Abstract
In the growing field of the Internet of Medical Things (IoMT), securing the transmission of medical images over public networks is a critical challenge. Medical images, being highly sensitive and often containing personally identifiable information, require robust protection against unauthorized access and tampering. This paper addresses this challenge by introducing a novel cryptosystem specifically tailored to the resource limitations inherent in IoMT environments. To meet the demand for protecting sensitive information in medical images, the proposed system integrates two layers of security: spatial watermarking and asymmetric encryption. At the core of our approach lies a newly developed, cost-effective spatial watermarking algorithm that seamlessly embeds watermarks within host images to facilitate tamper detection. Complementing this, we employ a resource-efficient Twin Message Fusion (TMF) encryption scheme to ensure confidentiality and integrity during transmission. The proposed cryptosystem is evaluated for both watermarking effectiveness and encryption robustness. Additionally, we assess the system’s suitability for IoMT environments in terms of cost-effectiveness. Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) metrics have been used to assess watermarking resilience against various attacks, while encryption efficacy is analyzed through histogram and entropy evaluations. Furthermore, we compare the complexity of our cryptosystem with five recently proposed techniques in both traditional and IoMT environments, demonstrating superior execution time, reduced image size, and enhanced encryption efficiency.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Figa_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Figb_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig13_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig14_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig15_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig16_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig17_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-19632-8/MediaObjects/11042_2024_19632_Fig18_HTML.png)
Similar content being viewed by others
Availability of data and materials
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
Code availibility
The Watermarking and Encryption algorithms are available in the following links1. https://github.com/mohammed-elhabib/watermarking2. https://github.com/mohammed-elhabib/image_encrpy
References
KekhaJavan AA, Zare A (2022) Internet of medical things application in encryption of medical images based on synchronization of multi-state chaotic systems. Int J Basic Sci Med. https://doi.org/10.34172/ijbsm.2022.05
Singh P, Devi KJ, Thakkar H, Kotecha K (2022) Region-based hybrid medical image watermarking scheme for robust and secured transmission in iomt. IEEE Access 10:8974–8993. https://doi.org/10.1109/ACCESS.2022.3143801
Yaacoub J-PA, Noura M, Noura H, Salman O, Yaacoub E, Couturier R, Chehab A (2020) Securing internet of medical things systems: Limitations, issues and recommendations. Future Gener Comput Syst 105:581–606. https://doi.org/10.1016/j.future.2019.12.028
Mehra I, Nishchal NK (2015) Optical asymmetric image encryption using gyrator wavelet transform. Optics Commun 354:344–352
Kara M, Laouid A, Yagoub MA, Euler R, Medileh S, Hammoudeh M, Eleyan A, Bounceur A (2021) A fully homomorphic encryption based on magic number fragmentation and el-gamal encryption: Smart healthcare use case. Expert Systems n/a(n/a), 12767. https://doi.org/10.1111/exsy.12767. https://onlinelibrary.wiley.com/doi/pdf/10.1111/exsy.12767
Laouamer L, AlShaikh M, Nana L, Pascu A (2016) A novel ct scan images watermarking scheme in dwt transform coefficients
Sisaudia V, Vishwakarma V (2021) Copyright protection using kelm-pso based multi-spectral image watermarking in dct domain with local texture information based selection. Multimed Tools Appl 80:1–22. https://doi.org/10.1007/s11042-020-10028-y
Wazirali R, Ahmad R, Al-Amayreh A, Al-Madi M, Khalifeh A (2021) Secure watermarking schemes and their approaches in the iot technology: An overview. Electronics 10(14). https://doi.org/10.3390/electronics10141744
AlShaikh M, Laouamer L, Laouid A, Bounceur A, Hammoudeh M (2019) Robust and imperceptible medical image watermarking based on dijkstra algorithm. ICFNDS ’19. Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/3341325.3341991. https://doi.org/10.1145/3341325.3341991
AlShaikh M, Laouamer L, Nana L, Pascu A (2016) Formal concept analysis to improve robustness on medical image watermarking schemes in the spatial domain
Laouamer L, Alshaikh M, Nana L, Pascu A (2015) Robust watermarking scheme and tamper detection based on threshold versus intensity. J Innov Digit Ecosyst 2. https://doi.org/10.1016/j.jides.2015.10.001
Gul E, Ozturk S (2021) A novel pixel-wise authentication-based self-embedding fragile watermarking method. Multimedia Systems 27. https://doi.org/10.1007/s00530-021-00751-3
Zear A, Singh P (2021) Secure and robust color image dual watermarking based on lwt-dct-svd. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-10472-w
Nguyen S (2021) Fragile watermarking for image authentication based on dwt-svd-dct techniques. Multimedia Tools and Applications 80:1–13. https://doi.org/10.1007/s11042-021-10879-z
Li Z, Zhang H, Liu X, Wang C, Wang X (2021) Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on rhfm and dwt-dct. Digital Signal Processing 115:103062. https://doi.org/10.1016/j.dsp.2021.103062
Chen D, Wang H, Zhang N, Nie X, Dai H-N, Zhang K, Choo KR (2022) Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in iot. IEEE Int Things J 1–1. https://doi.org/10.1109/JIOT.2022.3155355
Hazra A, Ghosh S, Jash S (2018) A New DNA Cryptography Based Algorithm Involving the Fusion of Symmetric-Key Techniques, pp 605–615. https://doi.org/10.1007/978-981-10-8237-5_59
Khashan O, Alshaikh M (2020) Edge-based lightweight selective encryption scheme for digital medical images. Multimed Tools Appl 79. https://doi.org/10.1007/s11042-020-09264-z
Lopez-Sanz S, Farinas N, Martin-Doimeadios R, Rios A (2018) Analytical strategy based on asymmetric flow field flow fractionation hyphenated to icp-ms and complementary techniques to study gold nanoparticles transformations in cell culture medium. Analytica Chimica Acta 1053. https://doi.org/10.1016/j.aca.2018.11.053
Huang L, Cai S, Xiong X, Xiao M (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Lasers Eng 115:7–20
Feng Y, Li L, Huang F (2006) A symmetric image encryption approach based on line maps. In: 2006 1st International symposium on systems and control in aerospace and astronautics, p 6. IEEE
Deshmukh P (2016) An image encryption and decryption using aes algorithm
Kalubandi VKP, Vaddi H, Ramineni V, Loganathan A (2016) A novel image encryption algorithm using aes and visual cryptography. In: 2016 2nd International conference on next generation computing technologies (NGCT), pp 808–813. https://doi.org/10.1109/NGCT.2016.7877521
Jiao K, Ye G, Dong Y, Huang X, He J (2020) Image encryption scheme based on a generalized arnold map and rsa algorithm. Secur Commun Netw 2020
Yadav A, Singh P, Saini I, Singh K (2019) Asymmetric encryption algorithm for colour images based on fractional hartley transform. J Mod Opt 66(6):629–642
Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and aes algorithm. J Supercomput 75(10):6663–6682
Daemen J, Rijmen V (2001) Reijndael: The advanced encryption standard. Dr. Dobb’s Journal: Software Tools for the Professional Programmer 26(3):137–139
Mukherjee DP, Maitra S, Acton ST (2004) Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans Multimedia 6(1):1–15. https://doi.org/10.1109/TMM.2003.819759
Lin SD, Chen C-F (2000) A robust dct-based watermarking for copyright protection. IEEE Trans Consum Electron 46(3):415–421. https://doi.org/10.1109/30.883387
Abraham J, Paul V (2016) An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University - Computer and Information Sciences 31. https://doi.org/10.1016/j.jksuci.2016.12.004
Su Q, Liu D, Yuan Z, Wang G, Zhang X, Chen B, Yao T (2019) New rapid and robust color image watermarking technique in spatial domain. IEEE Access PP, 1–1. https://doi.org/10.1109/ACCESS.2019.2895062
Kitamura I, Kanai S, Kishinami T (2001) Copyright protection of vector map using digital watermarking method based on discrete fourier transform. In: IGARSS 2001. Scanning the Present and Resolving the Future. Proceedings. IEEE 2001 International Geoscience and Remote Sensing Symposium (Cat. No.01CH37217), vol 3, pp 1191–11933. https://doi.org/10.1109/IGARSS.2001.976788
Wang D, Li D, Jun Y, Chen F (2007) An improved chirp typed blind watermarking algorithm based on wavelet and fractional fourier transform. In: Image and Graphics, International Conference On, pp 291–296. IEEE Computer Society, Los Alamitos, CA, USA. https://doi.org/10.1109/ICIG.2007.38. https://doi.ieeecomputersociety.org/10.1109/ICIG.2007.38
Zhang Q, Li Y, Wei X (2012) An improved robust and adaptive watermarking algorithm based on dct. J Appl Res Technol 10:405–415
Sidhu RK (2016) Robust digital image watermarking for copyright protection with svd-dwt-dct and kalman filtering
Li Y-M, Wei D, Zhang L (2021) Double-encrypted watermarking algorithm based on cosine transform and fractional fourier transform in invariant wavelet domain. Inf Sci 551:205–227
Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Encryption and watermark-treated medical image against hacking disease-an immune convention in spatial and frequency domains. Comput Methods Prog Biomed 159:11–21. https://doi.org/10.1016/j.cmpb.2018.02.021
Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876–19897. https://doi.org/10.1109/ACCESS.2018.2808172
Yang Y, Zhang S, Yang J, Li J, Li Z (2014) Targeted fully homomorphic encryption based on a double decryption algorithm for polynomials. Tsinghua Science and Technology 19(5):478–485. https://doi.org/10.1109/TST.2014.6919824
Bamatraf A, Ibrahim R, Salleh MNBM (2010) Digital watermarking algorithm using lsb. In: 2010 International Conference on Computer Applications and Industrial Electronics, pp 155–159. https://doi.org/10.1109/ICCAIE.2010.5735066
Setiadi DRIM (2021) Psnr vs ssim: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80(6):8423–8444
Sparavigna AC (2019) Entropy in image analysis. Entropy 21(5). https://doi.org/10.3390/e21050502
Luo Y, Zhou R, Liu J, Qiu S, Cao Y (2018) An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers. Multimed Tools Appl 77. https://doi.org/10.1007/s11042-018-5844-5
Luo Y, Cao L, Qiu S, Lin H, Harkin J, Liu J (2016) A chaotic map-control-based and the plain image-related cryptosystem. Nonlinear Dynamics 83. https://doi.org/10.1007/s11071-015-2481-7
Funding
No Funding Sources.
Author information
Authors and Affiliations
Contributions
All the authors contributed equally to this manuscript.
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kahla, M.E.H., Beggas, M., Laouid, A. et al. An IoMT image crypto-system based on spatial watermarking and asymmetric encryption. Multimed Tools Appl 83, 86681–86706 (2024). https://doi.org/10.1007/s11042-024-19632-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-024-19632-8