Abstract
Security threats are crucial challenges that deter Mixed reality (MR) communication in medical telepresence. This research aims to improve the security by reducing the chances of types of various attacks occurring during the real-time data transmission in surgical telepresence as well as reduce the time of the cryptographic algorithm and keep the quality of the media used. The proposed model consists of an enhanced RC6 algorithm in combination. Dynamic keys are generated from the RC6 algorithm mixed with RC4 to create dynamic S-box and permutation table, preventing various known attacks during the real-time data transmission. For every next session, a new key is created, avoiding possible reuse of the same key from the attacker. The results obtained from our proposed system are showing better performance compared to the state of art. The resistance to the tested attacks is measured throughout the entropy, Pick to Signal Noise Ratio (PSNR) is decreased for the encrypted image than the state of art, structural similarity index (SSIM) closer to zero. The execution time of the algorithm is decreased for an average of 20%. The proposed system is focusing on preventing the brute force attack occurred during the surgical telepresence data transmission. The paper proposes a framework that enhances the security related to data transmission during surgeries with acceptable performance.
Similar content being viewed by others
References
Alfalou A, Brosseau C, Abdallah N, Jridi M (2013) Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks. Opt Express 21(7):8025–8043
Alfalou C, Brosseau NA, Jridi M (2011) Simultaneous fusion, compression, and encryption of multiple images. Opt Express 19(24):24023–24029
Al-Maadeed S, Al-Ali A, Abdalla T, Bouridane A (2012) A new chaos-based image-encryption and compression algorithm. J Electr Comput Eng 2012:1–11
Andrews JG, Ghosh A, Muhamed R (2007) Fundamentals of WiMAX: understanding broadband wireless networking. Prentice Hall, Upper Saddle River, NJ
Bhatnagar G, Jonathan Wu QM (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Processing 22(4):648–663
Chen S, Yu S, Lü J, Chen G, He J (2018) Design and FPGA-based realization of a chaotic secure video communication system. IEEE Transactions on Circuits and Systems for Video Technology 28(9):2359–2371
Darwish SM (2019) A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding. Multimed Tools Appl 78(14):19229–19252
El-Bakary E, El-Shafai W, El-Rabaie S, Zahran O, El-Halawany M, Abd El-Samie F (2019) Proposed enhanced hybrid framework for efficient 3D-MVC and 3D-HEVC wireless communication. Multimed Tools Appl 78(11):14173–14193
Fawaz Z, Noura H, Mostefaoui A (2016) An efficient and secure cipher scheme for images confidentiality preservation. Signal Process Image Commun 42:90–108
Haque SA, Aziz SM, Rahman M (2014) Review of cyber-physical system in healthcare. Int J Distrib Sens Netw 10(4):1–20
Hofmeister T, Krause M, Simon H (2000) Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor Comput Sci 240(2):471–485
Jridi M, Alfalou A (2018) Real-time and encryption efficiency improvements of simultaneous fusion, compression and encryption method based on chaotic generators. Opt Lasers Eng 102:59–69
Li Y, Zhang S, Yin Y, Xiao W, Zhang J (2017) A novel online sequential extreme learning machine for gas utilization ratio prediction in blast furnaces. Sensors 17(8):1–24
Lin Z, Yu S, Lü J, Cai S, Chen G (2015) Design an ARM-embedded implementation of a chaotic map-based real-time secure video communication system. IEEE Transactions on Circuits and Systems for Video Technology 25(7):1203–1216
Long M, Peng F, Li H-y (2018) Separable reversible data hiding and encryption for HEVC video. J Real-Time Image Proc 14(1):171–182
Mishra C, Agarwal AS, Bedi P (2014) Optimized gray-scale image watermarking using DWT–SVD and firefly algorithm. Expert Syst Appl 41(17):7858–7867
Nkandeu YPK, Tiedeu A (2019) An image encryption algorithm based on substitution technique and chaos mixing. Multimed Tools Appl 78(8):10013–10034
Noura H, Noura M, Chehab A, Mansour M, Couturier R (2019) Efficient and secure cipher scheme for multimedia contents. Multimed Tools Appl 78(11):14837–14866
Noura H, Sleem L, Noura M, Mansour M, Chehab A, Couturier R (2018) A new efficient lightweight and secure image cipher scheme. Multimed Tools Appl 77(12):15457–15484
Pareek N, Patidar V (2016) Medical image protection using genetic algorithm operations. Soft Comput 20(2):763–772
Preishuber M, Hutter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensic Secur 13(9):2137–2150
Premkumar R, Anand S (2019) Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl 78(8):9577–9593
Rajpal AM, Bala R (2019) A novel fuzzy frame selection based watermarking scheme for MPEG-4 videos using Bi-directional extreme learning machine. Appl Soft Comput J 74:603–620
Selecky M, Faigl J, Rollo M (2018) Communication architecture in mixed-reality simulations of unmanned systems. Sensors 18(3):853–872
Selva GM, Kumar SM (2019) Secure grayscale image communication using significant visual cryptography scheme in real-time applications. Multimed Tools Appl:1–20
Shah RA, Asghar MN, Abdullah S, Fleury M, Gohar N (2019) Effectiveness of crypto-transcoding for H.264/AVC and HEVC video bit-streams. Multimed Tools Appl 78(15):21455–21484
Sharma G, Rathee R, Kumar H, Saini V, Vijaykumar YN, Chilamkurti N (2019) A secure, energy- and SLA-efficient (SESE) E-healthcare framework for quickest data transmission using cyber-physical system. Sensors 19(9):1–22
Sridhar KP, Baskar S, Shakeel MP, Dhulipala SVR (2018) Developing brain abnormality recognize system using multi-objective pattern producing neural network. J Ambient Intell Humaniz Comput 10(8):3287–3295
Venckauskas N, Morkevicius K, Bagdonas RD, Maskeliunas R (2018) A lightweight protocol for secure video streaming. Sensors 18(5):1–15
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18
Xiang T, Qu J, Xiao D (2014) Joint SPIHT compression and selective encryption. Applied Soft Computing Journal 21:159–170
Xu D (2019) Commutative encryption and data hiding in HEVC video compression. IEEE Access 7:66028–66041
Yang B, Liao X (2018) A new color image encryption scheme based on logistic map over the finite field ZN. Multimed Tools Appl 77(16):21803–21821
Yang J, Zhou C, Yang S, Xu H, Hu B (2018) Anomaly detection based on zone partition for security protection of industrial cyber-physical systems. IEEE Trans Ind Electron 65(5):4257–4267
Yao Y, Zhang W, Yu N (2016) Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams. Signal Process 128:531–545
Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29(8):902–913
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Donev, R., Alsadoon, A., Prasad, P.W.C. et al. A novel secure solution of using mixed reality in data transmission for bowel and jaw surgical telepresence: enhanced rivest cipher RC6 block cipher. Multimed Tools Appl 80, 5021–5046 (2021). https://doi.org/10.1007/s11042-020-09934-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09934-y