Security of Medical Images Using a Key-Based Encryption Algorithm in the RDWT-RSVD Domain: SeMIE

Security of Medical Images Using a Key-Based Encryption Algorithm in the RDWT-RSVD Domain: SeMIE

Monu Singh, Amit Kumar Singh
Copyright: © 2023 |Pages: 20
DOI: 10.4018/JDM.318413
Article PDF Download
Open access articles are freely available for download

Abstract

Today, in the era of big data, an increasingly serious problem is the security of digital media in the healthcare domain. Encryption is a popular technique to resolve the security concern of medical data. In the paper, the authors propose a key-based encryption algorithm – namely, SeMIE, designed by RDWT and RSVD for healthcare applications – which can guarantee the security of the medical images. Initially, the image normalisation procedure along with RDWT-RSVD is followed to generate hash value. Here, image normalisation is used to ensure the high resistance against the geometric modifications. Then, a key expansion process is utilised with the hash value for generating the secure keys. Finally, the encryption process uses Feistel structure along with constant substitution-permutation functions to provide sufficient confusion and diffusion of cipher data. Experimental evaluation indicates that the SeMIE algorithm is secure against several attacks. From the simulation findings, it is inferred that the algorithm exhibits improved security compared to existing methods.
Article Preview
Top

1. Introduction

With the proliferation of the internet of things (IoT), the healthcare industry has experienced significant growth in recent years (Bhuiyan et al., 2021). There is no doubt that the use of the IoT in healthcare not only improves operational efðciency for medical professionals and hospitals but also provides service convenience for supporting patients and their relatives. Especially after the COVID-19 pandemic, medical images serve as the information carrier for various purposes, such as medical diagnosis, telesurgery, defense, medical education, teleconsulting, research and business analytics (Singh et al., 2021; Khaldi et al., 2022; Sharma et al., 2021).

However, security of these images is a prerequisite for the application of the IoT in the healthcare industry (Li et al., 2021). Also, cloud-based healthcare is an important solution for the efficient storage, processing and continuous availability of medical data supplied by various sources. However, the protection of this externalised data and services in open environments is a big challenge (Haddad et al., 2020). Therefore, the protection of the medical information for smart healthcare is crucial (Wei et al., 2013). Encryption is a popular technique for protecting medical data from illegitimate access (Kaur & Kumar, 2020). The simplified procedure of an image encryption is depicted in Fig. 1.

Figure 1.

An image encryption process

JDM.318413.f01

Let us assume ‘JDM.318413.m01’ as original/plain image and ‘JDM.318413.m02’ as cipher image. The encryption and decryption process is carried out on plain and cipher image respectively as shown in equation (1) and equation (2).JDM.318413.m03 = JDM.318413.m04 …..(1)JDM.318413.m05 = JDM.318413.m06 …..(2) Where JDM.318413.m07 & ‘JDM.318413.m08’ are encryption and decryption functions along with key. In case of symmetric encryption (Roy et al., 2022), JDM.318413.m09 = JDM.318413.m10. However, JDM.318413.m11 ¹ JDM.318413.m12 in case of asymmetric encryption.

Complete Article List

Search this Journal:
Reset
Volume 35: 1 Issue (2024)
Volume 34: 3 Issues (2023)
Volume 33: 5 Issues (2022): 4 Released, 1 Forthcoming
Volume 32: 4 Issues (2021)
Volume 31: 4 Issues (2020)
Volume 30: 4 Issues (2019)
Volume 29: 4 Issues (2018)
Volume 28: 4 Issues (2017)
Volume 27: 4 Issues (2016)
Volume 26: 4 Issues (2015)
Volume 25: 4 Issues (2014)
Volume 24: 4 Issues (2013)
Volume 23: 4 Issues (2012)
Volume 22: 4 Issues (2011)
Volume 21: 4 Issues (2010)
Volume 20: 4 Issues (2009)
Volume 19: 4 Issues (2008)
Volume 18: 4 Issues (2007)
Volume 17: 4 Issues (2006)
Volume 16: 4 Issues (2005)
Volume 15: 4 Issues (2004)
Volume 14: 4 Issues (2003)
Volume 13: 4 Issues (2002)
Volume 12: 4 Issues (2001)
Volume 11: 4 Issues (2000)
Volume 10: 4 Issues (1999)
Volume 9: 4 Issues (1998)
Volume 8: 4 Issues (1997)
Volume 7: 4 Issues (1996)
Volume 6: 4 Issues (1995)
Volume 5: 4 Issues (1994)
Volume 4: 4 Issues (1993)
Volume 3: 4 Issues (1992)
Volume 2: 4 Issues (1991)
Volume 1: 2 Issues (1990)
View Complete Journal Contents Listing