Abstract
Due to the recent advancement in the field of the Internet of Medical things (IoMT). To facilitate doctors and patients, in the process of diagnosis and treatment, the medical imaging equipment is connected to the IoMT. During communication over the network, these medical images are subjected to various threads. In this work, we have proposed a dual-layer data confidentiality scheme, firstly it encrypts the secret medical images followed by a data hiding scheme. The encryption scheme possesses diffusion and confusion, for confusion the encryption scheme utilizes logistic and tent maps for the generation of S-boxes. For data hiding, it utilizes Hessenberg and singular value decomposition (SVD). The proposed scheme is applied to highly correlated medical images. The proposed technique provides dual security to the confidential information and makes it difficult for the intruder to extract the confidential information. The encryption scheme is evaluated by using the standard performance indicators including statistical analysis, differential analysis, and NIST analysis, etc. The encrypted images have the highest practically achievable entropy of 7.999 which is closest to the ideal value of 8. The data hiding scheme is evaluated by using statistical analysis, Distance-based analysis, analysis based on pixel difference, and information theory. Both the analysis of encryption and data hiding are satisfactory and the results show the strength of the dual-layer security scheme.
Similar content being viewed by others
Change history
13 April 2022
A Correction to this paper has been published: https://doi.org/10.1007/s11042-022-12969-y
References
Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In international conference on research in security standardisation
Alanazi AS (2021) A dual layer secure data encryption and hiding scheme for color images using the three-dimensional chaotic map and Lah transformation. IEEE Access 9:26583–26592
Alanazi N, Khan E, Gutub A (2020) Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimed Tools Appl 80:1403–1431
Alghafis A, Firdousi F, Khan M, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Math Comput Simul 177:441–466
Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl 78:32585–32604
Alvarez G, Li S (2006) Some basic cryptographic requirements for Chaos-based cryptosystems. Int J Bifurcation Chaos 16(8):2129–2151
Arshad U, Khan M, Shaukat S, Amin M, Shah T (2020) An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation. Phys A Stat Mech Appl 546
Batool SI, Shah T, Khan M (2014) A color image watermarking scheme based on affine transformation and S4 permutation. Neural Comput Appl 25(7):2037–2045
Chen J-J, Zou H, Meng W-H, Zhan Y-F, Yu Y-W, Fu C (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378
Farah MAB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn 99:3041–3064
Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three dimensional brownian motion. Multimed Tools Appl 77:27919–27953
He YI, Zhang YQ, Wang XY (2020) A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput Applic 32:247–260
Jamal SS, Shah T, Attaullah A (2017) A group action method for construction of strong substitution box. 3D research
Jamal SS, Shah T, Farwa S, Khan MU (2019) A new technique of frequency domain watermarking based on a local ring. Wirel Netw 25(4):1491–1503
Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 43:15–27
Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 15-43:27
Khade PN, Narnaware M (2012) 3D chaotic functions for image encryption. IJCSI Int J Comput Sci 9(3):323–328
Khalid I, Jamal SS, Shah T, Shah D, Hazzazi MM (2021) A novel scheme of image encryption based on elliptic curves isomorphism and substitution boxes. IEEE Access 9:77798–77810
Khan M (2015) A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dyn 82:527–533
Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput & Applic 29:993–999
Khan S, Han L, Lu HI, Butt KK, Bachira G, Khan NU (2019) A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI. IEEE Access 7:81333–81350
Khan M, Jamal SS, Waqas UA (2020) A novel combination of information hiding and confidentiality scheme. Multimed Tools Appl 79:30983–31005
Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 358:26203–26222
Khan M, Masood F, Alghafis A (2020) Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system. Neural Comput & Applic 32:11837–11857
Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76:377–382
Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput Appl 27:677–685
Khan M, Shah T, Batool SI (2017) A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimedia Tools Appl 76:24027–24062
Khan M, Shah T, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73:1795–1801
Liu Z, Wu C, Wang J, Hu Y (2019) A color image encryption using dynamic DNA and 4-D memristive hyper-chaos. IEEE Access 7:7836778378
Ma S, Zhang Y, Yang Z, Hu J (2019) A new pliantext-related image encryption scheme based on chaotic sequence. IEEE Access 7:30344–30360
Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on Julia set of fractals and 3D Lorenz chaotic map. Entropy 22:274
Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm. Exp Syst Appl Int J 41:7858–7867
Özkaynak F (2020) On the effect of chaotic system in performance characteristics of chaos based s-box designs. Phys A Stat Mech Appl 550:124072
Rukhin A, JuanSoto J, Nechvata J A statistical test suite for random and pseudorandom number generators for cryptographic applications
Run RS, Horng SJ, Lai J-L, Kao TW (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689
Said L, Hazzazi MM, Khan M, Jamal SS (2021) A novel image encryption based on rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes. Chin J Phys 72:558–574
Tanyildizi E, Özkaynak F (2019) A New Chaotic S-Box Generation Method Using Parameter Optimization of One Dimensional Chaotic Maps. IEEE Access 7:117829–117838
Unkaševi’c T, Banjac Z, Milosavljevi’c M (2019) A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments. Sensors 19:5322
Waqas UA, Khan M, Batool SI (2020) A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimedia Tools Appl 79:6891–6914
Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913
Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Opt Int J Light Electron Opt 124(18):3596–3600
Zhang LY, Hu X, Liu Y, Wong K-W A chaotic image encryption scheme owning temp-value feedback. Cornell Univ J
Acknowledgements
The first author (Dr. Ahmed Elmorsy) would like to thank Deanship of Scientific Research at Majmaah University for supporting this work under Project Number R-2021-107.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original online version of this article was revised: The name of fourth author was wrong.
Rights and permissions
About this article
Cite this article
Elmoasry, A., Khan, L.S., Khan, M. et al. A dual layer security scheme for medical images using Hessenberg and singular value decompositions. Multimed Tools Appl 81, 14001–14022 (2022). https://doi.org/10.1007/s11042-022-12480-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12480-4