Abstract
Nowadays, the demand for digital images from different intelligent devices and sensors has dramatically increased in smart healthcare. Due to advanced low-cost and easily available tools and software, manipulation of these images is an easy task. Thus, the security of digital images is a serious challenge for the content owners, healthcare communities, and researchers against illegal access and fraudulent usage. In this article, a secure medical image encryption algorithm, EiMOL, based on optimization and the Lorenz system, is proposed for smart healthcare applications. In the first stage, an optimized random sequence (ORS) is generated through directed weighted complex network particle swarm optimization using the genetic algorithm (GDWCN-PSO). This random number matrix and the Lorenz system are adopted to encrypt plain medical images, obtaining the cipher messages with a relationship to the plain images. According to our obtained results, the proposed EiMOL encryption algorithm is effective and resistant to the many attacks on benchmark Kaggle and Open-i datasets. Further, extensive experimental results demonstrate that the proposed algorithm outperforms the state-of-the-art approaches.
- [1] . 2021. Internet of things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities. IEEE Internet of Things Journal 8, 13 (2021), 10474–10498.Google Scholar
Cross Ref
- [2] . 2021. A survey on healthcare data: A security perspective. ACM Transactions on Multimedia Computing Communications and Applications 17, 2s (2021), 1–26.Google Scholar
Digital Library
- [3] . 2022. Medical image watermarking for telemedicine application security. Journal of Circuits, Systems, and Computers 31, 5 (2022), 2250097.Google Scholar
Cross Ref
- [4] . 2021. Improved method of optimization-based ECG signal watermarking. Journal of Electronic Imaging 31, 4 (2021), 041207.Google Scholar
- [5] . 2021. An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Medical and Biological Engineering and Computing 59, 3 (2021), 589–605.Google Scholar
- [6] . 2022. SecDH: Security of COVID-19 images based on data hiding with PCA. Computer Communications 191 (2022), 368–377.Google Scholar
Digital Library
- [7] . 2022. Hybrid nature-inspired optimization and encryption-based watermarking for E-Healthcare. IEEE Transactions on Computational Social Systems (2022), 1--8.Google Scholar
Cross Ref
- [8] . 2022. Image copyright protection based on blockchain and zero-watermark. IEEE Transactions on Network Science and Engineering 9, 4 (2022), 2188--2199.Google Scholar
- [9] . 2021. A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wireless Personal Communications (2021), 1–28.Google Scholar
Digital Library
- [10] . 2022. Special section on AI-empowered multimedia data analytics for smart healthcare. ACM Transactions on Multimedia Computing, Communications, and Applications 18, 1s (2022), 38.Google Scholar
- [11] . 2021. Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption. Multidimensional Systems and Signal Processing 32, 1 (2021), 281–301.Google Scholar
Digital Library
- [12] . 2021. Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Computing and Applications 33, 12 (2021), 6671–6684.Google Scholar
Digital Library
- [13] . 2022. An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dynamics 108, 3 (2022), 2671–2704.Google Scholar
- [14] . 2021. A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption. SoftComputing 25, 7 (2021), 5299–5322.Google Scholar
- [15] . 2022. 2D fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm. Neural Computing and Applications 34, 6 (2022), 4295–4319.Google Scholar
Digital Library
- [16] . 2022. An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system. SoftComputing 26, 11 (2022), 5409–5435.Google Scholar
- [17] . 2021. GSAPSO-MQC:Medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system. Evolutionary Intelligence 14, 4 (2021), 1817–1829.Google Scholar
Cross Ref
- [18] . 2022. A novel security framework for medical data in IoT ecosystem. IEEE MultiMedia 29, 02 (2022), 34–44.Google Scholar
Cross Ref
- [19] . 2022. A practical medical image cryptosystem with parallel acceleration. Journal of Ambient Intelligence and Humanized Computing (2022), 1–15.Google Scholar
- [20] . 2021. A novel multiobjective gdwcn-pso algorithm and its application to medical data security. ACM Transactions on Internet Technology 21, 2 (2021), 1–28.Google Scholar
Digital Library
- [21] . 2019. Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys. Neural Computing and Applications 31, 7 (2019), 2395–2405.Google Scholar
Digital Library
- [22] . 2019. Image encryption using finite-precision error. Chaos, Solitons and Fractals 123 (2019), 69–78.Google Scholar
- [23] https://openi.nlm.nih.gov/gridquery?it=c,xg,m,u&m=1&n=100.Google Scholar
- [24] https://www.kaggle.com/datasets/navoneel/brain-mri-images-for-brain-tumor-detection.Google Scholar
- [25] . 2015. A novel chaotic image encryption scheme using DNA sequence operations. Optics and Lasers in Engineering 73 (2015), 53–61.Google Scholar
Cross Ref
- [26] . 2018. An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dynamics 94, 1 (2018), 745–756.Google Scholar
Cross Ref
- [27] . 2016. An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dynamics 86, 1 (2016), 639–653.Google Scholar
Cross Ref
- [28] . 2022. An efficient image encryption scheme for healthcare applications. Multimedia Tools and Applications 81, 5 (2022), 7253–7270.Google Scholar
- [29] . 2022. Towards integrating image encryption with compression: A survey. ACM Transactions on Multimedia Computing, Communications, and Applications 18, 3 (2022), 1–21.Google Scholar
Digital Library
- [30] . 2011. NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications 1, 2 (2011), 31–38.Google Scholar
- [31] . 2006. Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos 16, 8 (2006), 2129–2151.Google Scholar
- [32] . 2012. A novel colour image encryption algorithm based on chaos. Signal Processing 92, 4 (2012), 1101–1108.Google Scholar
Digital Library
- [33] . 2019. A novel image encryption scheme based on an elliptic curve. Signal Processing 155 (2019), 391–402.Google Scholar
Cross Ref
Index Terms
EiMOL: A Secure Medical Image Encryption Algorithm based on Optimization and the Lorenz System
Recommendations
Complex entropy based encryption and decryption technique for securing medical images
AbstractDuring medical picture transmission, the most pressing concern is security. Medical images must be encrypted since they are extremely sensitive. Watermarking, digital fingerprinting/signature, and encoding are some of the available image security ...
Modified RSA Encryption Algorithm (MREA)
ACCT '12: Proceedings of the 2012 Second International Conference on Advanced Computing & Communication TechnologiesIn asymmetric key cryptography, also called Public Key cryptography, two different keys (which forms a key pair) are used. One key is used for encryption & only the other corresponding key must be used for decryption. No other key can decrypt the ...
RETRACTED ARTICLE: Hybrid optimization with cryptography encryption for medical image security in Internet of Things
AbstractThe development of the Internet of Things (IoT) is predicted to change the healthcare industry and might lead to the rise of the Internet of Medical Things. The IoT revolution is surpassing the present-day human services with promising mechanical, ...






Comments