Abstract
Mixed Reality (MR) surgery has not been effectively implemented in telemedicine due to strict requirements of security and delay minimization during real-time video transmission. Hence, this paper aims to propose a novel solution for Surgical Telepresence with highly secured and faster real-time video transmission. The proposed system consists of three components: Authentication (Pre-surgery), Data transmission (During-Surgery), and Storage (Post-Surgery). For Authentication, Pass-Matrix technique is used at both ends to provide graphical passwords. During the surgery, a hybrid system is used to provide highly secured and faster real-time video transmission. This system includes a Feistel Encryption System (FES), Modified Scaled Zhongtang Chaotic System (M-SCZS), and Modified Advanced Encryption System (M-AES) algorithm. After Surgery, the transmitted data are stored using the Information Accountability Framework (IAF) for future purposes. The results are obtained from the during-surgery stage for jaw, breast, and bowel surgery. Both solutions are simulated in MATLAB on a personal computer with average processing capability. The proposed solution improves the entropy from 7.733~7.782 to 7.798–7.996 and reduces the processing time from 8.642~9.911 s/frames to 5.071~6.563 s/frames. The proposed focus on reducing the total processing time for the encryption and decryption process with improving security during the surgery process. Finally, this solution provides a fast security system for surgical telepresence that helps both local and remote surgeons for secure real-time communication. The complexity for this work need to know the used chaotic method, the values of the chaotic parameters and for which this method was used, in addition to the complexity of state of the art.
Similar content being viewed by others
References
Aljawarneh S, Yassein MB, Talafha WAA (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76:22703–22724. https://doi.org/10.1007/s11042-016-4333-y
Altaf M, Ahmad A, Khan FA, Uddin Z, Yang X (2018) Computationally efficient selective video encryption with chaos based block cipher. Multimed Tools Appl 77:27981–27995. https://doi.org/10.1007/s11042-018-6022-5
Arya A (2016) A review paper on effective AES implementation. International Journal of Engineering and Computer Science. https://doi.org/10.18535/ijecs/v4i12.52
Atteya AM, Madian AH (2014) A hybrid Chaos-AES encryption algorithm and its implementation based on FPGA. In: 2014 IEEE 12th international new circuits and systems conference (NEWCAS). https://doi.org/10.1109/newcas.2014.6934022
Çavuşoğlu Ü, Kaçar S, Zengin A, Pehlivan I (2018) A novel hybrid encryption algorithm based on chaos and S-AES algorithm. Nonlinear Dynamics 92:1745–1759. https://doi.org/10.1007/s11071-018-4159-4
Fairchild AJ, Campion SP, Garcia AS, Wolff R, Fernando T, Roberts DJ (2017) A mixed reality Telepresence system for collaborative space operation. IEEE Transactions on Circuits and Systems for Video Technology 27:814–827. https://doi.org/10.1109/tcsvt.2016.2580425
Farah MAB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics 99:3041–3064. https://doi.org/10.1007/s11071-019-05413-8. © Springer Nature B.V. 2019
Farah MAB, Guesmi R, Kachouri A, Samet M (2020) A new design of cryptosystem based on S-box and chaotic permutation. Multimedia Tools and Applications, Springer Science+Business Media, LLC, part of Springer Nature. https://doi.org/10.1007/s11042-020-08718-8
Hayajneh T, Ullah S, Mohd BJ, Balagani KS (2017) An enhanced WLAN security system with FPGA implementation for multimedia applications. IEEE Syst J 11:2536–2545. https://doi.org/10.1109/jsyst.2015.2424702
Hazra A (2017) Using the confidence interval confidently. Journal of Thoracic Disease 9:4124–4129. https://doi.org/10.21037/jtd.2017.09.14
Jevdjic D, Strauss K, Ceze L, Malvar HS (2017) Approximate storage of compressed and encrypted videos. ACM SIGPLAN Not 52:361–373. https://doi.org/10.1145/3093336.3037718
Liu R, Liu J, Zhang J, Zhang M (2018) Video data integrity verification method based on full Homomorphic encryption in cloud system. International Journal of Digital Multimedia Broadcasting 2018:1–9. https://doi.org/10.1155/2018/7543875
Meenpal T (2016) A light weight and secure video conferencing scheme utilizing public network. Multimed Tools Appl 76:3699–3714. https://doi.org/10.1007/s11042-016-3973-2
Musa MA, Schaefer EF, Wedig S (2003) A simplified Aes algorithm and its linear and differential cryptanalyses. Cryptologia 27:148–177. https://doi.org/10.1080/0161-110391891838
Nestor T, De Dieu NJ, Jacques K, Yves EJ, Iliyasu AM, Abd El-Latif AA (2020) Multidimensional Hyperjerk oscillator: dynamics analysis, analogue and embedded systems implementation, and its application as a cryptosystem. Sensors 20(1):83
Pan J, Xu Z, Li S (2012) Security mechanism for a wireless-sensor-network-based healthcare monitoring system. IET Commun 6:3274–3280. https://doi.org/10.1049/iet-com.2011.0097
Pande AP, Thakur NV (2017) A survey on different ways of secure image transmission. International Research Journal of Engineering and Technology (IRJET) 5:407–413
Preetha M, Nithya M (2013) A study and performance analysis of rsa algorithm. Int J Comput Sci Mob Comput 2:126–139
Rajalakshmi K, Mahesh K (2017) ZLBM: zero level binary mapping technique for video security. Multimed Tools Appl 77:13225–13247. https://doi.org/10.1007/s11042-017-4942-0
Roman H, YouTube (2017) https://www.youtube.com/watch?v=J-E_vbpisjE
Roy S, Rutherford M, Crawshaw CH (2016) Towards designing and implementing a secure one time password (OTP) authentication system. In: 2016 IEEE 35th international performance computing and communications conference (IPCCC). https://doi.org/10.1109/pccc.2016.7820604
Salim E, Herba I (2017) Secure data encryption through a combination of AES, RSA and HMAC, engineering. Technology & Applied Science Research 7:1781–1785
Sallam AI, Faragallah OS, El-Rabaie E-SM (2018) HEVC selective encryption using RC6 block cipher technique. IEEE Transactions on Multimedia 20:1636–1644. https://doi.org/10.1109/tmm.2017.2777470
SDM, YouTube (2018) https://www.youtube.com/watch?v=mT0qTy4RZ1I
Shannon CE (1949) Communication theory of secrecy systems*. Bell System Technical Journal 28:656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Sobh TS, Aly Y (2011) Effective and extensive virtual private network. J Inf Secur 02:39–49. https://doi.org/10.4236/jis.2011.21004
Tabash FK, Izharuddin M (2018) Efficient encryption technique for H.264/AVC videos based on CABAC and logistic map. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6494-3
Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process 141:217–227. https://doi.org/10.1016/j.sigpro.2017.06.010
Tsafacka N, Kengne J, Abd-El-Attyc B, Iliyasud AM, Hirota K, Abd EL-Latif AA (2020) Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf Sci 515:191–217
Usman M, Jan MA, He X (2017) Cryptography-based secure data storage and sharing using HEVC and public clouds. Inf Sci 387:90–102. https://doi.org/10.1016/j.ins.2016.08.059
Wickramage C, Sahama T, Fidge C (2016) Anatomy of log files: implications for information accountability measures. In: 2016 IEEE 18th international conference on e-health networking, applications and services (Healthcom). https://doi.org/10.1109/healthcom.2016.7749426
Wu T-S, Lee M-L, Lin H-Y, Wang C-Y (2013) Shoulder-surfing-proof graphical password authentication scheme. Int J Inf Secur 13:245–254. https://doi.org/10.1007/s10207-013-0216-7
YouTube (2011) https://youtu.be/VJ8sZRCKaS0
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
Rights and permissions
About this article
Cite this article
Neupane, A., Alsadoon, A., Prasad, P.W.C. et al. A novel Modified Chaotic Simplified Advanced Encryption System (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl 79, 29043–29067 (2020). https://doi.org/10.1007/s11042-020-09478-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09478-1