Skip to main content
Log in

Edge-based lightweight selective encryption scheme for digital medical images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Securing digital medical images is increasingly becoming a major concern due to the rapid growth of the amount of medical images transferred over a network and stored on the web servers. However, the enormous size of multimedia and the huge volume of exchanging medical images have motivated the development of low computational complexity methods. This paper presents a lightweight selective encryption scheme to encrypt the edge maps of medical images. The edge map is firstly extracted by an edge detection method. Then, a chaotic map is used to generate a large key space. We propose a one-time pad algorithm to respectively encrypt the significant detected image blocks. The experimental results have proven that the proposed encryption scheme provides an acceptable percentage of encrypted image data. It can also effectively perform image encryption and decryption in a lightweight manner, which makes the scheme a good candidate for real time applications. Moreover, the security analysis demonstrates that our scheme has a robust resistance against various security attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abdmouleh, MK, Khalfallah, A, and Bouhlel, MS (2017). A novel selective encryption dwt-based algorithm for medical images. In 2017 14th International Conference on Computer Graphics, Imaging and Visualization, pages 79–84. IEEE

  2. Akkasaligar PT, Biradar S (2020) Selective medical image encryption using dna cryptography. Information Security Journal: A Global Perspective 29(2):91–101

    Google Scholar 

  3. AlShaikh M, Laouamer L, Nana L, Pascu AC (2017) Efficient and robust encryption and watermarking technique based on a new chaotic map approach. Multimed Tools Appl 76(6):8937–8950

    Article  Google Scholar 

  4. Bhatnagar G, Wu QJ (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digital signal processing 22(4):648–663

    Article  MathSciNet  Google Scholar 

  5. Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96–109

    Article  Google Scholar 

  6. Chabaud F, Vaudenay S (1994) Links between differential and linear cryptanalysis. In: Workshop on the Theory and Application of of Cryptographic Techniques. Springer, pp 356–365

  7. Chen L, Wang S (2015) Di_erential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 65:69–75

    Article  Google Scholar 

  8. Darwish SM (2019) A modifed image selective encryption-compression technique based on 3d chaotic maps and arithmetic coding. Multimed Tools Appl 78(14):19229–19252

    Article  Google Scholar 

  9. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419

    Article  Google Scholar 

  10. Huynh-Thu Q, Ghanbari M (2008) Scope of validity of psnr in image/video quality assessment. Electron Lett 44(13):800–801

    Article  Google Scholar 

  11. Jain B, Taylor A (2003) Cross-correlation tomography: measuring dark energy evolution with weak lensing. Phys Rev Lett 91(14):141302

    Article  Google Scholar 

  12. Juels A, Weis SA (2005) Authenticating pervasive devices with human protocols. In: Annual international cryptology conference. Springer, pp 293–308

  13. Kar M, Kumar A, Nandi D, Mandal M (2020) Image encryption using dna coding and hyperchaotic system. IETE Tech Rev 37(1):12–23

    Article  Google Scholar 

  14. Khan JS, Ahmad J (2019) Chaos based e_cient selective image encryption. Multidim Syst Sign Process 30(2):943–961

    Article  Google Scholar 

  15. Khan MA, Ahmad J, Javaid Q, Saqib NA (2017) An e_cient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. J Mod Opt 64(5):531–540

    Article  Google Scholar 

  16. Khashan OA, Khafajah NM (2018) Secure stored images using transparent crypto filter driver. IJ Network Security 20(6):1053–1060

    Google Scholar 

  17. Khashan OA, Zin AM (2013) An efficient adaptive of transparent spatial digital image encryption. Procedia technology 11:288–297

    Article  Google Scholar 

  18. Khashan OA, Zin AM, Sundararajan EA (2014) Performance study of selective encryption in comparison to full encryption for still visual images. Journal of Zhejiang University SCIENCE C 15(6):435–444

    Article  Google Scholar 

  19. Khashan OA, Zin AM, Sundararajan EA (2015) Imgfs: a transparent cryptography for stored images using a filesystem in userspace. Frontiers of Information Technology & Electronic Engineering 16(1):28–42

    Article  Google Scholar 

  20. Krishnamoorthi R, Murali P (2017) A selective image encryption based on square-wave shu_ing with orthogonal polynomials transformation suitable for mobile devices. Multimed Tools Appl 76(1):1217–1246

    Article  Google Scholar 

  21. Kulsoom A, Xiao D, Abbas SA et al (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and dna complementary rules. Multimed Tools Appl 75(1):1–23

    Article  Google Scholar 

  22. Laouamer L, AlShaikh M, Nana L, Pascu AC (2015) Robust watermarking scheme and tamper detection based on threshold versus intensity. Journal of Innovation in Digital Ecosystems 2(1–2):1–12

    Article  Google Scholar 

  23. Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333–354

    Article  Google Scholar 

  24. Li C, Lin D, Feng B, Lu J, Hao F (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834–75842

    Article  Google Scholar 

  25. Liao X, Yin J, Guo S, Li X, Sangaiah AK (2018) Medical jpeg image steganography based on preserving inter-block dependencies. Comput Electr Eng 67:320–329

    Article  Google Scholar 

  26. Liu H, Wang X, Kadir A (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Article  Google Scholar 

  27. Liu, Y, Ma, Z, Liu, X, Ma, S, and Ren, K (2019). Privacy-preserving object detection for medical images with faster r-cnn. IEEE Trans Inf Forensics Secur, 1

  28. Mou, J, Yang, F, Chu, R, and Cao, Y\ (2019). Image compression and encryption algorithm based on hyper-chaotic map. Mobile Networks and Applications, pages 1-13

  29. Moumen A, Bouye M, Sissaoui H (2015) New secure partial encryption method for medical images using graph coloring problem. Nonlinear Dynamics 82(3):1475–1482

    Article  MathSciNet  Google Scholar 

  30. Noura M, Noura H, Chehab A, Mansour MM, Sleem L, Couturier R (2018) A dynamic approach for a lightweight and secure cipher for medical images. Multimed Tools Appl 77(23):31397–31426

    Article  Google Scholar 

  31. Pavithra, V and Chandrasekaran, J. (2020). Developing security solutions for telemedicine applications: medical image encryption and watermarking. In Smart Medical Data Sensing and IoT Systems Design in Healthcare, pages 76–96. IGI Global

  32. Prabhu P, Manjunath K (2019) Secured transmission of medical images in radiology using aes technique. In: Computer Aided Intervention and Diagnostics in Clinical and Medical Images. Springer, pp 103–112

  33. Prewitt JM (1970) Object enhancement and extraction. Picture processing and Psychopictorics 10(1):15–19

    Google Scholar 

  34. Rehman A u, Liao X, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and dna complementary rules. Multimed Tools Appl 74(13):4655–4677

    Article  Google Scholar 

  35. Riad K, Hamza R, Yan H (2019) Sensitive and energetic iot access control for managing cloud electronic health records. IEEE Access 7:86384–86393

    Article  Google Scholar 

  36. Som S, Mitra A, Palit S, Chaudhuri B (2019) A selective bitplane image encryption scheme using chaotic maps. Multimed Tools Appl 78(8):10373–10400

    Article  Google Scholar 

  37. Steinebach M, Petitcolas FA, Raynal F, Dittmann J, Fontaine C, Seibel S, Fates N, Ferri LC (2001) Stirmark benchmark: audio watermarking attacks. In: Proceedings international conference on information technology: coding and computing. IEEE, pp 49–54

  38. Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image encryption with double spiral scans and chaotic maps. Security and Communication Networks 2019:1–15

    Google Scholar 

  39. Tong X, Zhang M, Wang Z (2015) A new image encryption algorithm based on the high-dimensional chaotic map. The Imaging Science Journal 63(5):263–272

    Article  Google Scholar 

  40. Ullah I, Iqbal W, Masood A (2013) Selective region based images encryption. In: 2013 2nd National conference on information assurance (NCIA), pages 125–128. IEEE

  41. Wang L-T, Hoover NE, Porter EH, Zasio JJ (1987) Ssim: a software levelized compiled-code simulator. In: Proceedings of the 24th ACM/IEEE Design Automation Conference, pages 2-8. ACM

  42. Wen W, Zhang Y, Fang Z, Chen J-X (2015) Infrared targetbased selective encryption by chaotic maps. Opt Commun 341:131–139

    Article  Google Scholar 

  43. Wilks DS (2011) Statistical methods in the atmospheric sciences, volume 100. Academic press

  44. Wolf A, Swift JB, Swinney HL, Vastano JA (1985) Determining lyapunov exponents from a time series. Physica D: Nonlinear Phenomena 16(3):285–317

    Article  MathSciNet  Google Scholar 

  45. Wu Y, Noonan JP, Agaian S et al (2011) Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38

    Google Scholar 

  46. Wu L, Xu Z, He D, Wang X (2018) New certi_cateless aggregate signature scheme for healthcare multimedia social network on cloud environment. Security and Communication Networks 2018:1–13

    Google Scholar 

  47. Zhang Y, Xiao D, Wen W, Tian Y (2013) Edge-based lightweight image encryption using chaos-based reversible hidden transform and multipleorder discrete fractional cosine transform. Opt Laser Technol 54:1–6

    Article  Google Scholar 

  48. Zhang L-B, Zhu Z-L, Yang B-Q, Liu W-Y, Zhu H-F, Zou M-Y (2015) Cryptanalysis and improvement of an e_cient and secure medical image protection scheme. Math Probl Eng 2015

  49. Zhou Y, Panetta K, Agaian S (2009) A lossless encryption method for medical images using edge maps. In: 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pages 3707–3710. IEEE

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama A. Khashan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khashan, O.A., AlShaikh, M. Edge-based lightweight selective encryption scheme for digital medical images. Multimed Tools Appl 79, 26369–26388 (2020). https://doi.org/10.1007/s11042-020-09264-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09264-z

Keywords

Navigation