Skip to main content
Log in

A novel Modified Chaotic Simplified Advanced Encryption System (MCS-AES): mixed reality for a secure surgical tele-presence

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Mixed Reality (MR) surgery has not been effectively implemented in telemedicine due to strict requirements of security and delay minimization during real-time video transmission. Hence, this paper aims to propose a novel solution for Surgical Telepresence with highly secured and faster real-time video transmission. The proposed system consists of three components: Authentication (Pre-surgery), Data transmission (During-Surgery), and Storage (Post-Surgery). For Authentication, Pass-Matrix technique is used at both ends to provide graphical passwords. During the surgery, a hybrid system is used to provide highly secured and faster real-time video transmission. This system includes a Feistel Encryption System (FES), Modified Scaled Zhongtang Chaotic System (M-SCZS), and Modified Advanced Encryption System (M-AES) algorithm. After Surgery, the transmitted data are stored using the Information Accountability Framework (IAF) for future purposes. The results are obtained from the during-surgery stage for jaw, breast, and bowel surgery. Both solutions are simulated in MATLAB on a personal computer with average processing capability. The proposed solution improves the entropy from 7.733~7.782 to 7.798–7.996 and reduces the processing time from 8.642~9.911 s/frames to 5.071~6.563 s/frames. The proposed focus on reducing the total processing time for the encryption and decryption process with improving security during the surgery process. Finally, this solution provides a fast security system for surgical telepresence that helps both local and remote surgeons for secure real-time communication. The complexity for this work need to know the used chaotic method, the values of the chaotic parameters and for which this method was used, in addition to the complexity of state of the art.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Aljawarneh S, Yassein MB, Talafha WAA (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76:22703–22724. https://doi.org/10.1007/s11042-016-4333-y

    Article  Google Scholar 

  2. Altaf M, Ahmad A, Khan FA, Uddin Z, Yang X (2018) Computationally efficient selective video encryption with chaos based block cipher. Multimed Tools Appl 77:27981–27995. https://doi.org/10.1007/s11042-018-6022-5

    Article  Google Scholar 

  3. Arya A (2016) A review paper on effective AES implementation. International Journal of Engineering and Computer Science. https://doi.org/10.18535/ijecs/v4i12.52

  4. Atteya AM, Madian AH (2014) A hybrid Chaos-AES encryption algorithm and its implementation based on FPGA. In: 2014 IEEE 12th international new circuits and systems conference (NEWCAS). https://doi.org/10.1109/newcas.2014.6934022

  5. Çavuşoğlu Ü, Kaçar S, Zengin A, Pehlivan I (2018) A novel hybrid encryption algorithm based on chaos and S-AES algorithm. Nonlinear Dynamics 92:1745–1759. https://doi.org/10.1007/s11071-018-4159-4

    Article  MATH  Google Scholar 

  6. Fairchild AJ, Campion SP, Garcia AS, Wolff R, Fernando T, Roberts DJ (2017) A mixed reality Telepresence system for collaborative space operation. IEEE Transactions on Circuits and Systems for Video Technology 27:814–827. https://doi.org/10.1109/tcsvt.2016.2580425

    Article  Google Scholar 

  7. Farah MAB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics 99:3041–3064. https://doi.org/10.1007/s11071-019-05413-8. © Springer Nature B.V. 2019

    Article  Google Scholar 

  8. Farah MAB, Guesmi R, Kachouri A, Samet M (2020) A new design of cryptosystem based on S-box and chaotic permutation. Multimedia Tools and Applications, Springer Science+Business Media, LLC, part of Springer Nature. https://doi.org/10.1007/s11042-020-08718-8

  9. Hayajneh T, Ullah S, Mohd BJ, Balagani KS (2017) An enhanced WLAN security system with FPGA implementation for multimedia applications. IEEE Syst J 11:2536–2545. https://doi.org/10.1109/jsyst.2015.2424702

    Article  Google Scholar 

  10. Hazra A (2017) Using the confidence interval confidently. Journal of Thoracic Disease 9:4124–4129. https://doi.org/10.21037/jtd.2017.09.14

    Article  Google Scholar 

  11. Jevdjic D, Strauss K, Ceze L, Malvar HS (2017) Approximate storage of compressed and encrypted videos. ACM SIGPLAN Not 52:361–373. https://doi.org/10.1145/3093336.3037718

    Article  Google Scholar 

  12. Liu R, Liu J, Zhang J, Zhang M (2018) Video data integrity verification method based on full Homomorphic encryption in cloud system. International Journal of Digital Multimedia Broadcasting 2018:1–9. https://doi.org/10.1155/2018/7543875

    Article  Google Scholar 

  13. Meenpal T (2016) A light weight and secure video conferencing scheme utilizing public network. Multimed Tools Appl 76:3699–3714. https://doi.org/10.1007/s11042-016-3973-2

    Article  Google Scholar 

  14. Musa MA, Schaefer EF, Wedig S (2003) A simplified Aes algorithm and its linear and differential cryptanalyses. Cryptologia 27:148–177. https://doi.org/10.1080/0161-110391891838

    Article  MATH  Google Scholar 

  15. Nestor T, De Dieu NJ, Jacques K, Yves EJ, Iliyasu AM, Abd El-Latif AA (2020) Multidimensional Hyperjerk oscillator: dynamics analysis, analogue and embedded systems implementation, and its application as a cryptosystem. Sensors 20(1):83

    Article  Google Scholar 

  16. Pan J, Xu Z, Li S (2012) Security mechanism for a wireless-sensor-network-based healthcare monitoring system. IET Commun 6:3274–3280. https://doi.org/10.1049/iet-com.2011.0097

    Article  Google Scholar 

  17. Pande AP, Thakur NV (2017) A survey on different ways of secure image transmission. International Research Journal of Engineering and Technology (IRJET) 5:407–413

    Google Scholar 

  18. Preetha M, Nithya M (2013) A study and performance analysis of rsa algorithm. Int J Comput Sci Mob Comput 2:126–139

    Google Scholar 

  19. Rajalakshmi K, Mahesh K (2017) ZLBM: zero level binary mapping technique for video security. Multimed Tools Appl 77:13225–13247. https://doi.org/10.1007/s11042-017-4942-0

    Article  Google Scholar 

  20. Roman H, YouTube (2017) https://www.youtube.com/watch?v=J-E_vbpisjE

  21. Roy S, Rutherford M, Crawshaw CH (2016) Towards designing and implementing a secure one time password (OTP) authentication system. In: 2016 IEEE 35th international performance computing and communications conference (IPCCC). https://doi.org/10.1109/pccc.2016.7820604

  22. Salim E, Herba I (2017) Secure data encryption through a combination of AES, RSA and HMAC, engineering. Technology & Applied Science Research 7:1781–1785

    Google Scholar 

  23. Sallam AI, Faragallah OS, El-Rabaie E-SM (2018) HEVC selective encryption using RC6 block cipher technique. IEEE Transactions on Multimedia 20:1636–1644. https://doi.org/10.1109/tmm.2017.2777470

    Article  Google Scholar 

  24. SDM, YouTube (2018) https://www.youtube.com/watch?v=mT0qTy4RZ1I

  25. Shannon CE (1949) Communication theory of secrecy systems*. Bell System Technical Journal 28:656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

    Article  MathSciNet  MATH  Google Scholar 

  26. Sobh TS, Aly Y (2011) Effective and extensive virtual private network. J Inf Secur 02:39–49. https://doi.org/10.4236/jis.2011.21004

    Article  Google Scholar 

  27. Tabash FK, Izharuddin M (2018) Efficient encryption technique for H.264/AVC videos based on CABAC and logistic map. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6494-3

  28. Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process 141:217–227. https://doi.org/10.1016/j.sigpro.2017.06.010

    Article  Google Scholar 

  29. Tsafacka N, Kengne J, Abd-El-Attyc B, Iliyasud AM, Hirota K, Abd EL-Latif AA (2020) Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf Sci 515:191–217

    Article  Google Scholar 

  30. Usman M, Jan MA, He X (2017) Cryptography-based secure data storage and sharing using HEVC and public clouds. Inf Sci 387:90–102. https://doi.org/10.1016/j.ins.2016.08.059

    Article  MATH  Google Scholar 

  31. Wickramage C, Sahama T, Fidge C (2016) Anatomy of log files: implications for information accountability measures. In: 2016 IEEE 18th international conference on e-health networking, applications and services (Healthcom). https://doi.org/10.1109/healthcom.2016.7749426

  32. Wu T-S, Lee M-L, Lin H-Y, Wang C-Y (2013) Shoulder-surfing-proof graphical password authentication scheme. Int J Inf Secur 13:245–254. https://doi.org/10.1007/s10207-013-0216-7

    Article  Google Scholar 

  33. YouTube (2011) https://youtu.be/VJ8sZRCKaS0

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abeer Alsadoon.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Table 8 Table of Abbreviations

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Neupane, A., Alsadoon, A., Prasad, P.W.C. et al. A novel Modified Chaotic Simplified Advanced Encryption System (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl 79, 29043–29067 (2020). https://doi.org/10.1007/s11042-020-09478-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09478-1

Keywords

Navigation