Skip to main content
Log in

DNA-chaos governed cryptosystem for cloud-based medical image repository

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Nowadays, digital medical images have become an essential source for the grand success of e-health technology. At the same time, the massive storage also plays a vital role. One of cloud storage’s main objectives is the affordable and easily accessible storage of vast amounts of multi-structured data. The cloud paradigm gives an illusion of infinite storage of data. The future of Cyber-Physical Systems (CPS) relies upon technologies like cloud computing to thrive. However, the major lacuna is data security. This paper deals with the Confidentiality Integrity Availability (CIA) aspects required for cloud-based medical image repositories. Since it is for the medical image, the Region of Interest (RoI) is separated, and the integrity check is applied for RoI. A two-tier security for the medical image has been proposed, including an additional security layer for RoI. A 3-D Lorenz chaotic attractor has been used to generate the key where the keyspace is widely increased. Deoxyribonucleic Acid (DNA) based image diffusion in different stages of cryptosystem offered an average entropy of 7.98042 and a correlation of 0.002864 for RoI only and for ciphered medical image an average entropy of 7.99724 and a correlation of − 0.00063. Text encryption is performed over metadata to ensure the privacy of client authentication. Encrypted metadata and 320 bits have been generated for the RoI part embedded in an image’s Non-Region of Interest (NRoI) part in the random pixel indexes obtained using a 1D Tent map. This proposed approach also gives a Graphical User Interface developed using Python 3.8 to support non-technical persons or medical practitioners. The proposed security framework provides a complete CIA triad for medical image repositories in the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

The datasets generated during and/or analysed during the current study are available from the corresponding author upon reasonable request.

References

  1. Zandesh, Z., Ghazisaeedi, M., Devarakonda, M.V., Haghighi, M.S.: Legal framework for health cloud: a systematic review. Int. J. Med. Inform. 132, 103953 (2019)

    Article  Google Scholar 

  2. Akinrolabu, O., Nurse, J.R.C., Martin, A., New, S.: Cyber risk assessment in cloud provider environments: current models and future needs. Comput. Secur. 87, 101600 (2019)

    Article  Google Scholar 

  3. Azeez, N.A., der Vyver, C.: Security and privacy issues in e-health cloudbasedsystem: a comprehensive content analysis. Egypt. Inform. J. 20(2), 97–108 (2019)

    Article  Google Scholar 

  4. Rady, M., Abdelkader, T., Ismail, R.: Integrity and confidentiality in cloud outsourced data. Ain Shams Eng. J. 10(2), 275–285 (2019)

    Article  Google Scholar 

  5. Borra, S., Thanki, R., Dey, N., Borisagar, K.: Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform andcompressive sensing. Smart Heal. 12, 35–48 (2019)

    Article  Google Scholar 

  6. Ravichandran, D., Praveenkumar, P., Rayappan, J.B.B., Amirtharajan, R.: DNA chaos blend to secure medical privacy. IEEE Trans. Nanobiosci. 6(8), 850–858 (2017)

    Article  Google Scholar 

  7. Hua, Z., Yi, S., Zhou, Y.: Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144, 134–144 (2018)

    Article  Google Scholar 

  8. Zhang, Y.: 2020“The fast image encryption algorithm based on lifting scheme and chaos. Inform. Sci. 520, 177–194 (2020)

    Article  MathSciNet  Google Scholar 

  9. Lone, M.A., Qureshi, S.: RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and affine hill cipher. Optik (2022). https://doi.org/10.1016/j.ijleo.2022.168880

    Article  Google Scholar 

  10. Zhao, C.F., Ren, H.P.: Image encryption based on hyper-chaotic multi-attractors. Nonlinear Dyn. 100, 679–698 (2020). https://doi.org/10.1007/s11071-020-05526-5

    Article  Google Scholar 

  11. Lakshmi, C., Thenmozhi, K., Rayappan, J.B.B., et al.: Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Comput. Appl. 33, 6671–6684 (2021). https://doi.org/10.1007/s00521-020-05447-9

    Article  Google Scholar 

  12. Li, J., Chen, L., Cai, W., Xiao, J., Zhu, J., Hu, Y., Wen, K.: Holographic encryption algorithm based on bit-plane decomposition and hyperchaotic lorenz system. Opt. Laser Technol. (2022). https://doi.org/10.1016/j.optlastec.2022.108127

    Article  Google Scholar 

  13. Dash, S., Padhy, S., Devi, S.A., Sachi, S., Patro, K.A.K.: An efficient Intra-Inter pixel encryption scheme to secure healthcare images for an IoT environment. Exp. Syst. Appl. 231, 120622 (2023)

    Article  Google Scholar 

  14. Sheng, Q., Fu, C., Lin, Z., Tie, M., Chen, J., Sham, C.W.: A one-time-pad-like chaotic image encryption scheme using data steganography. J. Inform. Secur. Appl. 78, 103592 (2023)

    Google Scholar 

  15. Zhang, F., Zhang, X., Cao, M., Ma, F., Li, Z.: Characteristic analysis of 2D lag-complex logistic map and its application in image encryption. IEEE Multimed 28(4), 96–106 (2021). https://doi.org/10.1109/MMUL.2021.3080579

    Article  Google Scholar 

  16. Kumar, K., Roy, S., Rawat, U., Malhotra, S.: IEHC: An efficient image encryption technique using hybrid chaotic map. Chaos Solitons Fractals 158, 111994 (2022)

    Article  Google Scholar 

  17. Rezaei, B., Mobasseri, M., Enayatifar, R.: A secure, efficient and super-fast chaos-based image encryption algorithm for real-time applications. J. Real-Time Image Proc. 20(2), 30 (2023)

    Article  Google Scholar 

  18. Zhao, J., Wang, S., Zhang, L.: Block Image encryption algorithm based on novel chaos and DNA encoding. Information 14, 150 (2023). https://doi.org/10.3390/info14030150

    Article  Google Scholar 

  19. Mahalingam, H., Veeramalai, T., Menon, A.R., Amirtharajan, R.: Dual-Domain image encryption in unsecure medium—A secure communication perspective. Mathematics (2023). https://doi.org/10.3390/math11020457

    Article  Google Scholar 

  20. Jiang, Z., Liu, X.: Image encryption algorithm based on discrete quantum baker map and chen hyperchaotic system. Int. J. Theor. Phys. 62, 22 (2023)

    Article  MathSciNet  Google Scholar 

  21. Wang, W.T., Sun, J.Y., Zhang, H., Zhang, J.: Quantum cryptosystem and circuit design for color image based on novel 3D Julia-fractal chaos system. Quantum Inf. Process. 22(1), 64 (2023)

    Article  MathSciNet  Google Scholar 

  22. Wang, H.K., Xu, G.B., Jiang, D.H.: Quantum grayscale image encryption and secret sharing schemes based on Rubik’s Cube. Phys. A: Stat. Mech. Appl. 612, 128482 (2023)

    Article  Google Scholar 

  23. Hao, W., Zhang, T., Chen, X., Zhou, X.: A hybrid NEQR image encryption cryptosystem using two-dimensional quantum walks and quantum coding. Signal Process. 205, 108890 (2023)

    Article  Google Scholar 

  24. Kumari, P., Mondal, B.: Lightweight image encryption algorithm using NLFSR and CBC mode. J. Supercomput. (2023). https://doi.org/10.1007/s11227-023-05415-9

    Article  Google Scholar 

  25. Huang, J., Guo, Y., Gao, R., et al.: Medical image encryption based on fisher-yates scrambling and filter diffusion. J. Shanghai Jiaotong Univ. (Sci.) (2023). https://doi.org/10.1007/s12204-023-2618-7

    Article  Google Scholar 

  26. Wang, X., Xue, W., An, J.: Image encryption algorithm based on LDCML and DNA coding sequence. Multimed. Tools Appl. (2020). https://doi.org/10.1007/s11042-020-09688-7

    Article  Google Scholar 

  27. Aashiq Banu, S., Amirtharajan, R.: Tri-level scrambling and enhanced diffusion for DICOM image cipher- DNA and chaotic fused approach. Multimed. Tools Appl. (2020). https://doi.org/10.1007/s11042-020-09501-5

    Article  Google Scholar 

  28. Dagadu, J.C., Li, J.P., Aboagye, E.O.: Medical image encryption based on hybrid chaotic DNA diffusion. Wireless Pers. Commun. 108, 591–612 (2019). https://doi.org/10.1007/s11277-019-06420-z

    Article  Google Scholar 

  29. Zhu, S., Deng, X., Zhang, W., Zhu, C.: Image encryption scheme based on newly designed chaotic map and parallel DNA coding. Mathematics 11, 231 (2023). https://doi.org/10.3390/math11010231

    Article  Google Scholar 

  30. Mahalingam, H., Velupillai Meikandan, P., Thenmozhi, K., Moria, K.M., Lakshmi, C., Chidambaram, N., Amirtharajan, R.: Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments. Mathematics. 11(8), 1769 (2023). https://doi.org/10.3390/math11081769

    Article  Google Scholar 

  31. Kaur, C., Kanwal, N.: An analysis of image forgery detection techniques. Stat. Optim. Inf. Comput. 7, 486–500 (2019)

    Article  MathSciNet  Google Scholar 

  32. Chidambaram, N., Raj, P., Thenmozhi, K., et al.: A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images. Multimed. Tools Appl. 80, 23359–23375 (2021). https://doi.org/10.1007/s11042-020-10210-2

    Article  Google Scholar 

  33. Rajagopalan, S., Poori, S., Narasimhan, M., et al.: Chua’s diode and strange attractor: a three-layer hardware–software co-design for medical image confidentiality. IET Image Proc. 14, 1248–1256 (2020). https://doi.org/10.1049/iet-ipr.2019.0562

    Article  Google Scholar 

  34. Ke, G., Wang, H., Zhou, S., Zhang, H.: Encryption of medical image with most significant bit and high capacity in piecewise linear chaos graphics. Measurement 135, 385–391 (2019)

    Article  Google Scholar 

  35. Watson, J.D., Crick, F.H.C., et al.: Molecular structure of nucleic acids. Nature 171(4356), 737–738 (1953)

    Article  Google Scholar 

Download references

Acknowledgements

Authors thank the Department of Science & Technology, New Delhi, for the FIST funding (SR/FST/ETI/2018/221(C)). Also, the authors wish to thank the Intrusion Detection Lab at School of Electrical & Electronics Engineering, SASTRA Deemed University, for providing infrastructural support to carry out this research work.

Funding

DST FIST FUND,SR/FST/ET-I/2018/221(C),SR/FST/ET-I/2018/221(C)

Author information

Authors and Affiliations

Authors

Contributions

CN: Conceptualisation, Methodology, Software, Data curation, Writing- Original draft preparation. PR: Validation, Visualisation, Investigation, Data curation, KT and RA: Validation, Supervision. Writing- Reviewing and Editing. All authors reviewed the manuscript.

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chidambaram, N., Thenmozhi, K., Raj, P. et al. DNA-chaos governed cryptosystem for cloud-based medical image repository. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04391-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04391-w

Keywords

Navigation