Abstract
Medical Images has evolved from time to time and the need to protect sensitive information related to such images have also grown significantly. Nowadays data being the primary asset of an individual, protecting them has posed new challenges from time and again. With the advancement of the digital medium, the medical image has been at greater risk and there is an urgent need to protect the information and the raw pixel data of such images. This research focuses on ensuring the confidentiality of DICOM medical images and protecting the Electronic Patient Report (EPR) by applying both cryptographic and steganographic protection techniques. The encryption keys are generated using the Logistic Chaotic Map and Non-Linear Feedback Shift Register. the electronic patient report (EPR) is converted into a 9-space-format using Continued Fraction of Ramanujan conjecture and then using steganography techniques EPR is embedded into the Most Significant Bits of Medical Images. The final encrypted image contains the EPR as well as encrypted medical image. The key sequence used in order to encrypt the medical image is highly pseudo random and the Key Space Analysis depicted that the algorithm is very strong. This work has paved a better way of securely storing 16-bit DICOM medical images and EPR into the Picture Archive and Communication System repository. The proposed security model has shown promising results in comparison to other research and the various analysis did show significant improvements over past studies.
Similar content being viewed by others
References
Abanda Y, Tiedeu A (2016) Image encryption by chaos mixing. IET Image Process 10(10):742–750
Abdel-Nabi H, Al-Haj A (2017) Efficient joint encryption and data hiding algorithm for medical images security. In: 2017 8th international conference on information and communication systems (ICICS), pp 147–152
Banik A, Shamsi Z, Laiphrakpam D (2019) An improved chaos based medical image encryption using DNA encoding techniques. J Inf Secur Appl 49:102398
Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667–36681
Boeing G (2016) Visual analysis of nonlinear dynamical systems: chaos, fractals, self-similarity and the limits of prediction. Int Conf Comput Sustain Glob Dev (INDIACom) 4(4):37
Boonyapalanant A, Ketcham M, Piyaneeranart M (2019) Hiding patient injury information in medical images with QR code. In: International conference on computing and information technology, pp 258–267
Choi U, Cho S, Kang S (2019) Color medical image encryption using 3D chaotic cat map and NCA. In: 2019 10th IFIP international conference on new technologies, mobility and security (NTMS), pp 1–5
Dagadu J, Li J, Aboagye E, Ge X (2017) Chaotic medical image encryption based on Arnold transformation and pseudorandomly enhanced logistic map. J Multi Eng Sci Technol (JMEST) 4(9):8096–8103
Das A, Das A, Kar N (2019) An improved chaos based medical image encryption using DNA encoding techniques. In: International conference on computational intelligence, security and internet of things, pp 207–220
Das AK, Das A, Kar N (2019) An approach towards encrypting paired digits using dynamic programming and Diffie–Hellman key exchange. In: International conference on computational intelligence, security and internet of things, pp 170–181
Deb S, Bhuyan B, Gupta N (2018) Design and analysis of LFSR-based stream cipher. In: Proceedings of the international conference on computing and communication systems, pp 631–639
Deb S, Biswas B, Kar N (2015) Study of NLFSR and reasonable security improvement on trivium cipher. In: Information systems design and intelligent applications, pp 731–739
Digital Imaging and Communications in Medicine (DICOM) documentation. (n.d.-b) (2020). https://www.dicomlibrary.com/
Digital Imaging and Communications in Medicine (DICOM) documentation. (n.d.-a) (2021). https://www.dicomstandard.org/current/
Dubrova E (2012) A list of maximum-period NLFSRs. Cryptology ePrint Archive, Report 2012/166. http://eprint.iacr.org/2012/166
Fu C, Meng W, Zhan Y, Zhu Z, Lau F, Chi K, Ma H (2018) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010
Fu C, Zhang G, Bian O, Lei W, Ma H (2014) A novel medical image protection scheme using a 3-dimensional chaotic system. PloS One 9(12):e115773
Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Humaniz Comput 11(3):1309–1324
Honglei Y, Guang-Shou W (2009) The compounded chaotic sequence research in image encryption algorithm. In: 2009 WRI global congress on intelligent systems, vol 3, pp 252–256
Iacono M, Neufeld E, Akinnagbe E, Bower K, Wolf J, Oikonomidis I, Wyss M (2015) MIDA: a multimodal imaging-based detailed anatomical model of the human head and neck. PloS One 10(4):e0124126
Larobina M, Murino L (2014) Medical image file formats. J Digit Imaging 27(2):200–206
May R (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467
Potetz B, Lee T (2003) Statistical correlations between two-dimensional images and threedimensional structures in natural scenes. JOSA A 20(7):1292–1303
Prabhavathi K, Sathisha C, Ravikumar K (2017) Region of interest based selective medical image encryption using multi chaotic system. In: 2017 international conference on electrical, electronics, communication, computer, and optimization techniques (ICEECCOT), pp 1–5
Pujol S (2010) Data loading and visualization. National Alliance for Medical Image Computing, Neuroimage Analysis Center. https://www.slicer.org/w/img_auth.php/c/c9/3DDataLoadingAndVisualization_Slicer3.6_SoniaPujol.pdf
Rohith S, Bhat KH, Sharma A (2014) Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of linear feedback shift register. In: 2014 international conference on advances in electronics computers and communications, pp 1–6
Shannon C (2001) A mathematical theory of communication. ACM SIGMOBILE Mob Comput Commun Rev 5(1):3–55
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wu Y, Noonan JP, Agaian S et al (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT) 1(2):31–38
Zhang Q, Han J, Ye Y (2019) Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding. IET Image Process 13(14):2905–2915
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Das, A., Das, A. & Kar, N. A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture. J Ambient Intell Human Comput 13, 1021–1036 (2022). https://doi.org/10.1007/s12652-021-02943-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-02943-1