A Novel Medical Image Signcryption Scheme Using TLTS and Henon Chaotic Map

In tele-medicine, images based on patient diagnostic tests and reports are usually required to broadcast securely so that recipient can receive them without any error. For the secure communication of sensitive medical data, there is a need of authenticated and unforgeable cryptosystem. In this paper, we propose a novel signcryption technique for medical images that fulfills the necessary security requirements of sensitive medical data during its communication. The design of novel medical image signcryption scheme is empowered by the combination strategy of hybrid cryptography. It employs a technique of public key cryptography furnished with elliptic curve cryptography for the generation of secret encryption key. The proposed scheme uses elliptic curve for signcryption purpose and chaotic maps for performing encryption of the medical images. It gives a combined mechanism of key exchange, digital signature and chaotic image encryption. Image encryption phase contains permutation and diffusion for pixel scrambling. The proposed image signcryption scheme provides confidentiality, authentication, integrity, unforgability, forward secrecy and non-repudiation. The use of chaos-based symmetric image encryption scheme shows good results for key space analysis, key sensitivity, correlation analysis, number of pixel change rate, unified average changing intensity, entropy analysis and histogram analysis. On the basis of the results obtained from all these analyses, we believe that the proposed medical image signcryption scheme is efficient and robust, providing good security for sensitive medical images.

[1]  Oleg S. Pianykh,et al.  Digital Imaging and Communications in Medicine (DICOM) , 2017, Radiopaedia.org.

[2]  Xing-Yuan Wang,et al.  A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice , 2014, Inf. Sci..

[3]  Junwei Zhou,et al.  Novel Meaningful Image Encryption Based on Block Compressive Sensing , 2019, Secur. Commun. Networks.

[4]  Hongyu Zhao,et al.  Fast image encryption algorithm based on parallel computing system , 2019, Inf. Sci..

[5]  Xingyuan Wang,et al.  A novel chaotic block image encryption algorithm based on dynamic random growth technique , 2015 .

[6]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[7]  Ronald M. Summers,et al.  ChestX-ray: Hospital-Scale Chest X-ray Database and Benchmarks on Weakly Supervised Classification and Localization of Common Thorax Diseases , 2019, Deep Learning and Convolutional Neural Networks for Medical Imaging and Clinical Informatics.

[8]  Nilima M. Dongre,et al.  Binary key based permutation for medical image encryption , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[9]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[10]  Robert H. Deng,et al.  A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.

[11]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[12]  Rashid Ali,et al.  Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls , 2018, PloS one.

[13]  Mohamed M. Abd-Eldayem A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine , 2013 .

[14]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[15]  Robert D. Dony,et al.  Segmentation based encryption method for medical images , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[16]  Qixiang Mei,et al.  An efficient pixel-level chaotic image encryption algorithm , 2018, Nonlinear Dynamics.

[17]  Stephen T C Wong Research Paper: A Cryptologic Based Trust Center for Medical Images , 1996, J. Am. Medical Informatics Assoc..

[18]  Xing-yuan Wang,et al.  A chaotic image encryption algorithm based on perceptron model , 2010 .

[19]  Christopher J. Novak,et al.  2009 Data Breach Investigations Report , 2009 .

[20]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[21]  Khumanthem Manglem Singh,et al.  Image Encryption using Elliptic Curve Cryptography , 2015 .

[22]  M. Hénon,et al.  A two-dimensional mapping with a strange attractor , 1976 .

[23]  Ramin Khorasani,et al.  Meaningful use for radiology: current status and future directions. , 2013, Radiology.

[24]  Xingyuan Wang,et al.  Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory , 2020, Inf. Sci..

[25]  Azman Samsudin,et al.  A new hybrid digital chaotic system with applications in image encryption , 2019, Signal Process..

[26]  Xingyuan Wang,et al.  A novel chaotic image encryption scheme using DNA sequence operations , 2015 .

[27]  M. Zia,et al.  Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve , 2019, Electronics Letters.

[28]  Rengarajan Amirtharajan,et al.  Chaos based crossover and mutation for securing DICOM image , 2016, Comput. Biol. Medicine.

[29]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[30]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[31]  Jianhao Hu,et al.  A New Plaintext-Related Image Encryption Scheme Based on Chaotic Sequence , 2019, IEEE Access.

[32]  Alex Fit-Florea,et al.  Precision and Performance: Floating Point and IEEE 754 Compliance for NVIDIA GPUs , 2011 .

[33]  Hideki Imai,et al.  How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..

[34]  Erdem Yavuz,et al.  A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme , 2019, Optics & Laser Technology.

[35]  Erdem Yavuz,et al.  A chaos-based image encryption algorithm with simple logical functions , 2016, Comput. Electr. Eng..

[36]  Johannes Merkle,et al.  Elliptic Curve Cryptography (ecc) Brainpool Standard Curves and Curve Generation , 2010 .

[37]  Xiaoling Huang,et al.  An efficient symmetric image encryption algorithm based on an intertwining logistic map , 2017, Neurocomputing.

[38]  Xingyuan Wang,et al.  Color image encryption using spatial bit-level permutation and high-dimension chaotic system , 2011 .

[39]  Ali Khalfallah,et al.  A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm , 2017, KES.

[40]  Xiao Chen,et al.  Adaptive medical image encryption algorithm based on multiple chaotic mapping , 2017, Saudi journal of biological sciences.

[41]  Xing-Yuan Wang,et al.  A new image encryption algorithm based on non-adjacent coupled map lattices , 2015, Appl. Soft Comput..

[42]  Benedict Heal,et al.  On the Chaotic Behaviour of the Tent Map , 1994 .

[43]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[44]  Yicong Zhou,et al.  Medical image encryption using high-speed scrambling and pixel adaptive diffusion , 2018, Signal Process..

[45]  Robert M. May,et al.  Simple mathematical models with very complicated dynamics , 1976, Nature.

[46]  M. A. Mohamed,et al.  Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks , 2012 .

[47]  K. Pearson VII. Note on regression and inheritance in the case of two parents , 1895, Proceedings of the Royal Society of London.

[48]  Rashid Ali,et al.  A new chaos based color image encryption algorithm using permutation substitution and Boolean operation , 2020, Multimedia Tools and Applications.

[49]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[50]  Sos S. Agaian,et al.  Local Shannon entropy measure with statistical tests for image randomness , 2013, Inf. Sci..

[51]  Lawrence Tarbox,et al.  DICOM Images Have Been Hacked! Now What? , 2019, AJR. American journal of roentgenology.

[52]  Yicong Zhou,et al.  Medical image encryption using edge maps , 2017, Signal Process..

[53]  Tanja Lange,et al.  Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .

[54]  Hejiao Huang,et al.  2D Logistic-Sine-coupling map for image encryption , 2018, Signal Process..

[55]  Azman Samsudin,et al.  An image encryption scheme based on hybridizing digital chaos and finite state machine , 2019, Signal Process..

[56]  Yicong Zhou,et al.  Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..

[57]  Joos Vandewalle,et al.  Hardware architectures for public key cryptography , 2003, Integr..