Skip to main content
Log in

A dual layer security scheme for medical images using Hessenberg and singular value decompositions

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

A Correction to this article was published on 13 April 2022

This article has been updated

Abstract

Due to the recent advancement in the field of the Internet of Medical things (IoMT). To facilitate doctors and patients, in the process of diagnosis and treatment, the medical imaging equipment is connected to the IoMT. During communication over the network, these medical images are subjected to various threads. In this work, we have proposed a dual-layer data confidentiality scheme, firstly it encrypts the secret medical images followed by a data hiding scheme. The encryption scheme possesses diffusion and confusion, for confusion the encryption scheme utilizes logistic and tent maps for the generation of S-boxes. For data hiding, it utilizes Hessenberg and singular value decomposition (SVD). The proposed scheme is applied to highly correlated medical images. The proposed technique provides dual security to the confidential information and makes it difficult for the intruder to extract the confidential information. The encryption scheme is evaluated by using the standard performance indicators including statistical analysis, differential analysis, and NIST analysis, etc. The encrypted images have the highest practically achievable entropy of 7.999 which is closest to the ideal value of 8. The data hiding scheme is evaluated by using statistical analysis, Distance-based analysis, analysis based on pixel difference, and information theory. Both the analysis of encryption and data hiding are satisfactory and the results show the strength of the dual-layer security scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Change history

References

  1. Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In international conference on research in security standardisation

  2. Alanazi AS (2021) A dual layer secure data encryption and hiding scheme for color images using the three-dimensional chaotic map and Lah transformation. IEEE Access 9:26583–26592

    Article  Google Scholar 

  3. Alanazi N, Khan E, Gutub A (2020) Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimed Tools Appl 80:1403–1431

    Article  Google Scholar 

  4. Alghafis A, Firdousi F, Khan M, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Math Comput Simul 177:441–466

    Article  MathSciNet  Google Scholar 

  5. Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl 78:32585–32604

    Article  Google Scholar 

  6. Alvarez G, Li S (2006) Some basic cryptographic requirements for Chaos-based cryptosystems. Int J Bifurcation Chaos 16(8):2129–2151

    Article  MathSciNet  Google Scholar 

  7. Arshad U, Khan M, Shaukat S, Amin M, Shah T (2020) An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation. Phys A Stat Mech Appl 546

  8. Batool SI, Shah T, Khan M (2014) A color image watermarking scheme based on affine transformation and S4 permutation. Neural Comput Appl 25(7):2037–2045

    Article  Google Scholar 

  9. Chen J-J, Zou H, Meng W-H, Zhan Y-F, Yu Y-W, Fu C (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378

    Article  Google Scholar 

  10. Farah MAB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn 99:3041–3064

    Article  Google Scholar 

  11. Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three dimensional brownian motion. Multimed Tools Appl 77:27919–27953

    Article  Google Scholar 

  12. He YI, Zhang YQ, Wang XY (2020) A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput Applic 32:247–260

    Article  Google Scholar 

  13. Jamal SS, Shah T, Attaullah A (2017) A group action method for construction of strong substitution box. 3D research

  14. Jamal SS, Shah T, Farwa S, Khan MU (2019) A new technique of frequency domain watermarking based on a local ring. Wirel Netw 25(4):1491–1503

    Article  Google Scholar 

  15. Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 43:15–27

    Article  MathSciNet  Google Scholar 

  16. Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 15-43:27

    MathSciNet  Google Scholar 

  17. Khade PN, Narnaware M (2012) 3D chaotic functions for image encryption. IJCSI Int J Comput Sci 9(3):323–328

    Google Scholar 

  18. Khalid I, Jamal SS, Shah T, Shah D, Hazzazi MM (2021) A novel scheme of image encryption based on elliptic curves isomorphism and substitution boxes. IEEE Access 9:77798–77810

    Article  Google Scholar 

  19. Khan M (2015) A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dyn 82:527–533

    Article  MathSciNet  Google Scholar 

  20. Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput & Applic 29:993–999

    Article  Google Scholar 

  21. Khan S, Han L, Lu HI, Butt KK, Bachira G, Khan NU (2019) A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI. IEEE Access 7:81333–81350

    Article  Google Scholar 

  22. Khan M, Jamal SS, Waqas UA (2020) A novel combination of information hiding and confidentiality scheme. Multimed Tools Appl 79:30983–31005

    Article  Google Scholar 

  23. Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 358:26203–26222

    Article  Google Scholar 

  24. Khan M, Masood F, Alghafis A (2020) Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system. Neural Comput & Applic 32:11837–11857

    Article  Google Scholar 

  25. Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76:377–382

    Article  MathSciNet  Google Scholar 

  26. Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput Appl 27:677–685

    Article  Google Scholar 

  27. Khan M, Shah T, Batool SI (2017) A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimedia Tools Appl 76:24027–24062

    Article  Google Scholar 

  28. Khan M, Shah T, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73:1795–1801

    Article  MathSciNet  Google Scholar 

  29. Liu Z, Wu C, Wang J, Hu Y (2019) A color image encryption using dynamic DNA and 4-D memristive hyper-chaos. IEEE Access 7:7836778378

    Google Scholar 

  30. Ma S, Zhang Y, Yang Z, Hu J (2019) A new pliantext-related image encryption scheme based on chaotic sequence. IEEE Access 7:30344–30360

    Article  Google Scholar 

  31. Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on Julia set of fractals and 3D Lorenz chaotic map. Entropy 22:274

    Article  MathSciNet  Google Scholar 

  32. Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm. Exp Syst Appl Int J 41:7858–7867

    Article  Google Scholar 

  33. Özkaynak F (2020) On the effect of chaotic system in performance characteristics of chaos based s-box designs. Phys A Stat Mech Appl 550:124072

    Article  Google Scholar 

  34. Rukhin A, JuanSoto J, Nechvata J A statistical test suite for random and pseudorandom number generators for cryptographic applications

  35. Run RS, Horng SJ, Lai J-L, Kao TW (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689

    Article  Google Scholar 

  36. Said L, Hazzazi MM, Khan M, Jamal SS (2021) A novel image encryption based on rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes. Chin J Phys 72:558–574

    Article  MathSciNet  Google Scholar 

  37. Tanyildizi E, Özkaynak F (2019) A New Chaotic S-Box Generation Method Using Parameter Optimization of One Dimensional Chaotic Maps. IEEE Access 7:117829–117838

    Article  Google Scholar 

  38. Unkaševi’c T, Banjac Z, Milosavljevi’c M (2019) A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments. Sensors 19:5322

    Article  Google Scholar 

  39. Waqas UA, Khan M, Batool SI (2020) A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimedia Tools Appl 79:6891–6914

    Article  Google Scholar 

  40. Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913

    Article  Google Scholar 

  41. Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Opt Int J Light Electron Opt 124(18):3596–3600

    Article  Google Scholar 

  42. Zhang LY, Hu X, Liu Y, Wong K-W A chaotic image encryption scheme owning temp-value feedback. Cornell Univ J

Download references

Acknowledgements

The first author (Dr. Ahmed Elmorsy) would like to thank Deanship of Scientific Research at Majmaah University for supporting this work under Project Number R-2021-107.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original online version of this article was revised: The name of fourth author was wrong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elmoasry, A., Khan, L.S., Khan, M. et al. A dual layer security scheme for medical images using Hessenberg and singular value decompositions. Multimed Tools Appl 81, 14001–14022 (2022). https://doi.org/10.1007/s11042-022-12480-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12480-4

Keywords

Navigation