Abstract
In this paper, we have proposed a novel method CloudSec. It is a lightweight and agile image encryption method that combines a hashing function, multi-wing chaotic mapping system, and genetics algorithm. The proposed method offers significant benefits in terms of efficiency in data authentication. Additionally, our proposed method does complementary and internal scrambling in order to increase security of the image. Secret key with features is used as a seeding value to generate a key DNA image from a hyper-chaotic system to eliminate the correlation between adjacent pixels by chaotic sequence. The complex dynamic behavior of the chaotic map generates random sequences for image diffusion. The propagation of information between a permuted DNA image and a key DNA image can be achieved through the use of DNA operations. Simulation results show that the proposed method used to authenticate and secure medical images in health care information systems. Our results demonstrated that it is very effective and reliable to fully recover medical image in case of any attack. The proposed approach executes faster, generates a large key space, and provides better encryption than available state-of-the-art techniques. It also resists various attacks, such as differential and statistical attack. The proposed crypto system is suitable for real-time applications in cloud computing and can be integrated into an IoHT framework for secure medical image transmission.

















Similar content being viewed by others
Data availability
We have used public test image source: https://www.kaggle.com/datasets.
References
HIPAA Journal. Healthcare data breach statistics. https://www.hipaajournal.com/healthcare-data-breach-statistics/ (2021). Accessed 20 Mar 2022.
Mondal A, Chatterjee PS. 2022 OITS International Conference on Information Technology (OCIT). 2022. p. 451–6. https://doi.org/10.1109/ocit56763.2022.00090.
Chai X, Gan Z, Lu Y, Chen Y, Han D. A novel image encryption algorithm based on the chaotic system and DNA computing. Int J Mod Phys C. 2017;28(05):1750069.
Guesmi R, Farah M, Kachouri A, Samet M. A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dynam. 2016;83(3):1123–36. https://doi.org/10.1007/s11071-015-2561-1.
Hu T, Liu Y, Gong LH, Ouyang CJ. An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dynam. 2017;87(1):51–66. https://doi.org/10.1007/s11071-016-3144-2.
Li X, Zhou C, Xu N. A secure and efficient image encryption algorithm based on DNA coding and spatiotemporal chaos. Int J Netw Secur. 2018;20(1):110–20. https://doi.org/10.6633/ijns-201801019.
Cui G, Liu Y, Zhang X, Zhou Z. International conference on bio-inspired computing: theories and applications. Berlin: Springer; 2017. p. 286–303.
Zhou HM. Noise reduction multi-carrier differential chaos shift keying system. J Circuit Syst Comp. 2018;27(01):1850002.
Niyat AY, Moattar MH, Torshiz MN. Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng. 2017;90:225–37.
Panduranga H, Kumar S. Image encryption based on permutation-substitution using chaotic map and Latin square image cipher. Eur Phys J Spec Top. 2014;223(8):1663–77.
Janani T, Brindha M. A secure medical image transmission scheme aided by quantum representation. J Inf Secur Appl. 2021. https://doi.org/10.1016/j.jisa.2021.102832.
Adleman LM. Molecular computation of solutions to combinatorial problems. Science. 1994;266(5187):1021–4.
Wang X, Liu C. A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl. 2017;76(5):6229–45.
Wang XY, Zhang YQ, Zhao YY. A novel image encryption scheme based on 2-d logistic map and DNA sequence operations. Nonlinear Dyn. 2015;82(3):1269–80.
Wang XY, Zhang YQ, Bao XM. A novel chaotic image encryption scheme using DNA sequence operations. Optics Lasers Eng. 2015;73:53–61.
Zhang J, Fang D, Ren H. Image encryption algorithm based on DNA encoding and chaotic maps. Math Prob Eng. 2014. https://doi.org/10.1155/2014/917147.
Zhang Q, Guo L, Wei X. Image encryption using DNA addition combined with chaotic maps. Math Comput Model. 2010;52(11–12):2028–35.
Budroni MA, Calabrese I, Miele Y. Control of chemical chaos through medium viscosity in a batch ferroin-catalyzed Belousov–Zhabotinsky reaction. Phys Chem Chem Phys. 2017;19(49):32235–41.
Matthews R. On the derivation of a chaotic encryption algorithm. Cryptologia. 1989;13(1):29–42.
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos. 1998;8(06):1259–84.
Zhou YC, Bao L, Chen CLP. A new 1d chaotic system for image encryption. Signal Process. 2014;97:172–82.
Sun SL. A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics J. 2018;10(1):129–37.
Abdel-Nabi H, Al-Haj A. 2017 8th International Conference on Information Technology (ICIT) (Amman, Jordan, 2017). p. 802–7.
Jena KK, Mishra S, Mishra S, Bhoi SK. An edge based steganographic approach using a two level security scheme for digital image processing and analysis. Int J Emerg Technol. 2019;10(2):29–38.
Liu H, Wang X. Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput. 2012;12(5):1457–66.
Xie T, Liu Y, Tang J. Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik-Int J Light Elect Optics. 2014;125(24):7166–9. https://doi.org/10.1016/j.ijleo.2014.08.069.
Song C, Qiao Y. A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos. Entropy. 2015;17(10):6954–68. https://doi.org/10.3390/e17106954.
Wen H, Yu S, Lü J. Breaking an image encryption algorithm based on DNA encoding and spatiotemporal chaos. Entropy. 2019;21(3):246. https://doi.org/10.3390/e21030246.
Kakkar A, Singh M. Performance analysis of a lightweight robust chaotic image re-encryption scheme for 5g heterogeneous networks. Wireless Pers Commun. 2023;129(4):2607–31. https://doi.org/10.1007/s11277-023-10248-z.
Rachmawati D, Tarigan J, Ginting A. A comparative study of message digest 5(MD5) and SHA256 algorithm. J Phys Conf Ser. 2018;978: 012116. https://doi.org/10.1088/1742-6596/978/1/012116.
Velmurugan T, Karthiga S. Security based approach of SHA 384 and SHA 512 algorithms in cloud environment. J Comput Sci. 2020;16(10):1439–50. https://doi.org/10.3844/jcssp.2020.1439.1450.
Wolfram Research. Mathematica (version 12.3) (2021). https://www.wolfram.com/mathematica/. Computer software.
Luo Y, Yu J, Lai W, Liu L. A novel chaotic image encryption algorithm based on improved Baker map and logistic map. Multimed Tools Appl. 2019;78(15):22023–43. https://doi.org/10.1007/s11042-019-7453-3.
Yavuz E, Yazıcı R, Kasapbası MC, Yamaç E. A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng. 2016;54:471–83. https://doi.org/10.1016/j.compeleceng.2016.02.015.
Zefreh EZ. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed Tools Appl. 2020;79(33–34):24993–5022. https://doi.org/10.1007/s11042-020-09111-1.
Shannon C. Communication theory of secrecy systems. Bell Labs Tech J. 1949;28:656–715.
Liang Z, Qin Q, Zhou C, Wang N, Xu Y, Zhou W. Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. PloS ONE. 2021;16(11): e0260014. https://doi.org/10.1371/journal.pone.0260014.
Guesmi R, Farah MAB. A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimed Tools Appl. 2020;80(2):1925–44. https://doi.org/10.1007/s11042-020-09672-1.
Zhan K, Wei D, Shi J, Yu J. Cross-utilizing hyperchaotic and DNA sequences for image encryption. J Electron Imaging. 2017;26(1): 013021.
Chai X, Gan Z, Yuan K, Chen Y, Liu X. A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl. 2019;31(1):219–37.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Innovation in Smart Things: A Systems, Security, and AI Perspective” guest edited by Niranjan K. Ray, Prasanth Yanambaka and Rakesh Balabantaray.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Mondal, A., Chatterjee, P.S. CloudSec: A Lightweight and Agile Approach to Secure Medical Image Transmission in the Cloud Computing Environment. SN COMPUT. SCI. 5, 237 (2024). https://doi.org/10.1007/s42979-023-02539-w
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-023-02539-w