Skip to main content

Advertisement

Log in

A hybrid crypto-compression model for secure brain mri image transmission

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Medical image encryption is a major issue in healthcare applications where memory, energy, and computational resources are constrained. The modern technological architecture of digital healthcare systems is, in fact, insufficient to handle both the current and future requirements for data. Security has been raised to the highest priority. By meeting these conditions, the hybrid crypto-compression technique introduced in this study can be used for securing the transfer of healthcare images. The approach consists of two components. In order to construct a cutting-edge generative lossy compression system, we first combine generative adversarial networks (GANs) with oearned compression. As a result, the second phase might address this problem by using highly effective picture cryptography techniques. A randomly generated public key is subjected to the DNA technique. In this application, pseudo-random bits are produced by using a logistic chaotic map algorithm. During the substitution process, an additional layer of security is provided to boost the technique’s fault resilience. Our proposed system and security investigations show that the method provides trustworthy and long-lasting encryption and several multidimensional aspects that have been discovered in various public health and healthcare issues. As a result, the recommended hybrid crypto-compression technique may significantly reduce a photo’s size and remain safe enough to be used for medical image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

Authors declare that all the data being used in the design and production cum layout of the manuscript is declared in the manuscript.

References

  1. Agustsson E, Tschannen M, Mentzer F, Timofte R, Gool LV (2019) Generative adversarial networks for extreme learned image compression. In: Proceedings of the IEEE/CVF International conference on computer vision, pp 221–231

  2. Ahmad I, Shin S (2021) A novel hybrid image encryption-compression scheme by combining chaos theory and number theory. Signal Process: Image Commun 98:116418

    Google Scholar 

  3. Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and aes algorithm. J Supercomput 75:6663–6682

    Article  Google Scholar 

  4. Berghel H (2017) Equifax and the latest round of identity theft roulette. Comput 50(12):72–76

    Article  Google Scholar 

  5. Boivin A, Lehoux P, Lacombe R, Burgers J, Grol R (2014) Involving patients in setting priorities for healthcare improvement: a cluster randomized trial. Implement Sci 9(1):1–10

    Article  Google Scholar 

  6. Calderón AJ, Vinagre BM, Feliu V (2006) Fractional order control strategies for power electronic buck converters. Signal Process 86(10):2803–2819

    Article  Google Scholar 

  7. Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96–109

    Article  Google Scholar 

  8. Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput Appl 31(1):219–237

    Article  Google Scholar 

  9. Cheng K, Wang L, Shen Y, Wang H, Wang Y, Jiang X, Zhong H () Secure k-nn query on encrypted cloud data with multiple keys. IEEE Transactions on Big Data

  10. Chenthara S, Ahmed K, Wang H, Whittaker F (2019) Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access 7:74361–74382

    Article  Google Scholar 

  11. Dash S, Padhy S, Parija B, Rojashree T, Patro KAK (2022) A simple and fast medical image encryption system using chaos-based shifting techniques. International Journal of Information Security and Privacy (IJISP) 16(1):1–24

    Article  Google Scholar 

  12. Dong S, Abbas K, Jain R (2019) A survey on distributed denial of service (ddos) attacks in sdn and cloud computing environments. IEEE Access 7:80813–80828

    Article  Google Scholar 

  13. Dong H, Bai E, Jiang X-Q, Wu Y (2020) Color image compression-encryption using fractional-order hyperchaotic system and dna coding. IEEE Access 8:163524–163540

    Article  Google Scholar 

  14. ElKamchouchi DH, Mohamed HG, Moussa KH (2020) A bijective image encryption system based on hybrid chaotic map diffusion and dna confusion. Entropy 22(2):180

    Article  MathSciNet  CAS  PubMed  PubMed Central  ADS  Google Scholar 

  15. El-Khamy SE, Mohamed AG (2021) An efficient dna-inspired image encryption algorithm based on hyper-chaotic maps and wavelet fusion. Multimed Tools Appl 80:23319–23335

    Article  Google Scholar 

  16. Gafsi M, Hajjaji MA, Malek J, Mtibaa A (2020) Efficient encryption system for numerical image safe transmission. Journal of Electrical and Computer Engineering

  17. Grass RN, Heckel R, Dessimoz C, Stark WJ (2020) Genomic encryption of digital data stored in synthetic dna. Angew Chem 132(22):8554–8558

    Article  ADS  Google Scholar 

  18. Iqbal T, Ali H (2018) Generative adversarial network for medical images (mi-gan). J Med Syst 42(11):1–11

    Article  Google Scholar 

  19. Jia C, Zhang X, Wang S, Wang S, Ma S (2018) Light field image compression using generative adversarial network-based view synthesis. IEEE J Emerg Sel Top Circ Syst 9(1):177–189

    Article  Google Scholar 

  20. Kaur R, Ali A (2021) A novel blockchain model for securing iot based data transmission. Int J Grid Distrib Comput 14(1):1045–1055

    Google Scholar 

  21. Khashan OA, AlShaikh M (2020) Edge-based lightweight selective encryption scheme for digital medical images. Multimed Tools Appl 79(35):26369–26388

    Article  Google Scholar 

  22. Kim D-W, Chung J-R, Kim J, Lee DY, Jeong SY, Jung S-W (2019) Constrained adversarial loss for generative adversarial network-based faithful image restoration. ETRI J 41(4):415–425

    Article  Google Scholar 

  23. Kruse CS, Mileski M, Vijaykumar AG, Viswanathan SV, Suskandla U, Chidambaram Y (2017) Impact of electronic health records on long-term care facilities: systematic review. JMIR Med Inf 5(3):e35

    Article  Google Scholar 

  24. Li C, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78(2):1545–1551

    Article  Google Scholar 

  25. Li X, Mou J, Xiong L, Wang Z, Xu J (2021) Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption. Opt Laser Technol 140:107074

    Article  CAS  Google Scholar 

  26. Liu H, Wang X et al (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Article  Google Scholar 

  27. Liu L, Zhang Q, Wei X (2012) A rgb image encryption algorithm based on dna encoding and chaos map. Comput Electric Eng 38(5):1240–1248

    Article  Google Scholar 

  28. Liu J, Ma Y, Li S, Lian J, Zhang X (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Appl 77(17):22787–22808

    Article  Google Scholar 

  29. Liu Y, Wang Y, Deng L, Wang F, Liu F, Lu Y, Li S (2019) A novel in situ compression method for cfd data based on generative adversarial network. J Vis 22(1):95–108

    Article  Google Scholar 

  30. Liu D, Huang X, Zhan W, Ai L, Zheng X, Cheng S (2021) View synthesis-based light field image compression using a generative adversarial network. Inf Sci 545:118–131

    Article  MathSciNet  Google Scholar 

  31. Mandal MK, Banik GD, Chattopadhyay D, Nandi D (2012) An image encryption process based on chaotic logistic map. IETE Tech Rev 29(5):395–404

    Article  Google Scholar 

  32. Mentzer F, Toderici G, Tschannen M, Agustsson E (2020) High-fidelity generative image compression. arXiv:2006.09965

  33. Mousa HM (2016) Dna-genetic encryption technique. International Journal of Computer Network & Information Security 8(7)

  34. Niu Y, Zhang X (2020) A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation. IEEE Access 8:22082–22093

    Article  Google Scholar 

  35. Padhy S, Alowaidi M, Dash S, Alshehri M, Malla PP, Routray S, Alhumyani H (2023) Agrisecure: A fog computing-based security framework for agriculture 4.0 via blockchain. Processes 11(3):757

    Article  Google Scholar 

  36. Padhy S, Shankar T, Dash S (2022) A comparison among fast point multiplication algorithms in elliptic curve cryptosystem

  37. Ponuma R, Amutha R (2018) Compressive sensing based image compression-encryption using novel 1d-chaotic map. Multimed Tools Appl 77(15):19209–19234

    Article  Google Scholar 

  38. Pranitha G, Rukmini T, Shankar T, Sah B, Kumar N, Padhy S (2022) Utilization of blockchain in e-voting system. In: 2022 2nd International Conference on Intelligent Technologies (CONIT), IEEE, pp 1–5

  39. Roy M, Chakraborty S, Mali K, Swarnakar R, Ghosh K, Banerjee A, Chatterjee S (2019) Data security techniques based on dna encryption. In: International ethical hacking conference, Springer, pp 239–249

  40. Samiullah M, Aslam W, Nazir H, Lali MI, Shahzad B, Mufti MR, Afzal H (2020) An image encryption scheme based on dna computing and multiple chaotic systems. IEEE Access 8:25650–25663

    Article  Google Scholar 

  41. Sang Y, Sang J, Alam MS (2022) Image encryption based on logistic chaotic systems and deep autoencoder. Pattern Recognit Lett 153:59–66

    Article  ADS  Google Scholar 

  42. Shakir HR (2019) A color-image encryption scheme using a 2d chaotic system and dna coding. Advances in Multimedia

  43. Shankar T, Padhy S, Ch SM, Ravella H, Varun M, Kumar N (2022) Development of 6g web by multilayer perceptron in c-ran for vanets. 2022 IEEE Global Conference on Computing. Power and Communication Technologies (GlobConPT), IEEE, pp 1–6

  44. Shankar T, Padhy S, Dash S, Teja MB, Yashwant S (2022) Induction of secure data repository in blockchain over ipfs. In: 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, pp 738–743

  45. Shu J, Jia X, Yang K, Wang H (2018) Privacy-preserving task recommendation services for crowdsourcing. IEEE Trans Serv Comput 14(1):235–247

    Google Scholar 

  46. Singh KN, Singh OP, Singh AK (2022) Ecis: encryption prior to compression for digital image security with reduced memory. Comput Commun 193:410–417

    Article  Google Scholar 

  47. Song J, He T, Gao L, Xu X, Hanjalic A, Shen HT (2020) Unified binary generative adversarial network for image retrieval and compression. Int J Comput Vis 128(8):2243–2264

    Article  MathSciNet  Google Scholar 

  48. Suri S, Vijay R (2017) An aes–chaos-based hybrid approach to encrypt multiple images. In: Recent developments in intelligent computing, communication and devices, Springer, pp 37–43

  49. Vatandsoost M, Litkouhi S (2019) The future of healthcare facilities: how technology and medical advances may shape hospitals of the future. Hosp Pract Res 4(1):1–11

    Article  Google Scholar 

  50. Wang T, Wang M-h (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and dna encoding. Opt Laser Technol 132:106355

    Article  CAS  Google Scholar 

  51. Wang X, Wang S, Zhang Y, Luo C (2018) A one-time pad color image cryptosystem based on sha-3 and multiple chaotic systems. Opt Lasers Eng 103:1–8

    Article  Google Scholar 

  52. Wang S, Wang C, Xu C (2020) An image encryption algorithm based on a hidden attractor chaos system and the knuth-durstenfeld algorithm. Opt Lasers Eng 128:105995

    Article  Google Scholar 

  53. Wang W, Ma X, Liu H, Li Y, Liu W (2021) Multi-focus image fusion via joint convolutional analysis and synthesis sparse representation. Signal Process: Image Commun 99:116521

    Google Scholar 

  54. Wang X, Chen S, Zhang Y (2021) A chaotic image encryption algorithm based on random dynamic mixing. Opt Laser Technol 138:106837

    Article  Google Scholar 

  55. Yang F, Mou J, Luo C, Cao Y (2019) An improved color image encryption scheme and cryptanalysis based on a hyperchaotic sequence. Physica Scripta 94(8):085206

    Article  CAS  ADS  Google Scholar 

  56. Yang C-H, Wu H-C, Su S-F (2019) Implementation of encryption algorithm and wireless image transmission system on fpga. IEEE Access 7:50513–50523

    Article  Google Scholar 

  57. Ye G, Pan C, Dong Y, Shi Y, Huang X (2020) Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process 172:107563

    Article  Google Scholar 

  58. Zhang Y (2021) A new unified image encryption algorithm based on a lifting transformation and chaos. Inf Sci 547:307–327

    Article  MathSciNet  Google Scholar 

  59. Zhang Q, Wei X (2013) A novel couple images encryption algorithm based on dna subsequence operation and chaotic system. Optik 124(23):6276–6281

    Article  CAS  ADS  Google Scholar 

  60. Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos, Solitons Fractals 24(3):759–765

    Article  MathSciNet  ADS  Google Scholar 

  61. Zhu L, Jiang D, Ni J, Wang X, Rong X, Ahmad M (2022) A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf Sci 607:1001–1022

    Article  Google Scholar 

Download references

Funding

The authors received no specific funding for this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anand Nayyar.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflicts of interest to report regarding the present study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Padhy, S., Dash, S., Shankar, T.N. et al. A hybrid crypto-compression model for secure brain mri image transmission. Multimed Tools Appl 83, 24361–24381 (2024). https://doi.org/10.1007/s11042-023-16359-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16359-w

Keywords

Navigation