A novel Modified Chaotic Simplified Advanced Encryption System (MCS-AES): mixed reality for a secure surgical tele-presence

Mixed Reality (MR) surgery has not been effectively implemented in telemedicine due to strict requirements of security and delay minimization during real-time video transmission. Hence, this paper aims to propose a novel solution for Surgical Telepresence with highly secured and faster real-time video transmission. The proposed system consists of three components: Authentication (Pre-surgery), Data transmission (During-Surgery), and Storage (Post-Surgery). For Authentication, Pass-Matrix technique is used at both ends to provide graphical passwords. During the surgery, a hybrid system is used to provide highly secured and faster real-time video transmission. This system includes a Feistel Encryption System (FES), Modified Scaled Zhongtang Chaotic System (M-SCZS), and Modified Advanced Encryption System (M-AES) algorithm. After Surgery, the transmitted data are stored using the Information Accountability Framework (IAF) for future purposes. The results are obtained from the during-surgery stage for jaw, breast, and bowel surgery. Both solutions are simulated in MATLAB on a personal computer with average processing capability. The proposed solution improves the entropy from 7.733~7.782 to 7.798–7.996 and reduces the processing time from 8.642~9.911 s/frames to 5.071~6.563 s/frames. The proposed focus on reducing the total processing time for the encryption and decryption process with improving security during the surgery process. Finally, this solution provides a fast security system for surgical telepresence that helps both local and remote surgeons for secure real-time communication. The complexity for this work need to know the used chaotic method, the values of the chaotic parameters and for which this method was used, in addition to the complexity of state of the art.

[1]  M. Samet,et al.  A new design of cryptosystem based on S-box and chaotic permutation , 2020, Multimedia Tools and Applications.

[2]  Fatma K. Tabash,et al.  Efficient encryption technique for H.264/AVC videos based on CABAC and logistic map , 2018, Multimedia Tools and Applications.

[3]  Z. Xu,et al.  Security mechanism for a wireless-sensor-networkbased healthcare monitoring system , 2012, IET Commun..

[4]  Avijit Hazra,et al.  Using the confidence interval confidently. , 2017, Journal of thoracic disease.

[5]  Ahmed H. Madian,et al.  A hybrid Chaos-AES encryption algorithm and its impelmention based on FPGA , 2014, 2014 IEEE 12th International New Circuits and Systems Conference (NEWCAS).

[6]  Colin J. Fidge,et al.  Anatomy of log files: Implications for information accountability measures , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).

[7]  Toshanlal Meenpal A light weight and secure video conferencing scheme utilizing public network , 2016, Multimedia Tools and Applications.

[8]  Shahryar Toughi,et al.  An image encryption scheme based on elliptic curve pseudo random and Advanced Encryption System , 2017, Signal Process..

[9]  Henrique S. Malvar,et al.  Approximate Storage of Compressed and Encrypted Videos , 2017, ASPLOS.

[10]  K. Mahesh,et al.  ZLBM: zero level binary mapping technique for video security , 2017, Multimedia Tools and Applications.

[11]  Sana Ullah,et al.  An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications , 2017, IEEE Systems Journal.

[12]  Shadi Aljawarneh,et al.  A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.

[13]  El-Sayed M. El-Rabaie,et al.  HEVC Selective Encryption Using RC6 Block Cipher Technique , 2018, IEEE Transactions on Multimedia.

[14]  Tarek S. Sobh,et al.  Effective and Extensive Virtual Private Network , 2011, J. Information Security.

[15]  Ruoshui Liu,et al.  Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System , 2018, Int. J. Digital Multimedia Broadcasting.

[16]  Han-Yu Lin,et al.  Shoulder-surfing-proof graphical password authentication scheme , 2013, International Journal of Information Security.

[17]  Swapnoneel Roy,et al.  Towards designing and implementing a secure one time password (OTP) authentication system , 2016, 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC).

[18]  Edward F. Schaefer,et al.  A SIMPLIFIED AES ALGORITHM AND ITS LINEAR AND DIFFERENTIAL CRYPTANALYSES , 2003, Cryptologia.

[19]  E. S. I. Harba,et al.  Secure Data Encryption Through a Combination of AES, RSA and HMAC , 2017 .

[20]  M. Nithya,et al.  A STUDY AND PERFORMANCE ANALYSIS OF RSA ALGORITHM , 2013 .

[21]  Xiangjian He,et al.  Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..

[22]  Abdullah M. Iliyasu,et al.  A Multidimensional Hyperjerk Oscillator: Dynamics Analysis, Analogue and Embedded Systems Implementation, and Its Application as a Cryptosystem , 2019, Sensors.

[23]  Robin Wolff,et al.  A Mixed Reality Telepresence System for Collaborative Space Operation , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[24]  Ahmed A. Abd El-Latif,et al.  Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption , 2020, Inf. Sci..

[25]  Ihsan Pehlivan,et al.  A novel hybrid encryption algorithm based on chaos and S-AES algorithm , 2018, Nonlinear Dynamics.

[26]  Yancui Shi,et al.  A Prediction Method of Mobile User Preference Based on the Influence between Users , 2018, Int. J. Digit. Multim. Broadcast..

[27]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[28]  Muhammad Altaf,et al.  Computationally efficient selective video encryption with chaos based block cipher , 2018, Multimedia Tools and Applications.

[29]  M. A. Ben Farah,et al.  An image encryption scheme based on a new hybrid chaotic map and optimized substitution box , 2019, Nonlinear Dynamics.