Skip to main content
Log in

A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Medical Images has evolved from time to time and the need to protect sensitive information related to such images have also grown significantly. Nowadays data being the primary asset of an individual, protecting them has posed new challenges from time and again. With the advancement of the digital medium, the medical image has been at greater risk and there is an urgent need to protect the information and the raw pixel data of such images. This research focuses on ensuring the confidentiality of DICOM medical images and protecting the Electronic Patient Report (EPR) by applying both cryptographic and steganographic protection techniques. The encryption keys are generated using the Logistic Chaotic Map and Non-Linear Feedback Shift Register. the electronic patient report (EPR) is converted into a 9-space-format using Continued Fraction of Ramanujan conjecture and then using steganography techniques EPR is embedded into the Most Significant Bits of Medical Images. The final encrypted image contains the EPR as well as encrypted medical image. The key sequence used in order to encrypt the medical image is highly pseudo random and the Key Space Analysis depicted that the algorithm is very strong. This work has paved a better way of securely storing 16-bit DICOM medical images and EPR into the Picture Archive and Communication System repository. The proposed security model has shown promising results in comparison to other research and the various analysis did show significant improvements over past studies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  • Abanda Y, Tiedeu A (2016) Image encryption by chaos mixing. IET Image Process 10(10):742–750

    Article  Google Scholar 

  • Abdel-Nabi H, Al-Haj A (2017) Efficient joint encryption and data hiding algorithm for medical images security. In: 2017 8th international conference on information and communication systems (ICICS), pp 147–152

  • Banik A, Shamsi Z, Laiphrakpam D (2019) An improved chaos based medical image encryption using DNA encoding techniques. J Inf Secur Appl 49:102398

    Google Scholar 

  • Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667–36681

    Article  Google Scholar 

  • Boeing G (2016) Visual analysis of nonlinear dynamical systems: chaos, fractals, self-similarity and the limits of prediction. Int Conf Comput Sustain Glob Dev (INDIACom) 4(4):37

    Google Scholar 

  • Boonyapalanant A, Ketcham M, Piyaneeranart M (2019) Hiding patient injury information in medical images with QR code. In: International conference on computing and information technology, pp 258–267

  • Choi U, Cho S, Kang S (2019) Color medical image encryption using 3D chaotic cat map and NCA. In: 2019 10th IFIP international conference on new technologies, mobility and security (NTMS), pp 1–5

  • Dagadu J, Li J, Aboagye E, Ge X (2017) Chaotic medical image encryption based on Arnold transformation and pseudorandomly enhanced logistic map. J Multi Eng Sci Technol (JMEST) 4(9):8096–8103

  • Das A, Das A, Kar N (2019) An improved chaos based medical image encryption using DNA encoding techniques. In: International conference on computational intelligence, security and internet of things, pp 207–220

  • Das AK, Das A, Kar N (2019) An approach towards encrypting paired digits using dynamic programming and Diffie–Hellman key exchange. In: International conference on computational intelligence, security and internet of things, pp 170–181

  • Deb S, Bhuyan B, Gupta N (2018) Design and analysis of LFSR-based stream cipher. In: Proceedings of the international conference on computing and communication systems, pp 631–639

  • Deb S, Biswas B, Kar N (2015) Study of NLFSR and reasonable security improvement on trivium cipher. In: Information systems design and intelligent applications, pp 731–739

  • Digital Imaging and Communications in Medicine (DICOM) documentation. (n.d.-b) (2020). https://www.dicomlibrary.com/

  • Digital Imaging and Communications in Medicine (DICOM) documentation. (n.d.-a) (2021). https://www.dicomstandard.org/current/

  • Dubrova E (2012) A list of maximum-period NLFSRs. Cryptology ePrint Archive, Report 2012/166. http://eprint.iacr.org/2012/166

  • Fu C, Meng W, Zhan Y, Zhu Z, Lau F, Chi K, Ma H (2018) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010

    Article  Google Scholar 

  • Fu C, Zhang G, Bian O, Lei W, Ma H (2014) A novel medical image protection scheme using a 3-dimensional chaotic system. PloS One 9(12):e115773

    Article  Google Scholar 

  • Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Humaniz Comput 11(3):1309–1324

    Article  Google Scholar 

  • Honglei Y, Guang-Shou W (2009) The compounded chaotic sequence research in image encryption algorithm. In: 2009 WRI global congress on intelligent systems, vol 3, pp 252–256

  • Iacono M, Neufeld E, Akinnagbe E, Bower K, Wolf J, Oikonomidis I, Wyss M (2015) MIDA: a multimodal imaging-based detailed anatomical model of the human head and neck. PloS One 10(4):e0124126

    Article  Google Scholar 

  • Larobina M, Murino L (2014) Medical image file formats. J Digit Imaging 27(2):200–206

    Article  Google Scholar 

  • May R (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467

    Article  Google Scholar 

  • Potetz B, Lee T (2003) Statistical correlations between two-dimensional images and threedimensional structures in natural scenes. JOSA A 20(7):1292–1303

    Article  Google Scholar 

  • Prabhavathi K, Sathisha C, Ravikumar K (2017) Region of interest based selective medical image encryption using multi chaotic system. In: 2017 international conference on electrical, electronics, communication, computer, and optimization techniques (ICEECCOT), pp 1–5

  • Pujol S (2010) Data loading and visualization. National Alliance for Medical Image Computing, Neuroimage Analysis Center. https://www.slicer.org/w/img_auth.php/c/c9/3DDataLoadingAndVisualization_Slicer3.6_SoniaPujol.pdf

  • Rohith S, Bhat KH, Sharma A (2014) Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of linear feedback shift register. In: 2014 international conference on advances in electronics computers and communications, pp 1–6

  • Shannon C (2001) A mathematical theory of communication. ACM SIGMOBILE Mob Comput Commun Rev 5(1):3–55

    Article  MathSciNet  Google Scholar 

  • Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  • Wu Y, Noonan JP, Agaian S et al (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT) 1(2):31–38

    Google Scholar 

  • Zhang Q, Han J, Ye Y (2019) Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding. IET Image Process 13(14):2905–2915

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhrajyoti Das.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Das, A., Das, A. & Kar, N. A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture. J Ambient Intell Human Comput 13, 1021–1036 (2022). https://doi.org/10.1007/s12652-021-02943-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-02943-1

Keywords

Navigation