Abstract
Nowadays, diagnosing patient diseases remotely is a routine and digital medical images analysis as a part of Telecare Medical Information Systems (TMIS) play a fundamental role in early diagnosing and treating most common and serious diseases such as breast cancer. In this context, altering or distorting even a single pixel of a medical image during its transmission over an unsure channel could lead to a wrong diagnosis and harm patient health, induce damaging delays. Therefore the security and privacy of the transmitted medical images must be addressed most seriously. Several techniques are proposed in the literature to address these issues using different techniques such as chaos theory, more recently, elliptic curves cryptography (ECC) or improved classical methods such as linear cryptography. In this paper, we address the security level concern of an image encryption technique combining ECC with Hill cipher (ECCHC) which has been recently proposed by Dawahdeh et al [13]. Our study rises concerns about some weaknesses and flaws of the analyzed encryption scheme against some plain-text and known plain-text attacks. In addition, and not least issue, it is found that the key length used in Dawahdeh et al. scheme is not sufficiently large to be robust against brute force attack. To fix the found flaws and to improve the encryption scheme, a generalized cryptosystem is suggested. In the enhanced version, the key matrix negotiation is redefined to a cipher that combines a modified EC Integrated Encryption Scheme (ECIES) and the linear multiplication matrix is generalized to key matrix of (2n × 2n), n > 2 to counter efficiently the exhaustive search attack. The effectiveness of the proposed version is evaluated and verified through extensive experimentation and most recent available security tools. Compared with the state-of-the art techniques, the proposed version exhibits excellent security features and can resist to various knowing attacks.
Similar content being viewed by others
References
http://sipi.usc.edu/database/database.php?volume=miscZ, Access date November 2019
Abdulla AA, Sellahewa H, Jassim SA (2014) .. In: International conference on research in security standardisation. Springer, pp 151–166
Acharya B, Rath GS, Patra SK, Panigrahy SK (2007) Novel methods of generating self-invertible matrix for Hill Cipher algorithm. Int J Secur 1 (1):14
Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools and Applications, 1–21
Allaf AH, Kbir MA (2018) A review of digital watermarking applications for medical image exchange security. The proceedings of the third international conference on smart city applications, pp 472–480
Alshanbari HS (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools and Applications 76(3):3669
Alshanbari HS (2020) Medical image watermarking for ownership & tamper detection, Multimedia Tools and Applications, pp 1–16
Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667
Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96
Chai X, Gan Z, Zhang M (2017) A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimedia Tools and Applications 76(14):15561
Chen Y, Yang Q (2014) Dynamics of a hyperchaotic Lorenz-type system. Nonlinear Dynamics 77(3):569
Chen J, Zhu Zl, Zhang Lb, Zhang Y, Yang Bq (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Processing 142:340
Dawahdeh ZE, Yaakob SN, bin Othman RR (2018) A new image encryption technique combining elliptic curve cryptosystem with Hill Cipher. Journal of King Saud University-Computer and Information Sciences 30(3):349
Ding J, Li S, Gu Z (2018) High-speed ECC processor over NIST prime fields applied with Toom–Cook multiplication. IEEE Transactions on Circuits and Systems I: Regular Papers 66(3):1003
Dzwonkowski M, Papaj M, Rykaczewski R (2015) A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process 24 (11):4614
El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144
Farash MS (2013) Cryptography: A New Approach of Classical Hill Cipher. International Journal of Security and Its Applications 7(2):179
Farwa S, Bibi N, Muhammad N (2020) An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling. Multimedia Tools and Applications, pp 1–14
Hayat U, Azam NA (2019) A novel image encryption scheme based on an elliptic curve. Signal Process 155:391
Hill LS (1929) Cryptography in an algebraic alphabet. American Mathematical Monthly 36(6):306
Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Information sciences 396:97
Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134
Hua Z, Yi S, Zhou Y (2018) A new plaintext-related image encryption scheme based on chaotic sequence. Signal Processing 144:134
Huang H, He Y, Yang S, Ye R (2020) Chaotic image encryption based on bidimensional empirical mode decomposition and double random phase encoding. Multimedia Tools and Applications, pp 1–14
Kannammal A, Rani SS (2012) DICOM image authentication and encryption based on RSA and AES algorithms. In: International conference on intelligent robotics, automation, and manufacturing. Springer, pp 349–360
Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory. Multimedia Tools and Applications, pp 1–17
Karmakar J, Nandi D, Mandal M (2020) A novel hyper-chaotic image encryption with sparserepresentation based compression. Multimedia Tools and Applications, pp 1–24
Kahn D (1996) The Codebreakers: The comprehensive history of secret communication from ancient times to the internet, Simon and Schuster
Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Designs, codes and cryptography 19(2-3):173
Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187
Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved ElGamal encryption technique. Optik-International Journal for Light and Electron Optics 147:88
Laiphrakpam DS, Khumanthem MS (2018) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimedia Tools and Applications 77(7):8629
Li L, El-Latif AAA, Niu X (2012) Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process 92 (4):1069
Miller VS (1985) .. In: Conference on the theory and application of cryptographic techniques. Springer, pp 417–426
Muhammad K, Ahmad J, Rho S, Baik SW (2017) Baik, Image steganography for authenticity of visual contents in social networks. Multimedia Tools and Applications 76(18):18985
Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC. Int J Commun Syst, p e3913
Parvees MM, Samath JA, Bose BP (2017) Medical images are safe-an enhanced chaotic scrambling approach. J Med Sys 41(10):167
Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine 72:170
Saeednia S (2000) How to make the Hill cipher secure. Cryptologia 24(4):353
Shang M, Yan Z, Zeguo Y, Jianhao H, Xin L (2019) A new plaintext-related image encryption scheme based on chaotic sequence. IEEE Access 7:30344
Soualmi A, Alti A, Laouamer L (2018) A new blind medical image watermarking based on Weber descriptors and Arnold chaotic map. Arabian, Journal for Science and Engineering, pp 1–13
Soualmi A, Alti A, Laouamer L (2018) A new blind medical image watermarking based on Weber descriptors and Arnold chaotic map. Arabian Journal for Science and Engineering, https://doi.org/10.1007/s13369-018-3246-7
Vincent J (2018) 1.5 million affected by hack targeting Singapore’s health data. https://www.theverge.com
Washington LC (2003) Elliptic curves: number theory and cryptography. Chapman and Hall/CRC
Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Multimedia Tools and Applications 24(9.10):1613
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption, Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT) 1(2):31
Wu X, Zhu B, Hu Y, Ran Y (2017) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5:6429
Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292
Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inform Sci 222:323
Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74
Zhang X, Wang X (2019) Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimedia Tools and Applications 78(6):7841
Zhang LB, Zhu ZL, Yang BQ, Liu WY, Zhu HF, Zou MY (2015) Medical image encryption and compression scheme using compressive sensing and pixel swapping based permutation approach, Mathematical Problems in Engineering 2015
Zefreh EZ (2020) An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimedia Tools and Applications, 1–30
Zhou Y, Bao L, Chen CP (2014) A new 1-D chaotic system for image encryption. Signal Process 97:172
Zhou Y, Hua Z, Pun CM, Chen CP (2014) Cascade chaotic system with applications. IEEE Trans Cybern 45(9):2001
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Benssalah, M., Rhaskali, Y. & Drouiche, K. An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimed Tools Appl 80, 2081–2107 (2021). https://doi.org/10.1007/s11042-020-09775-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09775-9