Skip to main content
Log in

A novel secure solution of using mixed reality in data transmission for bowel and jaw surgical telepresence: enhanced rivest cipher RC6 block cipher

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Security threats are crucial challenges that deter Mixed reality (MR) communication in medical telepresence. This research aims to improve the security by reducing the chances of types of various attacks occurring during the real-time data transmission in surgical telepresence as well as reduce the time of the cryptographic algorithm and keep the quality of the media used. The proposed model consists of an enhanced RC6 algorithm in combination. Dynamic keys are generated from the RC6 algorithm mixed with RC4 to create dynamic S-box and permutation table, preventing various known attacks during the real-time data transmission. For every next session, a new key is created, avoiding possible reuse of the same key from the attacker. The results obtained from our proposed system are showing better performance compared to the state of art. The resistance to the tested attacks is measured throughout the entropy, Pick to Signal Noise Ratio (PSNR) is decreased for the encrypted image than the state of art, structural similarity index (SSIM) closer to zero. The execution time of the algorithm is decreased for an average of 20%. The proposed system is focusing on preventing the brute force attack occurred during the surgical telepresence data transmission. The paper proposes a framework that enhances the security related to data transmission during surgeries with acceptable performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Alfalou A, Brosseau C, Abdallah N, Jridi M (2013) Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks. Opt Express 21(7):8025–8043

    Article  Google Scholar 

  2. Alfalou C, Brosseau NA, Jridi M (2011) Simultaneous fusion, compression, and encryption of multiple images. Opt Express 19(24):24023–24029

    Article  Google Scholar 

  3. Al-Maadeed S, Al-Ali A, Abdalla T, Bouridane A (2012) A new chaos-based image-encryption and compression algorithm. J Electr Comput Eng 2012:1–11

  4. Andrews JG, Ghosh A, Muhamed R (2007) Fundamentals of WiMAX: understanding broadband wireless networking. Prentice Hall, Upper Saddle River, NJ

    Google Scholar 

  5. Bhatnagar G, Jonathan Wu QM (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Processing 22(4):648–663

    Article  MathSciNet  Google Scholar 

  6. Chen S, Yu S, Lü J, Chen G, He J (2018) Design and FPGA-based realization of a chaotic secure video communication system. IEEE Transactions on Circuits and Systems for Video Technology 28(9):2359–2371

    Article  Google Scholar 

  7. Darwish SM (2019) A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding. Multimed Tools Appl 78(14):19229–19252

    Article  Google Scholar 

  8. El-Bakary E, El-Shafai W, El-Rabaie S, Zahran O, El-Halawany M, Abd El-Samie F (2019) Proposed enhanced hybrid framework for efficient 3D-MVC and 3D-HEVC wireless communication. Multimed Tools Appl 78(11):14173–14193

    Article  Google Scholar 

  9. Fawaz Z, Noura H, Mostefaoui A (2016) An efficient and secure cipher scheme for images confidentiality preservation. Signal Process Image Commun 42:90–108

    Article  Google Scholar 

  10. Haque SA, Aziz SM, Rahman M (2014) Review of cyber-physical system in healthcare. Int J Distrib Sens Netw 10(4):1–20

  11. Hofmeister T, Krause M, Simon H (2000) Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor Comput Sci 240(2):471–485

    Article  MathSciNet  Google Scholar 

  12. Jridi M, Alfalou A (2018) Real-time and encryption efficiency improvements of simultaneous fusion, compression and encryption method based on chaotic generators. Opt Lasers Eng 102:59–69

    Article  Google Scholar 

  13. Li Y, Zhang S, Yin Y, Xiao W, Zhang J (2017) A novel online sequential extreme learning machine for gas utilization ratio prediction in blast furnaces. Sensors 17(8):1–24

    Article  Google Scholar 

  14. Lin Z, Yu S, Lü J, Cai S, Chen G (2015) Design an ARM-embedded implementation of a chaotic map-based real-time secure video communication system. IEEE Transactions on Circuits and Systems for Video Technology 25(7):1203–1216

    Article  Google Scholar 

  15. Long M, Peng F, Li H-y (2018) Separable reversible data hiding and encryption for HEVC video. J Real-Time Image Proc 14(1):171–182

    Article  Google Scholar 

  16. Mishra C, Agarwal AS, Bedi P (2014) Optimized gray-scale image watermarking using DWT–SVD and firefly algorithm. Expert Syst Appl 41(17):7858–7867

    Article  Google Scholar 

  17. Nkandeu YPK, Tiedeu A (2019) An image encryption algorithm based on substitution technique and chaos mixing. Multimed Tools Appl 78(8):10013–10034

    Article  Google Scholar 

  18. Noura H, Noura M, Chehab A, Mansour M, Couturier R (2019) Efficient and secure cipher scheme for multimedia contents. Multimed Tools Appl 78(11):14837–14866

    Article  Google Scholar 

  19. Noura H, Sleem L, Noura M, Mansour M, Chehab A, Couturier R (2018) A new efficient lightweight and secure image cipher scheme. Multimed Tools Appl 77(12):15457–15484

    Article  Google Scholar 

  20. Pareek N, Patidar V (2016) Medical image protection using genetic algorithm operations. Soft Comput 20(2):763–772

    Article  Google Scholar 

  21. Preishuber M, Hutter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensic Secur 13(9):2137–2150

  22. Premkumar R, Anand S (2019) Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl 78(8):9577–9593

    Article  Google Scholar 

  23. Rajpal AM, Bala R (2019) A novel fuzzy frame selection based watermarking scheme for MPEG-4 videos using Bi-directional extreme learning machine. Appl Soft Comput J 74:603–620

  24. Selecky M, Faigl J, Rollo M (2018) Communication architecture in mixed-reality simulations of unmanned systems. Sensors 18(3):853–872

    Article  Google Scholar 

  25. Selva GM, Kumar SM (2019) Secure grayscale image communication using significant visual cryptography scheme in real-time applications. Multimed Tools Appl:1–20

  26. Shah RA, Asghar MN, Abdullah S, Fleury M, Gohar N (2019) Effectiveness of crypto-transcoding for H.264/AVC and HEVC video bit-streams. Multimed Tools Appl 78(15):21455–21484

    Article  Google Scholar 

  27. Sharma G, Rathee R, Kumar H, Saini V, Vijaykumar YN, Chilamkurti N (2019) A secure, energy- and SLA-efficient (SESE) E-healthcare framework for quickest data transmission using cyber-physical system. Sensors 19(9):1–22

    Article  Google Scholar 

  28. Sridhar KP, Baskar S, Shakeel MP, Dhulipala SVR (2018) Developing brain abnormality recognize system using multi-objective pattern producing neural network. J Ambient Intell Humaniz Comput 10(8):3287–3295

    Article  Google Scholar 

  29. Venckauskas N, Morkevicius K, Bagdonas RD, Maskeliunas R (2018) A lightweight protocol for secure video streaming. Sensors 18(5):1–15

    Article  Google Scholar 

  30. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  31. Xiang T, Qu J, Xiao D (2014) Joint SPIHT compression and selective encryption. Applied Soft Computing Journal 21:159–170

    Article  Google Scholar 

  32. Xu D (2019) Commutative encryption and data hiding in HEVC video compression. IEEE Access 7:66028–66041

    Article  Google Scholar 

  33. Yang B, Liao X (2018) A new color image encryption scheme based on logistic map over the finite field ZN. Multimed Tools Appl 77(16):21803–21821

    Article  Google Scholar 

  34. Yang J, Zhou C, Yang S, Xu H, Hu B (2018) Anomaly detection based on zone partition for security protection of industrial cyber-physical systems. IEEE Trans Ind Electron 65(5):4257–4267

    Article  Google Scholar 

  35. Yao Y, Zhang W, Yu N (2016) Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams. Signal Process 128:531–545

    Article  Google Scholar 

  36. Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29(8):902–913

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abeer Alsadoon.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Donev, R., Alsadoon, A., Prasad, P.W.C. et al. A novel secure solution of using mixed reality in data transmission for bowel and jaw surgical telepresence: enhanced rivest cipher RC6 block cipher. Multimed Tools Appl 80, 5021–5046 (2021). https://doi.org/10.1007/s11042-020-09934-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09934-y

Keywords

Navigation