Digital Medical Images Encryption Approach in Real Time Applications

Muaayed F. Al-Rawi, Izz K. Abboud, Nasir A. Al-Awad


Patient information and medical imaging data are now subject to stringent data security and confidentiality standards as a direct result of the proliferation of telemedicine techniques and medical imaging instruments. Because of the problems described above, as well as the possibility of data or information being stolen, this brings up the dilemma of transmitting data on medical images via an open network. In the past, potential solutions included the utilization of methods such as information concealment and image encryption. Nevertheless, attempting to reconstruct the original image utilizing these approaches may result in complications. In the process of this paper, an algorithm for safeguarding medical images based on the pixels of interest was established. Detection of image histogram peaks for the purpose of calculating peaks in medical pictures pixels of interest in medical images that have had their threshold values processed. The threshold is shown by taking the average of all the peaks in the histogram. After that, a Sudoku matrix is used to assign values of interest to each of these pixels. The proposed method will be assessed by a variety of statistical procedures, and the outcomes of these analyses will be compared to previously established standards. According to the findings, the suggested method has superior security performance in comparison to other image encryption methods already in use.

Full Text:



B. Thomee, D. A. Shamma, G. Friedland, “YFCC100M: The New Data in Multimedia Research,” Communications of the Acm, vol. 59, no. 2, pp. 64-73, 2019.

S. Pouyanfar, Y. Yang, S. C. Chen, “Multimedia Big Data Analytics: A Survey,” Acm Computing Surveys, vol. 51, no. 1, pp. 1-34,2018.

Y . Sun, S. Fang, Y . Hwang, “Investigating Privacy and Information Disclosure Behavior in Social Electronic Commerce,” Sustainability, vol. 11, no. 12, pp. 1-27, 2019.

M. Han, L. Li, Y . Xie, “Cognitive Approach for Location Privacy Protection,” IEEE Access, vol. 6, pp. 13466-13477, 2018.

S. Liu, C. Guo, J. T . Sheridan, “A review of optical image encryption techniques,” Optics & Laser Technology, vol. 57, pp. 327-342, 2014.

Y . Dai, H. Wang, Z. Zhou, “Research on medical image encryption in telemedicine systems,” Technology and Health Care, vol. 24, no. s2, pp. S435-S445,2020.

G. Chen, Y. Mao, and C. Chui, “A symmetric image encryption based on 3d chaotic cat maps,” Chaos, Solitons Fractals, v21, pp. 749–761, 2018.

R. Enayatifar, A. H. Abdullah, and I. F. Isnin, “Chaos-based imageencryption using a hybrid genetic algorithm and a dna sequence,” Optics and Lasers in Engineering, vol. 56, pp. 83–93, 2017.

A. Zengin, and I. Pehlivan, “A novel hybrid encryption algorithm based on chaos and s-aes algorithm,” Nonlinear Dynamics, vol. 92, no. 4, pp. 1745–1759, 2018.

J. Wu, X. Liao, and B. Yang, “Color image encryption based on chaotic systems and elliptic curve elgamal scheme,” Signal Processing, vol. 141, pp. 109–124, 2017.

C. Paar and J. Pelzl, “Understanding cryptography: a textbook for students and practitioners Springer Science & Business Media, 2009.

Z. Su, G. Zhang, and J. Jiang, “Multimedia security: a survey of chaos based encryption technology,” in Multimedia-A Multidisciplinary Approach to Complex Issues. InTech, , pp. 99–124, 2012.

T. Xiang, S. Guo, and X. Li, “Perceptual visual security index based on edge and texture similarities,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 951–963, 2016.

M. Noura, H. Noura, A. Chehab, M. M. Mansour, L. Sleem, and R. Couturier, “A dynamic approach for a lightweight and secure cipher for medical images,” Multimedia Tools and Applications, vol. 77, no. 23, pp. 31 397–31 426, 2018.

M. Li, D. Lu, W. Wen, “Cryptanalyzing a color image encryption scheme based on hybrid hyper-chaotic system and cellular automata,” IEEE Access, vol. 6, pp. 47102-47111, 2018.

L. Xu, Z. Li, J. Li, “A novel bit-level image encryption algorithm based on chaotic maps,” Optics and Lasers in Engineering, vol.78, pp.17-25, 2021.

L. Teng, X. Wang, J. Meng, “A chaotic color image encryption using integrated bit-level permutation,” Multimedia Tools and Applications, vol.77, no. 6, pp. 6883-6896, 2018.


  • There are currently no refbacks.

Abava  Кибербезопасность FRUCT 2023

ISSN: 2307-8162