Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

New optimized chaotic encryption with BCOVIDOA for efficient security of medical images in IoMT systems

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

The Internet of Medical Things systems involve medical data transmissions between patients, medical experts, and medical centers over public networks. The sensitivity of the medical images' contents and the personal information in the medical images required high levels of security. Chaotic maps are successfully used in image encryption due to their high security and computational efficiency. Initial random sequences generate the keys for chaotic map confusion and diffusion processes. Selection of the initial parameters is the cornerstone of the success of chaotic maps in securing digital images. In this paper, the authors proposed utilizing the novel binary Coronavirus disease optimization algorithm to determine the optimal initial sequences for the chaotic maps that lead to the generation of the optimal secret keys. The proposed algorithm selects the optimal initial keys using a hybrid fitness function. The generated optimal secret keys are then used for medical image encryption/decryption. Several medical images from different modalities are utilized for testing, and the results are compared to the latest encryption techniques according to various criteria. The experimental results ensure the robustness of the proposed algorithm to various attacks and its superior performance to similar algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

The datasets generated during and/or analyzed during the current study are available from the the corresponding author on reasonable request.

References

  1. Wilson C, Hargreaves T, Hauxwell-Baldwin R (2017) Benefits and risks of smart home technologies. Energy Policy 103:72–83

    Article  Google Scholar 

  2. Syed ST, Gerber BS, Sharp LK (2013) Traveling towards disease: transportation barriers to health care access. J Comm Health 38(5):976–993

    Article  Google Scholar 

  3. Yuehong YIN, Zeng Y, Chen X, Fan Y (2016) The internet of things in healthcare: an overview. J Ind Inf Integr 1:3–13

    Google Scholar 

  4. Jin H, Luo Y, Li P, Mathew J (2019) A review of secure and privacy-preserving medical data sharing. IEEE Access 7:61656–61669

    Article  Google Scholar 

  5. Hosny KM, Darwish MM, Li K, Salah A (2018) Parallel multi-core CPU and GPU for fast and robust medical image watermarking. IEEE Access 6:77212–77225

    Article  Google Scholar 

  6. Hosny KM, Darwish MM, Fouda MM (2021) Robust color images watermarking using new fractional-order exponent moments. IEEE Access 9:47425–47435

    Article  Google Scholar 

  7. Zhou Z, Mu Y, Wu QJ (2019) Coverless image steganography using partial-duplicate image retrieval. Soft Comput 23(13):4927–4938

    Article  Google Scholar 

  8. Samiullah M, Aslam W, Khan MA, Alshahrani HM, Mahgoub H, Abdullah AM, Chen CM (2022) Rating of modern color image cryptography: a next-generation computing perspective. Wireless Commun Mob Comput 2022:7277992. https://doi.org/10.1155/2022/7277992

    Article  Google Scholar 

  9. Daemen J, Rijmen V (2001) Reijndael: the advanced encryption standard. Dr. Dobb's J: Softw Tools Prof Program. 26(3): 137–139

  10. Smid ME, Branstad DK (1988) Data encryption standard: past and future. Proc IEEE 76(5):550–559

    Article  Google Scholar 

  11. Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol 13(15):15–22

    Google Scholar 

  12. Toktas A, Erkan U (2022) 2D fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm. Neural Comput Appl 34(6):4295–4319

    Article  Google Scholar 

  13. Elashry IF, El-Shafai W, Hasan ES, El-Rabaie S, Abbas AM, El-Samie A, Faragallah OS (2020) Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl 79(29):20665–20687

    Article  Google Scholar 

  14. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137

    Article  Google Scholar 

  15. Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and chaos theory. Multimed Tools Appl 79(27):20263–20279

    Article  Google Scholar 

  16. Hosny KM, Kamal ST, Darwish MM (2022) Novel encryption for color images using fractional-order hyperchaotic system. J Ambient Intell Humaniz Comput 13(2):973–988

    Article  Google Scholar 

  17. Koppu S, Viswanatham VM (2018) Medical image security enhancement using two-dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm. Evol Intel 11(1):53–71

    Article  Google Scholar 

  18. Saravanan S, Sivabalakrishnan M (2021) A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption. Soft Comput 25(7):5299–5322

    Article  Google Scholar 

  19. Zhou Y, Wang E, Song X, Shi M (2022) Image encryption algorithm based on artificial bee colony algorithm and chaotic system. Secur Commun Netw. https://doi.org/10.1155/2022/1444676

    Article  Google Scholar 

  20. Suri S, Vijay R (2020) A pareto-optimal evolutionary approach of image encryption using coupled map lattice and DNA. Neural Comput Appl 32(15):11859–11873

    Article  Google Scholar 

  21. Ahmad M, Alam MZ, Umayya Z, Khan S, Ahmad F (2018) An image encryption approach using particle swarm optimization and chaotic map. Int J Inf Technol 10(3):247–255

    Google Scholar 

  22. Khalid AM, Hosny KM, Mirjalili S (2022) COVIDOA: a novel evolutionary optimization algorithm based on coronavirus replication lifecycle. Neural Comput Appl 34:22465–22492

    Article  Google Scholar 

  23. Khalid AM, Hamza HM, Mirjalili S, Hosny KM (2022) BCOVIDOA: a novel binary coronavirus disease optimization algorithm for feature selection. Knowl-Based Syst 248:108789

    Article  Google Scholar 

  24. Tsai DY, Lee Y, Matsuyama E (2008) Information entropy measure for evaluation of image quality. J Digit Imaging 21(3):338–347

    Article  Google Scholar 

  25. Qayyum A, Ahmad J, Boulila W, Rubaiee S, Masood F, Khan F, Buchanan WJ (2020) Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access 8:140876–140895

    Article  Google Scholar 

  26. Kaur M, Singh D (2021) Multi-objective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption. Multidimension Syst Signal Process 32(1):281–301

    Article  Google Scholar 

  27. Naik RB, Singh U (2022) A review on applications of chaotic maps in pseudo-random number generators and encryption. Ann Data Sci. https://doi.org/10.1007/s40745-021-00364-7

    Article  Google Scholar 

  28. Guruprasad L (2021) Human coronavirus spike protein-host receptor recognition. Prog Biophys Mol Biol 161:39–53

    Article  Google Scholar 

  29. Zhao Z, Qin P, Huang YW (2021) Lysosomal ion channels involved in cellular entry and uncoating of enveloped viruses: implications for therapeutic strategies against SARS-CoV-2. Cell Calcium 94:102360

    Article  Google Scholar 

  30. Jones CP, Ferré-D’Amaré AR (2022) Crystal structure of the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) frameshifting pseudoknot. RNA 28(2):239–249

    Article  Google Scholar 

  31. Anokhina VS, Miller BL (2021) Targeting ribosomal frameshifting as an antiviral strategy: from HIV-1 to SARS-CoV-2. Acc Chem Res 54(17):3349–3361

    Article  Google Scholar 

  32. Bar-On YM, Flamholz A, Phillips R, Milo R (2020) Science forum: SARS-CoV-2 (COVID-19) by the numbers. Elife 9:e57309

    Article  Google Scholar 

  33. Mirjalili S, Lewis A (2013) S-shaped versus V-shaped transfer functions for binary particle swarm optimization. Swarm Evol Comput 9:1–14

    Article  Google Scholar 

  34. Liu H, Kadir A, Sun X (2017) Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Proc 11(5):324–332

    Article  Google Scholar 

  35. Huang Z-J, Cheng S, Gong L-H, Zhou N-R (2020) Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform. Opt Lasers Eng 124:105821

    Article  Google Scholar 

  36. El-Shafai W, Khallaf F, El-Rabaie ESM, El-Samie FEA (2021) Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J Ambient Intell Humaniz Comput 12(10):9007–9035

    Article  Google Scholar 

  37. Wang X, Wang Y, Zhu X, Luo C (2020) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt Lasers Eng 125:105851

    Article  Google Scholar 

Download references

Funding

The authors receive no funds.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khalid M. Hosny.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by any authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alsahafi, Y.S., Khalid, A.M., Hamza, H.M. et al. New optimized chaotic encryption with BCOVIDOA for efficient security of medical images in IoMT systems. Neural Comput & Applic 36, 7705–7723 (2024). https://doi.org/10.1007/s00521-024-09508-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-024-09508-1

Keywords