A Secure Medical Image Transmission System Based On 2D Logistic Map and Diffie-Hellman Key Exchange Mechanisms
Keywords:Medical Images, Chaotic Map, Diffie–Hellman Key Exchange, Peak Signal-to-Noise Ratio
With the tremendous growth of searchable visual media, the content-based medical image retrieval and computer-aided diagnosis systems have become popular in recent years to improve knowledge and provide facilities for radiologists. Medical images transferred throughout public networks demand a mechanism that guarantees image privacy, ownership and source of origin reliability, and image integrity verification. For this reason, secure image retrieval and diagnosis scheme have been given considerable interest due to users’ security concerns. This work proposed a secure framework based on a two-dimensional (2D) chaotic map with Diffie–Hellman key exchange protocols to ensure patient information privacy and security. Consequently, from a security and protection perspective, the objective is to provide a privacy procedure for medical image retrieval systems through image encryption technique combined with a secure key exchange procedure to minimize the possibility of secret key interception by an unauthorized person. Simulation results and security analysis show that the suggested technique could protect images with minimal time complexity and a high level of security while also resisting numerous attacks.
S. Cheng, L. Wang and A. Du. “Histopathological image retrieval based on asymmetric residual Hash and DNA coding”. IEEE Access, vol. 7, pp. 101388-101400, 2019.
Z. Xia, L. Lu, T. Qiu, H. J. Shim, X. Chen and B. Jeon. “A privacy-preserving image retrieval based on ac-coefficients and color histograms in cloud environment”. Computers, Materials and Continua, vol. 58, no. 1, pp. 27-43, 2019.
A. M. Badr, Y. Zhang and H. G. A. Umar. “Dual authentication-based encryption with a delegation system to protect medical data in cloud computing”. Electronics, vol. 8, no. 2, pp. 171, 2019.
S. M. Farooq, S. M. S. Hussain, S. Kiran and T. S. Ustun. “Certificate based authentication mechanism for PMU communication networks based on IEC 61850-90-5”. Electronics, vol. 7, p. 370, 2018.
J. Fridrich. Secure Image Ciphering Based on Chaos. Final Report for AFRL, New York, 1997.
J. Fridrich. “Symmetric ciphers based on two-dimensional chaotic maps”. International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259-1284, 2011.
Z. Hua, Y. Zhou and H. Huang. “Cosine-transform-based chaotic system for image encryption”. Information Sciences, vol. 480, pp. 403-419, 2019.
J. A. P. Artiles, D. P. B. Chaves and C. “Pimentel. Image encryption using block cipher and chaotic sequences”. Signal Process Image Communication, vol. 79, pp. 24-31, 2019.
H. Zhu, Y. Zhao and Y. Song. “2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption”. IEEE Access, vol. 7, pp. 14081-14098, 2019.
R. Guesmi, M. A. B. Farah, A. Kachouri and M. Samet. “A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2”. Nonlinear Dynamics, vol. 83, no. 3, pp. 1123-1136, 2015.
M. B. Yassein, S. Aljawarneh, E. Qawasmeh, W. Mardini and Y. Khamayseh. “Comprehensive study of symmetric key and asymmetric key encryption algorithms”. In: Proceeding 2017 International Conference on Engineering and Technology ICET, pp. 1-7, 2017.
R. Hamza, K. Muhammad, A. Kumar and G. “Ramirez-Gonzalez. Hash based encryption for keyframes of diagnostic hysteroscopy”. IEEE Access, vol. 6, pp. 60160-60170, 2018.
Y. Wu, J. P. Noonan, G. Yang and H. Jin. “Image encryption using the two-dimensional logistic chaotic map”. Journal of Electronic Imaging, vol. 21, no. 1, p. 3014, 2012.
A. K. Dhara, S. Mukhopadhyay, A. Dutta, M. Garg and N. Khandelwal. “Content-based image retrieval system for pulmonary nodules: Assisting radiologists in self-learning and diagnosis of lung cancer”. Journal of Digital Imaging, vol. 30, no. 1, pp. 63-77, 2017.
S. M. Farooq, S. M. S. Hussain, S. Kiran and T. S. Ustun. “Certificate based authentication mechanism for PMU communication networks based on IEC 61850-90-5”. Electronics, vol. 7, no. 12, p. 370, 2018.
A. Chopra. “Comparative analysis of key exchange algorithms in cryptography and its implementation”. IMS Manthan (The Journal Innovations), vol. 8, no. 2, 2015.
H. Bodur and R. Kara. “Implementing diffie-hellman key exchange method on logical key hierarchy for secure broadcast transmission”. In: Proceeding 9th International Conference on Computational Intelligence Communications Networks, CICN, pp. 144-147, 2018.
Z. Hua, Y. Zhou, C. M. Pun and C. L. P. Chen. “2D sine logistic modulation map for image encryption”. Information Sciences, vol. 297, pp. 80-94, 2015.
Z. Hua, Y. Zhou and B. Bao. “Two-dimensional sine chaotification system with hardware implementation”. IEEE Transactions on Industrial Informatics, vol. 16, pp. 887-897, 2020.
S. Ibrahim, H. Alhumyani, M. Masud, S. S. Alshamrani, O. Cheikhrouhou, G. Muhammad and A. M. Abbas. “Framework for efficient medical image encryption using dynamic S-boxes and chaotic maps”. IEEE Access, vol. 8, pp. 160433-160449, 2020.
H. J. Jo, S. J. Gotts, R. C. Reynolds, P. A. Bandettini, A. Martin, R. W. Cox and Z. S. Saad. “Effective preprocessing procedures virtually eliminate distance-dependent motion artifacts in resting state FMRI”. Journal of Applied Mathematics, vol. 2013, pp. 935154, 2013.
F. Liu, Y. Wang, F. C. Wang, Y. Z. Zhang and J. Lin. “Intelligent and secure content-based image retrieval for mobile users”. IEEE Access, vol. 7, pp. 119209-119222, 2019.
D. Liu, J. Shen, Z. Xia and X. Sun. A content-based image retrieval scheme using an encrypted difference histogram in cloud computing. Informatics, vol. 8 no. 3, pp. 96, 2017.
W. Lu, A. Varna, A. Swaminathan and M. Wu. “Secure image retrieval through feature protection”. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. ICASSP, Taiwan, 2009.
M. A. Al Sibahee, S. Lu, Z. A. Abduljabbar, A. Ibrahim, Z. A. Hussien, K. A. A. Mutlaq and M. A. Hussain. “Efficient encrypted image retrieval in IoT-cloud with multi-user authentication”. International Journal of Distributed Sensor Networks, vol. 14, 2018.
M. T. Gaata MT and F. F. Hantoosh. “Encrypted image retrieval system based on features analysis”. Al-Mustansiriyah Journal of Sciences, vol. 28, no. 3, pp. 166-173, 2017.
Z. Xia, Y. Zhu, X. Sun and J. Wang. “A similarity search scheme over encrypted cloud images based on secure transformation”. International Journal of Future Generation Communication and Networking, vol. 6, no. 6, pp. 71-80, 2013.
M. N. Bhagat and P. B. B. Gite. “Image retrieval using sparse codewords with cryptography for enhanced security”. IOSR Journal of Computer Engineering, vol. 16, no. 2, pp. 22-26, 2014.
J. B. Lima, F. Madeiro and F. J. R. Sales. “Encryption of medical images based on the cosine number transform”. Signal Process Image Communication, vol. 35, pp. 1-8, 2015.
L. Huang, S. Wang, J. Xiang and Y. Sun. “Chaotic color image encryption scheme using deoxyribonucleic acid (DNA) coding calculations and arithmetic over the galois field”. Mathematical Problems in Engineering, vol. 2020, pp. 1-2, 2022.
Z. Hua, S. Yi and Y. Zhou. “Medical image encryption using high-speed scrambling and pixel adaptive diffusion”. Signal Processing, vol. 144, pp. 134-144, 2018.
Y. Chen, C. Tang and R. Ye. “Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion”. Signal Processing, vol. 167, pp. 107286, 2020.
M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou. “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption”. IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 131-143, 2013.
H. Liu, B. Zhao, J. Zou, L. Huang, Y. Liu. “A lightweight image encryption algorithm based on message passing and chaotic map”. Security and Communication Networks, vol. 2004, no. 4, 2020.
Copyright (c) 2022 Shakhawan H. Wady, Raghad Z. Yousif
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.