Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm

Security is the most critical issue amid transmission of medical images because it contains sensitive information of patients. Medical image security is an essential method for secure the sensitive data when computerized images and their relevant patient data are transmitted across public networks. In this paper, the dual encryption procedure is utilized to encrypt the medical images. Initially Blowfish Encryption is considered and then signcryption algorithm is utilized to confirm the encryption model. After that, the Opposition based Flower Pollination (OFP) is utilized to upgrade the private and public keys. The performance of the proposed strategy is evaluated using performance measures such as Peak Signal to Noise Ratio (PSNR), entropy, Mean Square Error (MSE), and Correlation Coefficient (CC).

[1]  Moresh Mukhedkar,et al.  Secure non real time image encryption algorithm development using cryptography & steganography , 2015, 2015 Annual IEEE India Conference (INDICON).

[2]  Mohamed Abdel-Basset,et al.  A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem , 2018, Future Gener. Comput. Syst..

[3]  Kartik Shankar,et al.  Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm , 2018 .

[4]  Kartik Shankar,et al.  Sharing a Secret Image with Encapsulated Shares in Visual Cryptography , 2015 .

[5]  Yicong Zhou,et al.  Medical image encryption using edge maps , 2017, Signal Process..

[6]  Ali Khalfallah,et al.  A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm , 2017, KES.

[7]  Robert Dony,et al.  Improving the Security of the Medical Images , 2013 .

[8]  Elijah Blessing Rajsingh,et al.  A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography , 2018, J. King Saud Univ. Comput. Inf. Sci..

[9]  Juliano B. Lima,et al.  Encryption of medical images based on the cosine number transform , 2015, Signal Process. Image Commun..

[10]  Naveen K. Chilamkurti,et al.  Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem , 2018, Future Gener. Comput. Syst..

[11]  Mahmoud H. Annaby,et al.  Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion , 2018 .

[12]  Lisheng Xu,et al.  Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression , 2018 .

[13]  Laurent Nana,et al.  A Cryptographic Technique for Security of Medical Images in Health Information Systems , 2015 .

[14]  Kartik Shankar,et al.  An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm , 2016 .

[15]  Ali Al-Haj,et al.  Medical imaging security using partial encryption and histogram shifting watermarking , 2017, 2017 8th International Conference on Information Technology (ICIT).

[16]  W. Puech,et al.  Image Encryption and Compression for Medical Image Security , 2008, 2008 First Workshops on Image Processing Theory, Tools and Applications.

[17]  Mohamed Abdel-Basset,et al.  A novel method for solving the fully neutrosophic linear programming problems , 2018, Neural Computing and Applications.

[18]  Rengarajan Amirtharajan,et al.  Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller , 2018, Microprocess. Microsystems.

[19]  P. Eswaran,et al.  RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique , 2016, J. Circuits Syst. Comput..

[20]  Mohamed Abdel-Basset,et al.  2-Levels of clustering strategy to detect and locate copy-move forgery in digital images , 2018, Multimedia Tools and Applications.

[21]  Mohamed Abdel-Basset,et al.  A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria , 2018, Des. Autom. Embed. Syst..

[22]  Mohammed Ali Hussain,et al.  Securing Medical Images by Image Encryption using Key Image , 2014 .

[23]  Chenggen Quan,et al.  Multiple image encryption scheme based on pixel exchange operation and vector decomposition , 2018 .

[24]  Ali Kanso,et al.  An efficient and robust image encryption scheme for medical applications , 2015, Commun. Nonlinear Sci. Numer. Simul..

[25]  K. Shankar,et al.  RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography , 2017, China Communications.

[26]  Mohamed Abdel-Basset,et al.  A comprehensive review of quadratic assignment problem: variants, hybrids and applications , 2018, Journal of Ambient Intelligence and Humanized Computing.

[27]  Ahmed G. Radwan,et al.  Generalized double-humped logistic map-based medical image encryption , 2018, Journal of advanced research.

[28]  Dolendro Singh Laiphrakpam,et al.  Medical image encryption based on improved ElGamal encryption technique , 2017 .

[29]  Mohamed Abdel-Basset,et al.  Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems , 2018, Future Gener. Comput. Syst..

[30]  Xiaofeng Liao,et al.  An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos , 2018 .

[31]  Emad Nabil,et al.  A Modified Flower Pollination Algorithm for Global Optimization , 2016, Expert Syst. Appl..