Skip to main content
Log in

Medical image security and authenticity via dual encryption

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Since medical images include sensitive patient information, security is the top priority during transmission. In addition to protecting patient data from potential criminals, security helps to confirm the field staff’s identity. However, many medical institutions still need to adopt advanced security measures. In this paper, a new dual encryption method is proposed that implements blowfish and signcryption in a certificateless generalized form. The proposed method has an advantage over other methods due to its computational cost-effectiveness and speed. The performance measurements used to assess a proposed strategy’s effectiveness are PSNR, entropy, MSE, correlation coefficient (CC), and time taken. We obtain a high PSNR value of 57.72 and a low time requirement of 42 seconds on average. Combining blowfish and certificateless signcryption iTqnto one double encryption scheme that is computationally secure, fast, and easy to implement. It would help push hospitals toward a cost-effective image security environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4

Similar content being viewed by others

Data Availability

The datasets analysed during the current study are publicly available and can be accessed using https://www.kaggle.com/

References

  1. Kermany DS, Goldbaum M, Cai W, Valentim CC, Liang H, Baxter SL, McKeown A, Yang G, Wu X, Yan F, et al. (2018) Identifying medical diagnoses and treatable diseases by image-based deep learning. Cell 172(5):1122–1131

    Article  Google Scholar 

  2. Siyal AA, Junejo AZ, Zawish M, Ahmed K, Khalil A, Soursou G (2019) Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives. Cryptography 3(1):3

    Article  Google Scholar 

  3. Azam MA, Khan KB, Salahuddin S, Rehman E, Khan SA, Khan MA, Kadry S, Gandomi AH (2022) A review on multimodal medical image fusion: Compendious analysis of medical modalities, multimodal databases, fusion techniques and quality metrics. Comput Biol Med 144:105253

    Article  Google Scholar 

  4. Razzak MI, Naz S, Zaib A (2018) Deep learning for medical image processing: overview, challenges and the future. Classification in BioApps 26:323–350

    Article  Google Scholar 

  5. Kaissis GA, Makowski MR, Ru̇ckert D, Braren RF (2020) Secure, privacy-preserving and federated machine learning in medical imaging. Nature Mach Intell 2(6):305–311

    Article  Google Scholar 

  6. Thapa C, Camtepe S (2021) Precision health data: Requirements, challenges and existing techniques for data security and privacy. Comput Biol Med 129:104130

    Article  Google Scholar 

  7. Lv Z, Piccialli F (2021) The security of medical data on internet based on differential privacy technology. ACM Trans Internet Technol 21(3):1–18

    Article  Google Scholar 

  8. Dai Y, Lee J, Mennink B, Steinberger J (2014) The security of multiple encryption in the ideal cipher model. In: Annual Cryptology Conference, pp. 20–38. Springer

  9. Jiao S, Lei T, Gao Y, Xie Z, Yuan X (2019) Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging. IEEE Access 7:119557–119565

    Article  Google Scholar 

  10. Noh J, Kwon Y, Son J, Cho S (2022) Blockchain-based one-time authentication for secure v2x communication against insiders and authority compromise attacks. IEEE Internet Things J

  11. Zheng Y (1997) Digital signcryption or how to achieve cost (signature and encryption) cost (signature)+ cost (encryption). In: Annual International Cryptology Conference, pp. 165–179. Springer

  12. Kofahi NA, Al-Somani T, Al-Zamil K (2003) Performance evaluation of three encryption/decryption algorithms. In: 2003 46th Midwest Symposium on Circuits and Systems, vol. 2, pp. 790–793. IEEE

  13. Du J, Sheng L, Xu Y, Chen Q, Gu C, Li M, Zhang SX-A (2021) Printable off–on thermoswitchable fluorescent materials for programmable thermally controlled full-color displays and multiple encryption. Adv Mater 33(20):2008055

    Article  Google Scholar 

  14. Dodis Y, Katz J (2005) Chosen-ciphertext security of multiple encryption. In: Theory of Cryptography Conference, pp. 188–209. Springer

  15. Wu Z, Xuan S, Xie J, Lin C, Lu C (2022) How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective. Comput Biol Med 105726:147

    Google Scholar 

  16. Wu Z, Shen S, Lian X, Su X, Chen E (2020) A dummy-based user privacy protection approach for text information retrieval. Knowl-Based Syst 105679:195

    Google Scholar 

  17. Shen Y, Shen S, Wu Z, Zhou H, Yu S (2022) Signaling game-based availability assessment for edge computing-assisted iot systems with malware dissemination. J Inf Security and Applications 103140:66

    Google Scholar 

  18. Qu Y, Zeng J (2022) Certificateless proxy signcryption in the standard model for a uav network. IEEE Internet Things J

  19. Ali TS, Ali R (2020) A novel medical image signcryption scheme using tlts and henon chaotic map. IEEE Access 8:71974–71992

    Article  Google Scholar 

  20. Zhou C, Zhao Z, Zhou W, Mei Y (2017) Certificateless key-insulated generalized signcryption scheme without bilinear pairings. Security and Communication Networks 2017(3):1–17

    Google Scholar 

  21. Selvi CT, Amudha J, Sudhakar R (2021) A modified salp swarm algorithm (ssa) combined with a chaotic coupled map lattices (cml) approach for the secured encryption and compression of medical images during data transmission. Biomed Signal Process Control 66:102465

    Article  Google Scholar 

  22. Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855–37865

    Article  Google Scholar 

  23. Shankar K, Elhoseny M, Chelvi ED, Lakshmanaprabu S, Wu W (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145–77154

    Article  Google Scholar 

  24. Shafique A, Ahmed J, Rehman MU, Hazzazi MM (2021) Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain. IEEE Access 9:59108–59130

    Article  Google Scholar 

  25. Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu S, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):1–11

    Article  Google Scholar 

Download references

Acknowledgements

The research was funded by the Ministry of Education, Government of India, using a grant from Indian Institute of Technology Roorkee (Grant No: OH-31-24-200-428)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kishore Babu Nampalle.

Ethics declarations

Ethics approval and consent to participate

This article does not contain any of the authors’ research involving humans or animals.

Conflict of Interests

There were no potential conflicts of interests/competing interests revealed by the authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Kishore Babu Nampalle and Shriansh Manhas are contributed equally to this work.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nampalle, K.B., Manhas, S. & Raman, B. Medical image security and authenticity via dual encryption. Appl Intell 53, 20647–20659 (2023). https://doi.org/10.1007/s10489-023-04550-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-023-04550-3

Keywords

Navigation