Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications

The security of healthcare and telemedicine systems is a critical issue that must be significantly investigated. Several smart telemedicine applications are expected to be adopted in the medical sector in the incoming years. Healthcare smart products that are connected through Internet to be accessi...

Full description

Saved in:
Bibliographic Details
Published inJournal of ambient intelligence and humanized computing Vol. 12; no. 10; pp. 9007 - 9035
Main Authors El-Shafai, Walid, Khallaf, Fatma, El-Rabaie, El-Sayed M., El-Samie, Fathi E. Abd
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2021
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The security of healthcare and telemedicine systems is a critical issue that must be significantly investigated. Several smart telemedicine applications are expected to be adopted in the medical sector in the incoming years. Healthcare smart products that are connected through Internet to be accessible anytime and anywhere are expected to deal with critical and confidential information such as personal medical images. Therefore, medical image encryption is an important task in telemedicine and healthcare applications. This paper presents an efficient cryptosystem for medical image security based on exploiting the advantages of the de-oxyribo nucleic acid (DNA) rules and chaos maps. In the proposed medical image cryptosystem, logistic chaos map, piecewise linear chaotic map (PWLCM), and DNA encoding are employed. The PWLCM is employed to generate a secret key image. Then, the DNA rules are utilized for encoding the secret key image and the input plain image by rows that are encoded with the logistic chaos map. After that, the proposed logistic map is employed to obtain an intermediate image as another secret key image to set DNA functions row-by-row on the coded original image. Moreover, the intermediate image is decoded in the following stage. Finally, the previous actions are iterated through image columns once again to obtain the best ciphered image. The experimental results reveal that the suggested cryptosystem has a high security with an acceptable processing time. In addition, it can resist various kinds of attacks, such as known-plaintext and chosen-plaintext attacks.
ISSN:1868-5137
1868-5145
DOI:10.1007/s12652-020-02597-5