Abstract

Transmission and storage of medical data using cloud-based Internet-of-health-systems (IoHS) necessitate important prerequisites, such as secrecy, legitimacy, and integrity. This paper recommends a novel hybrid encryption/decryption scheme that can be applied in e-healthcare, or IoHS, for the protection of medical images. The proposed system explores innovative perturbation algorithms that utilize novel chaotic maps. The proposed perturbation-based data encryption is employed in both rounds of confusion and diffusion to cope the drawbacks of traditional chaos-based confusion and diffusion architectures. Particularly, (i) the new maps parameters and chaotic sequences are used to control the permutation and diffusion properties of the scheme, and (2) the derived properties control pixel shuffling and operations of substitution. Different techniques and tests are used to analyzed the chaotic behaviors of the proposed system, including the bifurcation diagram, Lyapunov exponents, as well as the NIST and DIEHARD tests. Moreover, evaluation using various test images indicated that the proposed cryptosystem is fast, have high efficiency, showed high robustness and protection of medical images, and documented the good ability to withstand a variety of cyber-attacks. Furthermore, quantitative results using benchmark color and greyscale images prove the high security levels, sensitivity, and low residual intelligibility with high quality recovered data of our technique than several typical and state-of-the-art encryption schemes. This has been documented using statistical and security analysis metrics, such as number of pixels change rate (NPCR, 99.814%), unified average changing intensity (UACI, 33.694%), peak signal-to-noise-ratio (PSNR, 7.723), and Shannon entropy (7.998).

Highlights

  • In the era of exponential growth of communications technologies, security of data, in particular medical data, is of great interest

  • We propose two novel 2D chaotic maps for a robust medical images and/or data encryption pipeline

  • The proposed encryption/decryption pipeline has been implemented using the novel maps and its evaluation has been conducted on two phases

Read more

Summary

Introduction

In the era of exponential growth of communications technologies, security of data, in particular medical data, is of great interest. Cloud-based Internet-of-heath systems (IoHS) are being increasingly used to store patients data to make them remotely accessible at different facilities/locations. The stored and/or transferred data include sensitive identifiable information (e.g., names, address and the other health records) in addition to medical scans (i.e., medical images and physician reports). Non-authorized access to such data is catastrophic and the security of patient data is of immense importance [1]. Storage and/or transfer of medical images requires secrecy, and legitimacy and integrity as prerequisites [2]. Cryptography algorithms can be exploited to ensure the required security prerequisites, by medical image scrambling to fulfill encryption. Validness and uprightness of a given cryptosystem are eventually assessed using various computerized marks

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call