Abstract
Since medical images include sensitive patient information, security is the top priority during transmission. In addition to protecting patient data from potential criminals, security helps to confirm the field staff’s identity. However, many medical institutions still need to adopt advanced security measures. In this paper, a new dual encryption method is proposed that implements blowfish and signcryption in a certificateless generalized form. The proposed method has an advantage over other methods due to its computational cost-effectiveness and speed. The performance measurements used to assess a proposed strategy’s effectiveness are PSNR, entropy, MSE, correlation coefficient (CC), and time taken. We obtain a high PSNR value of 57.72 and a low time requirement of 42 seconds on average. Combining blowfish and certificateless signcryption iTqnto one double encryption scheme that is computationally secure, fast, and easy to implement. It would help push hospitals toward a cost-effective image security environment.
Similar content being viewed by others
Data Availability
The datasets analysed during the current study are publicly available and can be accessed using https://www.kaggle.com/
References
Kermany DS, Goldbaum M, Cai W, Valentim CC, Liang H, Baxter SL, McKeown A, Yang G, Wu X, Yan F, et al. (2018) Identifying medical diagnoses and treatable diseases by image-based deep learning. Cell 172(5):1122–1131
Siyal AA, Junejo AZ, Zawish M, Ahmed K, Khalil A, Soursou G (2019) Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives. Cryptography 3(1):3
Azam MA, Khan KB, Salahuddin S, Rehman E, Khan SA, Khan MA, Kadry S, Gandomi AH (2022) A review on multimodal medical image fusion: Compendious analysis of medical modalities, multimodal databases, fusion techniques and quality metrics. Comput Biol Med 144:105253
Razzak MI, Naz S, Zaib A (2018) Deep learning for medical image processing: overview, challenges and the future. Classification in BioApps 26:323–350
Kaissis GA, Makowski MR, Ru̇ckert D, Braren RF (2020) Secure, privacy-preserving and federated machine learning in medical imaging. Nature Mach Intell 2(6):305–311
Thapa C, Camtepe S (2021) Precision health data: Requirements, challenges and existing techniques for data security and privacy. Comput Biol Med 129:104130
Lv Z, Piccialli F (2021) The security of medical data on internet based on differential privacy technology. ACM Trans Internet Technol 21(3):1–18
Dai Y, Lee J, Mennink B, Steinberger J (2014) The security of multiple encryption in the ideal cipher model. In: Annual Cryptology Conference, pp. 20–38. Springer
Jiao S, Lei T, Gao Y, Xie Z, Yuan X (2019) Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging. IEEE Access 7:119557–119565
Noh J, Kwon Y, Son J, Cho S (2022) Blockchain-based one-time authentication for secure v2x communication against insiders and authority compromise attacks. IEEE Internet Things J
Zheng Y (1997) Digital signcryption or how to achieve cost (signature and encryption) cost (signature)+ cost (encryption). In: Annual International Cryptology Conference, pp. 165–179. Springer
Kofahi NA, Al-Somani T, Al-Zamil K (2003) Performance evaluation of three encryption/decryption algorithms. In: 2003 46th Midwest Symposium on Circuits and Systems, vol. 2, pp. 790–793. IEEE
Du J, Sheng L, Xu Y, Chen Q, Gu C, Li M, Zhang SX-A (2021) Printable off–on thermoswitchable fluorescent materials for programmable thermally controlled full-color displays and multiple encryption. Adv Mater 33(20):2008055
Dodis Y, Katz J (2005) Chosen-ciphertext security of multiple encryption. In: Theory of Cryptography Conference, pp. 188–209. Springer
Wu Z, Xuan S, Xie J, Lin C, Lu C (2022) How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective. Comput Biol Med 105726:147
Wu Z, Shen S, Lian X, Su X, Chen E (2020) A dummy-based user privacy protection approach for text information retrieval. Knowl-Based Syst 105679:195
Shen Y, Shen S, Wu Z, Zhou H, Yu S (2022) Signaling game-based availability assessment for edge computing-assisted iot systems with malware dissemination. J Inf Security and Applications 103140:66
Qu Y, Zeng J (2022) Certificateless proxy signcryption in the standard model for a uav network. IEEE Internet Things J
Ali TS, Ali R (2020) A novel medical image signcryption scheme using tlts and henon chaotic map. IEEE Access 8:71974–71992
Zhou C, Zhao Z, Zhou W, Mei Y (2017) Certificateless key-insulated generalized signcryption scheme without bilinear pairings. Security and Communication Networks 2017(3):1–17
Selvi CT, Amudha J, Sudhakar R (2021) A modified salp swarm algorithm (ssa) combined with a chaotic coupled map lattices (cml) approach for the secured encryption and compression of medical images during data transmission. Biomed Signal Process Control 66:102465
Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855–37865
Shankar K, Elhoseny M, Chelvi ED, Lakshmanaprabu S, Wu W (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145–77154
Shafique A, Ahmed J, Rehman MU, Hazzazi MM (2021) Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain. IEEE Access 9:59108–59130
Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu S, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):1–11
Acknowledgements
The research was funded by the Ministry of Education, Government of India, using a grant from Indian Institute of Technology Roorkee (Grant No: OH-31-24-200-428)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethics approval and consent to participate
This article does not contain any of the authors’ research involving humans or animals.
Conflict of Interests
There were no potential conflicts of interests/competing interests revealed by the authors.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Kishore Babu Nampalle and Shriansh Manhas are contributed equally to this work.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Nampalle, K.B., Manhas, S. & Raman, B. Medical image security and authenticity via dual encryption. Appl Intell 53, 20647–20659 (2023). https://doi.org/10.1007/s10489-023-04550-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-023-04550-3