Research Article |
An Efficient Image Encryption Scheme for Medical Image Security
Author(s): Zeenath*, K DurgaDevi and John W Carey M
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 12, Issue 3
Publisher : FOREX Publication
Published : 20 August 2024
e-ISSN : 2347-470X
Page(s) : 963-974
Abstract
In the contemporary landscape of digital healthcare, the confidentiality and integrity of medical images have become paramount concerns, necessitating the development of robust security measures. This research endeavors to address these concerns by proposing an innovative image encryption scheme tailored specifically for enhancing medical image security. The proposed scheme integrates a sophisticated blend of symmetric and asymmetric encryption techniques, complemented by a novel key management system, to fortify the protection of medical image data against unauthorized access and malicious tampering. The proposed DNA-based encryption algorithm leverages the unique properties of DNA encoding to securely scramble image data, providing an added layer of protection. By utilizing DNA sequences in the encryption and decryption processes, the scheme achieves a high level of data confusion and diffusion, significantly enhancing security. The efficacy of the proposed encryption scheme is validated through comprehensive experimental evaluations, which demonstrate its proficiency in ensuring data security while maintaining computational efficiency. The scheme's compatibility with existing medical imaging systems is also examined, affirming its seamless integration into contemporary healthcare infrastructures. This research contributes to the advancement of medical image security by proposing an efficient encryption scheme that strikes a balance between stringent security requirements and practical implementation considerations. The primary contributions include the development of a DNA-based encryption algorithm and a novel key management system, both of which significantly enhance the security of medical images. This research contributes to the advancement of medical image security by proposing an efficient encryption scheme that strikes a balance between stringent security requirements and practical implementation considerations. By safeguarding the confidentiality and integrity of medical images, the proposed scheme empowers healthcare providers to uphold patient privacy and trust in the digital age. Experimental results show that this approach ensures robust encryption without compromising image quality, making it suitable for sensitive medical imaging applications.
Keywords: Medical image security
, Image encryption
, Symmetric encryption
, Asymmetric encryption
, Data confidentiality
, Data Integrity
.
Zeenath*, Dept. of Electronics and Communication Engineering, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, India; Email: za5806@srmist.edu.in
K DurgaDevi, Dept. of Electronics and Communication Engineering, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, India; Email: durgadek@srmist.edu.in
John W Carey M, Dept. Of Electronics and Communication Engineering, Methodist College of Engineering and Technology, Hyderabad, India; Email: careymedithe@gmail.com
-
[1] Lundervold AS, Lundervold A. An overview of deep learning in medical imaging focusing on MRI. Zeitschrift für MedizinischePhysik. 2019 May 1;29(2):102-27.
-
[2] Gaffar A, Joshi AB, Singh S, Mishra VN, Rosales HG, Zhou L, Dhaka A, Mishra LN. A Technique for Securing Multiple Digital Images Based on 2D Linear Congruential Generator, Silver Ratio, and Galois Field. IEEE Access. 2021 Jul 1;9:96125-50.
-
[3] Hussain AZ, Khodher MA. Securing Medical Images Using Chaotic Map Encryption and LSB Steganography. Revue d'IntelligenceArtificielle. 2024 Feb 1;38(1).
-
[4] Tanveer MS, Md. Rokibul Alam K, Morimoto Y. A multi-stage chaotic encryption technique for medical image. Information Security Journal: A Global Perspective. 2022 Nov 2;31(6):657-75.
-
[5] Jain M, Choudhary RC, Kumar A. Secure medical image steganography with RSA cryptography using decision tree. In2016 2nd international conference on contemporary computing and informatics (IC3I) 2016 Dec 14 (pp. 291-295). IEEE.
-
[6] Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K. Medical image security using dual encryption with oppositional based optimization algorithm. Journal of medical systems. 2018 Nov;42:1-1.
-
[7] Norcen R, Podesser M, Pommer A, Schmidt HP, Uhl A. Confidential storage and transmission of medical image data. Computers in Biology and Medicine. 2003 May 1;33(3):277-92.
-
[8] Maurya R, Kannojiya AK, Rajitha B. An extended visual cryptography technique for medical image security. In2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) 2020 Mar 5 (pp. 415-421). IEEE.
-
[9] Judith, ID & Mary, GJ, “Survey on Securing Medical Image Transmission using Visual Cryptography Techniques”, International Journal on Future Revolution in Computer Science & Communication Engineering, 2015, vol. 1, no. 7, pp. 06-11.
-
[10] Maurya R, Kannojiya AK, Rajitha B. An extended visual cryptography technique for medical image security. In2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) 2020 Mar 5 (pp. 415-421). IEEE.
-
[11] BJ SK, Nair A, VK RR. Hybridization of RSA and AES algorithms for authentication and confidentiality of medical images. In2017 international conference on communication and signal processing (ICCSP) 2017 Apr 6 (pp. 1057-1060). IEEE.
-
[12] Benssalah M, Rhaskali Y, Drouiche K. An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimedia Tools and Applications. 2021 Jan;80(2):2081-107.
-
[13] Hashim AT, Jabbar AK, Hassan QF. Medical image encryption based on hybrid AES with chaotic map. InJournal of Physics: Conference Series 2021 Aug 1 (Vol. 1973, No. 1, p. 012037). IOP Publishing.
-
[14] Jamil AS, Rahma AM. Cyber Security for Medical Image Encryption using Circular Blockchain Technology Based on Modify DES Algorithm. International Journal of Online & Biomedical Engineering. 2023 Mar 1;19(3).
-
[15] Ahmed ST, Hammood DA, Chisab RF, Al-Naji A, Chahl J. Medical Image encryption: A comprehensive review. Computers. 2023 Aug 11;12(8):160.
-
[16] Rehman MU, Shafique A, Khan MS, Driss M, Boulila W, Ghadi YY, Changalasetty SB, Alhaisoni M, Ahmad J. A novel medical image data protection scheme for smart healthcare system. CAAI Transactions on Intelligence Technology. 2024 Feb 13.
-
[17] Hamza A, Kumar B. A review paper on DES, AES, RSA encryption standards. In2020 9th International Conference System Modeling and Advancement in Research Trends (SMART) 2020 Dec 4 (pp. 333-338). IEEE.
-
[18] Du S, Ye G. IWT and RSA based asymmetric image encryption algorithm. Alexandria Engineering Journal. 2023 Mar 1;66:979-91.
-
[19] Dikici E, Bigelow M, Prevedello LM, White RD, Erdal BS. Integrating AI into radiology workflow: levels of research, production, and feedback maturity. Journal of Medical Imaging. 2020 Jan 1;7(1):016502.
-
[20] Dananjayan S, Raj GM. 5G in healthcare: how fast will be the transformation?. Irish Journal of Medical Science (1971-). 2021 May;190(2):497-501.
-
[21] Jahn SW, Plass M, Moinfar F. Digital pathology: advantages, limitations and emerging perspectives. Journal of clinical medicine. 2020 Nov 18;9(11):3697.
-
[22] Vatambeti R, Krishna EP, Karthik MG, Damera VK. Securing the medical data using enhanced privacy preserving based blockchain technology in Internet of Things. Cluster Computing. 2024 Apr;27(2):1625-37.
-
[23] Chen RH, Zhang QY, Meng LT, Liu YL. A Lightweight Image Encryption Algorithm Based on a Dual Chaotic System and Dynamic S-box. International Journal of Network Security. 2024 Mar 1;26(2):270-84.
-
[24] Shi J, Chen S, Chen T, Zhao T, Tang J, Li Q, Yu C, Shi H. Image encryption with quantum cellular neural network. Quantum Information Processing. 2022 Jun 14;21(6):214.
-
[25] Kumari S, Singh M, Singh R, Tewari H. A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices. Computer Networks. 2022 Nov 9;217:109327.
-
[26] Li Z, Zhang J, Zhang J, Zheng Y, Zong X. Integrated edge computing and blockchain: A general medical data sharing framework. IEEE Transactions on Emerging Topics in Computing. 2023 Dec 25.