Two-Round Symmetric Cryptography for Medical Image Infosecurity Against-Hacker Attacks in a Picture Archiving and Communication System

Digitalizing medical images, such as images in ultrasonography or mammography, or magnetic resonance imaging, can be applied for telemedicine applications in telediagnosis and telesurgery, and can be stored in a cloud database via computer networking transmission or wireless communications. Besides, these images contain the patient privacy information. Thus, their reliability and availability should be protected to ensure medical image infosecurity in public channels or open spaces. Medical images can also be hacked by unauthorized people. Therefore, in the picture archiving and communication system (PACS), this study proposes against-hacker attacks with two-round symmetric cryptography models for medical image infosecurity. Hash transformation with multi secret keys is performed to change the pixel values and produce dynamic errors for the two-round encryption processes. In image decryption, two-round decryption processes are employed to estimate the possible hacker attacks at the routing path and to determine the decryption key parameter by using an optimization-based controller. For a case study of mammographic images consisting of 50 benign tumors and 50 malignant tumors, the peak signal-to-noise ratio (PSNR) is employed to evaluate the decryption quality between the plain and decrypted images.

[1]  Her-Terng Yau,et al.  Bluetooth Based Chaos Synchronization Using Particle Swarm Optimization and Its Applications to Image Encryption , 2012, Sensors.

[2]  Amir Akhavan,et al.  Applications of tripled chaotic maps in cryptography , 2007, 0705.2633.

[3]  Zhengjun Liu,et al.  Color image encryption by using Arnold and discrete fractional random transforms in IHS space , 2010 .

[4]  Muhammad Rafiq Abuturab,et al.  Color image security system based on discrete Hartley transform in gyrator transform domain , 2013 .

[5]  Cheng-Chi Lee,et al.  A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System , 2016, Journal of Medical Systems.

[6]  Mohammad Reza Mosavi,et al.  A novel image encryption based on hash function with only two-round diffusion process , 2013, Multimedia Systems.

[7]  Cheng-Chi Lee,et al.  A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System , 2015, Journal of Medical Systems.

[8]  Chao-Lin Kuo,et al.  Symmetric Cryptography With Shift 2n-1, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image , 2020, IEEE Photonics Journal.

[9]  Robert Dony,et al.  Improving the Security of the Medical Images , 2013 .

[10]  Chao-Lin Kuo Design of an Adaptive Fuzzy Sliding-Mode Controller for Chaos Synchronization , 2007 .

[11]  Kwok-Tung Lo,et al.  A Content-Adaptive Joint Image Compression and Encryption Scheme , 2018, IEEE Transactions on Multimedia.

[12]  Vinod Patidar,et al.  Diffusion-substitution based gray image encryption scheme , 2013, Digit. Signal Process..

[13]  Thomas Monroe,et al.  Picture Archiving and Communication System Acceptance Testing : Results and Identification of Problem Components , 2005 .

[14]  Mohamed Ali Hajjaji,et al.  Cryptography of medical images based on a combination between chaotic and neural network , 2016, IET Image Process..

[15]  Namrata Dhanda,et al.  DIP Using Image Encryption and XOR Operation Affine Transform , 2015 .

[16]  Xin-Wen Wu,et al.  Comments on the security of "Diffusion-substitution based gray image encryption" scheme , 2014, Digit. Signal Process..

[17]  Yousef Farid,et al.  A robust hybrid method for image encryption based on Hopfield neural network , 2012, Comput. Electr. Eng..

[18]  Tsung-Lung Yang,et al.  Hash Transformation and Machine Learning-Based Decision-Making Classifier Improved the Accuracy Rate of Automated Parkinson’s Disease Screening , 2020, IEEE Transactions on Neural Systems and Rehabilitation Engineering.

[19]  Rengarajan Amirtharaj,et al.  Image Encryption: An Information Security Perceptive , 2014 .

[20]  W. San-Um,et al.  A Lossless physical-layer encryption scheme in medical Picture Archiving and Communication Systems using highly-robust chaotic signals , 2014, The 7th 2014 Biomedical Engineering International Conference.

[21]  Chuan-Kuei Huang,et al.  Multi chaotic systems based pixel shuffle for image encryption , 2009 .

[22]  Che-Chou Shen,et al.  Chirp-encoded excitation for dual-frequency ultrasound tissue harmonic imaging , 2012, IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control.

[23]  A. Nag,et al.  Image encryption using affine transform and XOR operation , 2011, 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies.

[24]  Pong-Jeu Lu,et al.  Customized Handmade Pulmonary Valved Conduit Reconstruction for Children and Adult Patients Using Meta-Learning Based Intelligent Model , 2018, IEEE Access.

[25]  Fatih Özkaynak,et al.  An Image Encryption Algorithm Based on Chaotic Selection of Robust Cryptographic Primitives , 2020, IEEE Access.

[26]  Christian Roux,et al.  A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.

[27]  Hiba Chougrad,et al.  Deep Convolutional Neural Networks for breast cancer screening , 2018, Comput. Methods Programs Biomed..

[28]  Chao-Lin Kuo,et al.  Medical Image Infosecurity Using Hash Transformation and Optimization-Based Controller in a Health Information System: Case Study in Breast Elastography and X-Ray Image , 2020, IEEE Access.

[29]  Salwa K. Abd-El-Hafiz,et al.  Symmetric encryption algorithms using chaotic and non-chaotic generators: A review , 2015, Journal of advanced research.

[30]  Olivier Basset,et al.  An Enhanced Chirp Modulated Golay Code for Ultrasound Diverging Wave Compounding , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[31]  Xiao-Song Yang,et al.  Hyperchaos and bifurcation in a new class of four-dimensional Hopfield neural networks , 2006, Neurocomputing.

[32]  S. Shankar,et al.  DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM , 2016 .

[33]  Zheng Zhou,et al.  An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding , 2018, IEEE Photonics Journal.

[34]  Joaquin Alvarez,et al.  Robust synchronization of Sprott circuits using sliding mode control , 2006 .

[35]  Safya Belghith,et al.  A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..

[36]  M. A. Mohamed,et al.  Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks , 2012 .

[37]  Mohammed Ali Hussain,et al.  Securing Medical Images by Image Encryption using Key Image , 2014 .

[38]  C. Sinthanayothin,et al.  PACS (Picture Archiving Communication System) for dentistry , 2008, 2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[39]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[40]  Liping Zhang,et al.  Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme , 2017, IEEE Journal of Biomedical and Health Informatics.

[41]  Fatih Özkaynak,et al.  Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique , 2019, IEEE Access.

[42]  Ian W. Ricketts,et al.  The Mammographic Image Analysis Society digital mammogram database , 1994 .

[43]  Diego Vicentin Developing Standards, Shaping the Network: Ethnographic Notes on the IEEE 802 LAN/MAN Standards Committee , 2015 .

[44]  Chih-Yen Chen,et al.  A Three-Dimensional Adaptive PSO-Based Packing Algorithm for an IoT-Based Automated e-Fulfillment Packaging System , 2017, IEEE Access.