user can retrieve the original data. Finally the digital medical images have confidentiality, integrity and availability (CIA). The outcomes of the DNA-based cryptosystem for medical images are validated with several analyses and are efficiently defended against statistical, differential, and chosen-plaintext attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. AashiqBanu S, Amirtharajan R (2020) A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach. Med Biol Eng Compu 58(7):1445–1458. https://doi.org/10.1007/s11517-020-02178-w

    Article  Google Scholar 

  2. AashiqBanu S, Amirtharajan R (2020) Tri-level scrambling and enhanced diffusion for DICOM image cipher- DNA and chaotic fused approach. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09501-5

    Article  Google Scholar 

  3. Aashiq Banu S, Rengarajan AMIRTHARAJANering,.(2020). Bio-inspired cryptosystem on reciprocal domain-DNA strands mutate to secure health data. Front Inform Technol Electron Eng 1–16. https://doi.org/10.1631/FITEE.2000071

  4. Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Information Security Journal 29(2):91–101. https://doi.org/10.1080/19393555.2020.1718248

    Article  Google Scholar 

  5. Aparna H, Bhumijaa B, Santhiyadevi R, Vaishanavi K, Sathanarayanan M, Rengarajan A, Abd El-Latif AA (2021) Double layered fridrich structure to conserve medical data privacy using quantum cryptosystem. J Inform Security Appl. https://doi.org/10.1016/j.jisa.2021.102972

  6. Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and AES algorithm. J Supercomput 75:6663–6682. https://doi.org/10.1007/s11227-019-02878-7

    Article  Google Scholar 

  7. Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding. IEEE Access 7:36667–36681. https://doi.org/10.1109/ACCESS.2019.2906292

    Article  Google Scholar 

  8. Bokolo Anthony Jnr (2020) Use of Telemedicine and Virtual Care for Remote Treatment in Response to COVID-19 Pandemic. Journal of Medical System 44:132. https://doi.org/10.1007/s10916-020-01596-5

    Article  CAS  Google Scholar 

  9. Cost of a Data Breach Study | IBM. (n.d.). Retrieved 19 August, 2020, from https://www.ibm.com/security/data-breach

  10. Cyber attacks: 37% increase in cyberattacks in India in Q1 2020: Report, IT Security News, ET CISO. (n.d.). Retrieved 19 August, 2020, from https://ciso.economictimes.indiatimes.com/news/37-increase-in-cyberattacks-in-india-in-q1-2020-report/75962696

  11. Dagadu JC, Li JP, Aboagye EO (2019) Medical Image Encryption Based on Hybrid Chaotic DNA Diffusion. Wireless Pers Commun 108, 591–612. https://doi.org/10.1007/s11277-019-06420-z.

  12. Dua M, Wesanekar A, Gupta V, Bhola M, Dua S (2019) Differential evolution optimisation of intertwining logistic map-DNA based image encryption technique. Journal of Ambient Intelligence and Humanized Computing, 0123456789. https://doi.org/10.1007/s12652-019-01580-z

  13. Guan M, Yang X, Hu W (2019) Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Proc 13(9):1535–1539. https://doi.org/10.1049/iet-ipr.2019.0051

    Article  Google Scholar 

  14. Guesmi R, Farah MAB, Kachouri A et al (2016) A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn 83:1123–1136. https://doi.org/10.1007/s11071-015-2392-7

    Article  MathSciNet  Google Scholar 

  15. Liu Hongjun, Kadir Abdurahman, Chengbo Xu (2020) Cryptanalysis and constructing S-Box based on chaotic map and backtracking. Appl Math Comput 376. https://doi.org/10.1016/j.amc.2020.125153

  16. IBM Security 2020 Cost of Data Breach Report Shows 10% Annual Increase in Healthcare Data Breach Costs. (n.d.). Retrieved 19 August, 2020, from https://www.hipaajournal.com/ibm-security-2020-cost-of-data-breach-report-shows-10-annual-increase-in-healthcare-data-breach-costs/

  17. Kalsi S, Kaur H, Chang V (2018) DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation. Journal of Medical Syststem 42:17. https://doi.org/10.1007/s10916-017-0851-z

    Article  Google Scholar 

  18. Kumar V, Rayappan JBB, Amirtharajan R, Praveenkumar P (2022) Quantum true random number generation on IBM’s cloud platform. Journal of King Saud University - Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2022.01.015

    Article  Google Scholar 

  19. Lakshmi C, Thenmozhi K, Rayappan JBB et al (2020) Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Comput & Applic. https://doi.org/10.1007/s00521-020-05447-9

    Article  Google Scholar 

  20. Li J, Chen L, Cai W, Xiao J, Zhu J, Hu Y, Wen K (2022) Holographic encryption algorithm based on bit-plane decomposition and hyperchaotic lorenz system. Optics Laser Technol.https://doi.org/10.1016/j.optlastec.2022.108127

  21. Li T, Shi J, Li X, Wu J, Pan F (2019) Image Encryption Based on Pixel-Level Diffusion with Dynamic Filtering and DNA-Level Permutation with 3D Latin Cubes. Entropy 21(3):319. https://doi.org/10.3390/e21030319

    Article  ADS  MathSciNet  CAS  PubMed  PubMed Central  Google Scholar 

  22. Liu H, Wang X, Kadir A (2021) Constructing chaos-based hash function via parallel impulse perturbation. Soft Comput 25:11077–11086. https://doi.org/10.1007/s00500-021-05849-4

    Article  Google Scholar 

  23. Liu H, Liu J, Ma C (2022) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-12069-x

    Article  PubMed  PubMed Central  Google Scholar 

  24. Lone MA, Qureshi S (2022) RGB image encryption based on symmetric keys using arnold transform, 3D chaotic map and affine hill cipher. Optik 260. https://doi.org/10.1016/j.ijleo.2022.168880

  25. Mahalingam H, Veeramalai T, Menon AR, SS, Amirtharajan R (2023) Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspect Math 11:457. https://doi.org/10.3390/math11020457

  26. Mahalingam H, VelupillaiMeikandan P, Thenmozhi K, Moria KM, Lakshmi C, Chidambaram N, Amirtharajan R (2023) Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments. Mathematics 11:1769. https://doi.org/10.3390/math11081769

    Article  Google Scholar 

  27. Microsoft, UW demonstrate first fully automated DNA data storage. (n.d.). Retrieved 19 August, 2020, from https://news.microsoft.com/innovation-stories/hello-data-dna-storage/

  28. Raj V, Janakiraman S, Amirtharajan R (2023) Reconfigurable color medical image encryptor using hardware accelerated Chao(S)-box triplets. J Real-Time Image Proc 20:27. https://doi.org/10.1007/s11554-023-01278-8

    Article  Google Scholar 

  29. Rajagopalan S, Poori S, Narasimhan M et al (2020) Chua’s diode and strange attractor: A three-layer hardware–software co-design for medical image confidentiality. IET Image Proc 14:1248–1256. https://doi.org/10.1049/iet-ipr.2019.0562

    Article  Google Scholar 

  30. Ravichandran D, Padmaa M, Rajagopal N et al (2023) Chaos and DNA Blended Hybrid Encryption Algorithm for Secure Image Transmission over DCT Pre-coded OFDM. Wireless Pers Commun 129:703–727. https://doi.org/10.1007/s11277-022-10152-y

    Article  Google Scholar 

  31. Ren HP, Bai C, Huang ZZ (2017) Secure communication with hyper-chaotic Chen system. Int J Bifurc Chaos 14(5):1750076. https://doi.org/10.1142/S0218127417500766

    Article  Google Scholar 

  32. Rodrigues JJPC et al (2018) Enabling Technologies for the Internet of Health Things. IEEE Access 6:13129–13141. https://doi.org/10.1109/ACCESS.2017.2789329

    Article  Google Scholar 

  33. Sridevi A, Sivaraman R, Balasubramaniam V, Sreenithi S, J., Thanikaiselvan, V., & Rengarajan, A. (2022) On chaos based duo confusion duo diffusion for colour images. Multimedia Tools and Applications 81(12):16987–17014. https://doi.org/10.1007/s11042-022-12471-5

    Article  Google Scholar 

  34. Teng L, Wang X, Xian Y (2022) Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf Sci 605:71–85. https://doi.org/10.1016/j.ins.2022.05.032

    Article  Google Scholar 

  35. Wang X, Xue W, An J (2020) Image encryption algorithm based on LDCML and DNA coding sequence. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09688-7

    Article  Google Scholar 

  36. Wang WT, Sun JY, Zhang H, Zhang J (2023) Quantum cryptosystem and circuit design for color image based on novel 3D Julia-fractal chaos system. Quantum Inf Process 22(1):64. https://doi.org/10.1007/s11128-022-03823-z

    Article  ADS  MathSciNet  Google Scholar 

  37. Why Healthcare Data Protection Needs to Include Encryption. (n.d.). Retrieved 19 August, 2020, from https://www.zettaset.com/blog/healthcare-data-protection-needs-encryption/

  38. Ye G, Wu H, Liu M, Shi Y (2022) Image encryption scheme based on blind signature and an improved lorenz system. Expert Syst Appl 205. https://doi.org/10.1016/j.eswa.2022.117709

  39. Zhao CF, Ren HP (2020) Image encryption based on hyper-chaotic multi-attractors. Nonlinear Dyn 100:679–698. https://doi.org/10.1007/s11071-020-05526-5

    Article  Google Scholar 

  40. Zhao J, Wang S, Zhang L (2023) Block Image Encryption Algorithm Based on Novel Chaos and DNA Encoding. Information 14:150. https://doi.org/10.3390/info14030150

    Article  CAS  Google Scholar 

  41. Zhang Y, Xie H, Sun J, Zhang H (2022) An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and otsu threshold segmentation. Comput Biol Med 146.  https://doi.org/10.1016/j.compbiomed.2022.105542

  42. Zhang F, Zhang X, Cao M, Ma F, Li Z (2021) Characteristic Analysis of 2D Lag-Complex Logistic Map and Its Application in Image Encryption, in IEEE MultiMedia 28(4):96–106. https://doi.org/10.1109/MMUL.2021.3080579.

Download references

Acknowledgements

The authors thank the Department of Computer Science Engineering at Koneru Lakshmaiah Education Foundation, Hyderabad. Also, thank the Department of Science & Technology, New Delhi, for the FIST funding (SR/FST/ET-I/2018/221(C)), the Intrusion Detection Lab at the School of Electrical & Electronics Engineering, SASTRA Deemed University, for providing infrastructural support to carry out this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Ethics declarations

Ethics approval

This article does not contain any studies with human participants performed by any authors.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Banu, S.A., Al-Alawi, A.I., Padmaa, M. et al. Healthcare with datacare—a triangular DNA security. Multimed Tools Appl 83, 21153–21170 (2024). https://doi.org/10.1007/s11042-023-16303-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16303-y

Keywords

Navigation