Skip to main content

Advertisement

Log in

An IoMT image crypto-system based on spatial watermarking and asymmetric encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the growing field of the Internet of Medical Things (IoMT), securing the transmission of medical images over public networks is a critical challenge. Medical images, being highly sensitive and often containing personally identifiable information, require robust protection against unauthorized access and tampering. This paper addresses this challenge by introducing a novel cryptosystem specifically tailored to the resource limitations inherent in IoMT environments. To meet the demand for protecting sensitive information in medical images, the proposed system integrates two layers of security: spatial watermarking and asymmetric encryption. At the core of our approach lies a newly developed, cost-effective spatial watermarking algorithm that seamlessly embeds watermarks within host images to facilitate tamper detection. Complementing this, we employ a resource-efficient Twin Message Fusion (TMF) encryption scheme to ensure confidentiality and integrity during transmission. The proposed cryptosystem is evaluated for both watermarking effectiveness and encryption robustness. Additionally, we assess the system’s suitability for IoMT environments in terms of cost-effectiveness. Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) metrics have been used to assess watermarking resilience against various attacks, while encryption efficacy is analyzed through histogram and entropy evaluations. Furthermore, we compare the complexity of our cryptosystem with five recently proposed techniques in both traditional and IoMT environments, demonstrating superior execution time, reduced image size, and enhanced encryption efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Algorithm 1
Algorithm 2
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Availability of data and materials

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

Code availibility

The Watermarking and Encryption algorithms are available in the following links1. https://github.com/mohammed-elhabib/watermarking2. https://github.com/mohammed-elhabib/image_encrpy

References

  1. KekhaJavan AA, Zare A (2022) Internet of medical things application in encryption of medical images based on synchronization of multi-state chaotic systems. Int J Basic Sci Med. https://doi.org/10.34172/ijbsm.2022.05

  2. Singh P, Devi KJ, Thakkar H, Kotecha K (2022) Region-based hybrid medical image watermarking scheme for robust and secured transmission in iomt. IEEE Access 10:8974–8993. https://doi.org/10.1109/ACCESS.2022.3143801

    Article  Google Scholar 

  3. Yaacoub J-PA, Noura M, Noura H, Salman O, Yaacoub E, Couturier R, Chehab A (2020) Securing internet of medical things systems: Limitations, issues and recommendations. Future Gener Comput Syst 105:581–606. https://doi.org/10.1016/j.future.2019.12.028

    Article  Google Scholar 

  4. Mehra I, Nishchal NK (2015) Optical asymmetric image encryption using gyrator wavelet transform. Optics Commun 354:344–352

    Article  Google Scholar 

  5. Kara M, Laouid A, Yagoub MA, Euler R, Medileh S, Hammoudeh M, Eleyan A, Bounceur A (2021) A fully homomorphic encryption based on magic number fragmentation and el-gamal encryption: Smart healthcare use case. Expert Systems n/a(n/a), 12767. https://doi.org/10.1111/exsy.12767. https://onlinelibrary.wiley.com/doi/pdf/10.1111/exsy.12767

  6. Laouamer L, AlShaikh M, Nana L, Pascu A (2016) A novel ct scan images watermarking scheme in dwt transform coefficients

  7. Sisaudia V, Vishwakarma V (2021) Copyright protection using kelm-pso based multi-spectral image watermarking in dct domain with local texture information based selection. Multimed Tools Appl 80:1–22. https://doi.org/10.1007/s11042-020-10028-y

  8. Wazirali R, Ahmad R, Al-Amayreh A, Al-Madi M, Khalifeh A (2021) Secure watermarking schemes and their approaches in the iot technology: An overview. Electronics 10(14). https://doi.org/10.3390/electronics10141744

  9. AlShaikh M, Laouamer L, Laouid A, Bounceur A, Hammoudeh M (2019) Robust and imperceptible medical image watermarking based on dijkstra algorithm. ICFNDS ’19. Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/3341325.3341991. https://doi.org/10.1145/3341325.3341991

  10. AlShaikh M, Laouamer L, Nana L, Pascu A (2016) Formal concept analysis to improve robustness on medical image watermarking schemes in the spatial domain

  11. Laouamer L, Alshaikh M, Nana L, Pascu A (2015) Robust watermarking scheme and tamper detection based on threshold versus intensity. J Innov Digit Ecosyst 2. https://doi.org/10.1016/j.jides.2015.10.001

  12. Gul E, Ozturk S (2021) A novel pixel-wise authentication-based self-embedding fragile watermarking method. Multimedia Systems 27. https://doi.org/10.1007/s00530-021-00751-3

  13. Zear A, Singh P (2021) Secure and robust color image dual watermarking based on lwt-dct-svd. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-10472-w

    Article  Google Scholar 

  14. Nguyen S (2021) Fragile watermarking for image authentication based on dwt-svd-dct techniques. Multimedia Tools and Applications 80:1–13. https://doi.org/10.1007/s11042-021-10879-z

    Article  Google Scholar 

  15. Li Z, Zhang H, Liu X, Wang C, Wang X (2021) Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on rhfm and dwt-dct. Digital Signal Processing 115:103062. https://doi.org/10.1016/j.dsp.2021.103062

    Article  Google Scholar 

  16. Chen D, Wang H, Zhang N, Nie X, Dai H-N, Zhang K, Choo KR (2022) Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in iot. IEEE Int Things J 1–1. https://doi.org/10.1109/JIOT.2022.3155355

  17. Hazra A, Ghosh S, Jash S (2018) A New DNA Cryptography Based Algorithm Involving the Fusion of Symmetric-Key Techniques, pp 605–615. https://doi.org/10.1007/978-981-10-8237-5_59

  18. Khashan O, Alshaikh M (2020) Edge-based lightweight selective encryption scheme for digital medical images. Multimed Tools Appl 79. https://doi.org/10.1007/s11042-020-09264-z

  19. Lopez-Sanz S, Farinas N, Martin-Doimeadios R, Rios A (2018) Analytical strategy based on asymmetric flow field flow fractionation hyphenated to icp-ms and complementary techniques to study gold nanoparticles transformations in cell culture medium. Analytica Chimica Acta 1053. https://doi.org/10.1016/j.aca.2018.11.053

  20. Huang L, Cai S, Xiong X, Xiao M (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Lasers Eng 115:7–20

    Article  Google Scholar 

  21. Feng Y, Li L, Huang F (2006) A symmetric image encryption approach based on line maps. In: 2006 1st International symposium on systems and control in aerospace and astronautics, p 6. IEEE

  22. Deshmukh P (2016) An image encryption and decryption using aes algorithm

  23. Kalubandi VKP, Vaddi H, Ramineni V, Loganathan A (2016) A novel image encryption algorithm using aes and visual cryptography. In: 2016 2nd International conference on next generation computing technologies (NGCT), pp 808–813. https://doi.org/10.1109/NGCT.2016.7877521

  24. Jiao K, Ye G, Dong Y, Huang X, He J (2020) Image encryption scheme based on a generalized arnold map and rsa algorithm. Secur Commun Netw 2020

  25. Yadav A, Singh P, Saini I, Singh K (2019) Asymmetric encryption algorithm for colour images based on fractional hartley transform. J Mod Opt 66(6):629–642

    Article  Google Scholar 

  26. Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and aes algorithm. J Supercomput 75(10):6663–6682

    Article  Google Scholar 

  27. Daemen J, Rijmen V (2001) Reijndael: The advanced encryption standard. Dr. Dobb’s Journal: Software Tools for the Professional Programmer 26(3):137–139

    Google Scholar 

  28. Mukherjee DP, Maitra S, Acton ST (2004) Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans Multimedia 6(1):1–15. https://doi.org/10.1109/TMM.2003.819759

    Article  Google Scholar 

  29. Lin SD, Chen C-F (2000) A robust dct-based watermarking for copyright protection. IEEE Trans Consum Electron 46(3):415–421. https://doi.org/10.1109/30.883387

    Article  Google Scholar 

  30. Abraham J, Paul V (2016) An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University - Computer and Information Sciences 31. https://doi.org/10.1016/j.jksuci.2016.12.004

  31. Su Q, Liu D, Yuan Z, Wang G, Zhang X, Chen B, Yao T (2019) New rapid and robust color image watermarking technique in spatial domain. IEEE Access PP, 1–1. https://doi.org/10.1109/ACCESS.2019.2895062

  32. Kitamura I, Kanai S, Kishinami T (2001) Copyright protection of vector map using digital watermarking method based on discrete fourier transform. In: IGARSS 2001. Scanning the Present and Resolving the Future. Proceedings. IEEE 2001 International Geoscience and Remote Sensing Symposium (Cat. No.01CH37217), vol 3, pp 1191–11933. https://doi.org/10.1109/IGARSS.2001.976788

  33. Wang D, Li D, Jun Y, Chen F (2007) An improved chirp typed blind watermarking algorithm based on wavelet and fractional fourier transform. In: Image and Graphics, International Conference On, pp 291–296. IEEE Computer Society, Los Alamitos, CA, USA. https://doi.org/10.1109/ICIG.2007.38. https://doi.ieeecomputersociety.org/10.1109/ICIG.2007.38

  34. Zhang Q, Li Y, Wei X (2012) An improved robust and adaptive watermarking algorithm based on dct. J Appl Res Technol 10:405–415

    Article  Google Scholar 

  35. Sidhu RK (2016) Robust digital image watermarking for copyright protection with svd-dwt-dct and kalman filtering

  36. Li Y-M, Wei D, Zhang L (2021) Double-encrypted watermarking algorithm based on cosine transform and fractional fourier transform in invariant wavelet domain. Inf Sci 551:205–227

    Article  MathSciNet  Google Scholar 

  37. Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Encryption and watermark-treated medical image against hacking disease-an immune convention in spatial and frequency domains. Comput Methods Prog Biomed 159:11–21. https://doi.org/10.1016/j.cmpb.2018.02.021

    Article  Google Scholar 

  38. Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876–19897. https://doi.org/10.1109/ACCESS.2018.2808172

    Article  Google Scholar 

  39. Yang Y, Zhang S, Yang J, Li J, Li Z (2014) Targeted fully homomorphic encryption based on a double decryption algorithm for polynomials. Tsinghua Science and Technology 19(5):478–485. https://doi.org/10.1109/TST.2014.6919824

    Article  MathSciNet  Google Scholar 

  40. Bamatraf A, Ibrahim R, Salleh MNBM (2010) Digital watermarking algorithm using lsb. In: 2010 International Conference on Computer Applications and Industrial Electronics, pp 155–159. https://doi.org/10.1109/ICCAIE.2010.5735066

  41. Setiadi DRIM (2021) Psnr vs ssim: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80(6):8423–8444

    Article  Google Scholar 

  42. Sparavigna AC (2019) Entropy in image analysis. Entropy 21(5). https://doi.org/10.3390/e21050502

  43. Luo Y, Zhou R, Liu J, Qiu S, Cao Y (2018) An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers. Multimed Tools Appl 77. https://doi.org/10.1007/s11042-018-5844-5

  44. Luo Y, Cao L, Qiu S, Lin H, Harkin J, Liu J (2016) A chaotic map-control-based and the plain image-related cryptosystem. Nonlinear Dynamics 83. https://doi.org/10.1007/s11071-015-2481-7

Download references

Funding

No Funding Sources.

Author information

Authors and Affiliations

Authors

Contributions

All the authors contributed equally to this manuscript.

Corresponding author

Correspondence to Abdelkader Laouid.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kahla, M.E.H., Beggas, M., Laouid, A. et al. An IoMT image crypto-system based on spatial watermarking and asymmetric encryption. Multimed Tools Appl 83, 86681–86706 (2024). https://doi.org/10.1007/s11042-024-19632-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-024-19632-8

Keywords

Navigation