Abstract
Medical image encryption is a major issue in healthcare applications where memory, energy, and computational resources are constrained. The modern technological architecture of digital healthcare systems is, in fact, insufficient to handle both the current and future requirements for data. Security has been raised to the highest priority. By meeting these conditions, the hybrid crypto-compression technique introduced in this study can be used for securing the transfer of healthcare images. The approach consists of two components. In order to construct a cutting-edge generative lossy compression system, we first combine generative adversarial networks (GANs) with oearned compression. As a result, the second phase might address this problem by using highly effective picture cryptography techniques. A randomly generated public key is subjected to the DNA technique. In this application, pseudo-random bits are produced by using a logistic chaotic map algorithm. During the substitution process, an additional layer of security is provided to boost the technique’s fault resilience. Our proposed system and security investigations show that the method provides trustworthy and long-lasting encryption and several multidimensional aspects that have been discovered in various public health and healthcare issues. As a result, the recommended hybrid crypto-compression technique may significantly reduce a photo’s size and remain safe enough to be used for medical image encryption.
Similar content being viewed by others
Data Availability
Authors declare that all the data being used in the design and production cum layout of the manuscript is declared in the manuscript.
References
Agustsson E, Tschannen M, Mentzer F, Timofte R, Gool LV (2019) Generative adversarial networks for extreme learned image compression. In: Proceedings of the IEEE/CVF International conference on computer vision, pp 221–231
Ahmad I, Shin S (2021) A novel hybrid image encryption-compression scheme by combining chaos theory and number theory. Signal Process: Image Commun 98:116418
Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and aes algorithm. J Supercomput 75:6663–6682
Berghel H (2017) Equifax and the latest round of identity theft roulette. Comput 50(12):72–76
Boivin A, Lehoux P, Lacombe R, Burgers J, Grol R (2014) Involving patients in setting priorities for healthcare improvement: a cluster randomized trial. Implement Sci 9(1):1–10
Calderón AJ, Vinagre BM, Feliu V (2006) Fractional order control strategies for power electronic buck converters. Signal Process 86(10):2803–2819
Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96–109
Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput Appl 31(1):219–237
Cheng K, Wang L, Shen Y, Wang H, Wang Y, Jiang X, Zhong H () Secure k-nn query on encrypted cloud data with multiple keys. IEEE Transactions on Big Data
Chenthara S, Ahmed K, Wang H, Whittaker F (2019) Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access 7:74361–74382
Dash S, Padhy S, Parija B, Rojashree T, Patro KAK (2022) A simple and fast medical image encryption system using chaos-based shifting techniques. International Journal of Information Security and Privacy (IJISP) 16(1):1–24
Dong S, Abbas K, Jain R (2019) A survey on distributed denial of service (ddos) attacks in sdn and cloud computing environments. IEEE Access 7:80813–80828
Dong H, Bai E, Jiang X-Q, Wu Y (2020) Color image compression-encryption using fractional-order hyperchaotic system and dna coding. IEEE Access 8:163524–163540
ElKamchouchi DH, Mohamed HG, Moussa KH (2020) A bijective image encryption system based on hybrid chaotic map diffusion and dna confusion. Entropy 22(2):180
El-Khamy SE, Mohamed AG (2021) An efficient dna-inspired image encryption algorithm based on hyper-chaotic maps and wavelet fusion. Multimed Tools Appl 80:23319–23335
Gafsi M, Hajjaji MA, Malek J, Mtibaa A (2020) Efficient encryption system for numerical image safe transmission. Journal of Electrical and Computer Engineering
Grass RN, Heckel R, Dessimoz C, Stark WJ (2020) Genomic encryption of digital data stored in synthetic dna. Angew Chem 132(22):8554–8558
Iqbal T, Ali H (2018) Generative adversarial network for medical images (mi-gan). J Med Syst 42(11):1–11
Jia C, Zhang X, Wang S, Wang S, Ma S (2018) Light field image compression using generative adversarial network-based view synthesis. IEEE J Emerg Sel Top Circ Syst 9(1):177–189
Kaur R, Ali A (2021) A novel blockchain model for securing iot based data transmission. Int J Grid Distrib Comput 14(1):1045–1055
Khashan OA, AlShaikh M (2020) Edge-based lightweight selective encryption scheme for digital medical images. Multimed Tools Appl 79(35):26369–26388
Kim D-W, Chung J-R, Kim J, Lee DY, Jeong SY, Jung S-W (2019) Constrained adversarial loss for generative adversarial network-based faithful image restoration. ETRI J 41(4):415–425
Kruse CS, Mileski M, Vijaykumar AG, Viswanathan SV, Suskandla U, Chidambaram Y (2017) Impact of electronic health records on long-term care facilities: systematic review. JMIR Med Inf 5(3):e35
Li C, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78(2):1545–1551
Li X, Mou J, Xiong L, Wang Z, Xu J (2021) Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption. Opt Laser Technol 140:107074
Liu H, Wang X et al (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466
Liu L, Zhang Q, Wei X (2012) A rgb image encryption algorithm based on dna encoding and chaos map. Comput Electric Eng 38(5):1240–1248
Liu J, Ma Y, Li S, Lian J, Zhang X (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Appl 77(17):22787–22808
Liu Y, Wang Y, Deng L, Wang F, Liu F, Lu Y, Li S (2019) A novel in situ compression method for cfd data based on generative adversarial network. J Vis 22(1):95–108
Liu D, Huang X, Zhan W, Ai L, Zheng X, Cheng S (2021) View synthesis-based light field image compression using a generative adversarial network. Inf Sci 545:118–131
Mandal MK, Banik GD, Chattopadhyay D, Nandi D (2012) An image encryption process based on chaotic logistic map. IETE Tech Rev 29(5):395–404
Mentzer F, Toderici G, Tschannen M, Agustsson E (2020) High-fidelity generative image compression. arXiv:2006.09965
Mousa HM (2016) Dna-genetic encryption technique. International Journal of Computer Network & Information Security 8(7)
Niu Y, Zhang X (2020) A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation. IEEE Access 8:22082–22093
Padhy S, Alowaidi M, Dash S, Alshehri M, Malla PP, Routray S, Alhumyani H (2023) Agrisecure: A fog computing-based security framework for agriculture 4.0 via blockchain. Processes 11(3):757
Padhy S, Shankar T, Dash S (2022) A comparison among fast point multiplication algorithms in elliptic curve cryptosystem
Ponuma R, Amutha R (2018) Compressive sensing based image compression-encryption using novel 1d-chaotic map. Multimed Tools Appl 77(15):19209–19234
Pranitha G, Rukmini T, Shankar T, Sah B, Kumar N, Padhy S (2022) Utilization of blockchain in e-voting system. In: 2022 2nd International Conference on Intelligent Technologies (CONIT), IEEE, pp 1–5
Roy M, Chakraborty S, Mali K, Swarnakar R, Ghosh K, Banerjee A, Chatterjee S (2019) Data security techniques based on dna encryption. In: International ethical hacking conference, Springer, pp 239–249
Samiullah M, Aslam W, Nazir H, Lali MI, Shahzad B, Mufti MR, Afzal H (2020) An image encryption scheme based on dna computing and multiple chaotic systems. IEEE Access 8:25650–25663
Sang Y, Sang J, Alam MS (2022) Image encryption based on logistic chaotic systems and deep autoencoder. Pattern Recognit Lett 153:59–66
Shakir HR (2019) A color-image encryption scheme using a 2d chaotic system and dna coding. Advances in Multimedia
Shankar T, Padhy S, Ch SM, Ravella H, Varun M, Kumar N (2022) Development of 6g web by multilayer perceptron in c-ran for vanets. 2022 IEEE Global Conference on Computing. Power and Communication Technologies (GlobConPT), IEEE, pp 1–6
Shankar T, Padhy S, Dash S, Teja MB, Yashwant S (2022) Induction of secure data repository in blockchain over ipfs. In: 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, pp 738–743
Shu J, Jia X, Yang K, Wang H (2018) Privacy-preserving task recommendation services for crowdsourcing. IEEE Trans Serv Comput 14(1):235–247
Singh KN, Singh OP, Singh AK (2022) Ecis: encryption prior to compression for digital image security with reduced memory. Comput Commun 193:410–417
Song J, He T, Gao L, Xu X, Hanjalic A, Shen HT (2020) Unified binary generative adversarial network for image retrieval and compression. Int J Comput Vis 128(8):2243–2264
Suri S, Vijay R (2017) An aes–chaos-based hybrid approach to encrypt multiple images. In: Recent developments in intelligent computing, communication and devices, Springer, pp 37–43
Vatandsoost M, Litkouhi S (2019) The future of healthcare facilities: how technology and medical advances may shape hospitals of the future. Hosp Pract Res 4(1):1–11
Wang T, Wang M-h (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and dna encoding. Opt Laser Technol 132:106355
Wang X, Wang S, Zhang Y, Luo C (2018) A one-time pad color image cryptosystem based on sha-3 and multiple chaotic systems. Opt Lasers Eng 103:1–8
Wang S, Wang C, Xu C (2020) An image encryption algorithm based on a hidden attractor chaos system and the knuth-durstenfeld algorithm. Opt Lasers Eng 128:105995
Wang W, Ma X, Liu H, Li Y, Liu W (2021) Multi-focus image fusion via joint convolutional analysis and synthesis sparse representation. Signal Process: Image Commun 99:116521
Wang X, Chen S, Zhang Y (2021) A chaotic image encryption algorithm based on random dynamic mixing. Opt Laser Technol 138:106837
Yang F, Mou J, Luo C, Cao Y (2019) An improved color image encryption scheme and cryptanalysis based on a hyperchaotic sequence. Physica Scripta 94(8):085206
Yang C-H, Wu H-C, Su S-F (2019) Implementation of encryption algorithm and wireless image transmission system on fpga. IEEE Access 7:50513–50523
Ye G, Pan C, Dong Y, Shi Y, Huang X (2020) Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process 172:107563
Zhang Y (2021) A new unified image encryption algorithm based on a lifting transformation and chaos. Inf Sci 547:307–327
Zhang Q, Wei X (2013) A novel couple images encryption algorithm based on dna subsequence operation and chaotic system. Optik 124(23):6276–6281
Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos, Solitons Fractals 24(3):759–765
Zhu L, Jiang D, Ni J, Wang X, Rong X, Ahmad M (2022) A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf Sci 607:1001–1022
Funding
The authors received no specific funding for this study.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no conflicts of interest to report regarding the present study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Padhy, S., Dash, S., Shankar, T.N. et al. A hybrid crypto-compression model for secure brain mri image transmission. Multimed Tools Appl 83, 24361–24381 (2024). https://doi.org/10.1007/s11042-023-16359-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16359-w