Computers, Materials & Continua DOI:10.32604/cmc.2022.018545 | |
Article |
Secure and Robust Optical Multi-Stage Medical Image Cryptosystem
1Department Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt
2Department of Electronics and Communications Engineering, College of Engineering and Technology, Arab Academy for Science, Technology and Maritime Transport, Alexandria, 1029, Egypt
3Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, 84428, Saudi Arabia
4Department of Electronics and Communications, Faculty of Engineering, Zagazig University, Zagazig, 44519, Egypt
*Corresponding Author: Abeer D. Algarni. Email: adalqarni@pnu.edu.sa
Received: 12 March 2021; Accepted: 07 May 2021
Abstract: Due to the rapid growth of telemedicine and healthcare services, color medical image security applications have been expanded precipitously. In this paper, an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested. Two different phases in the fractional Fourier and output planes are provided as deciphering keys. Accordingly, the ciphering keys will not be employed for the deciphering procedure. Thus, the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH (Optical Scanning Holography) and DRPE (Double Random Phase Encoding) algorithms. One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the one-dimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components. More comparisons on various color medical images are examined and analyzed to substantiate the cryptosystem efficacy. The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure. It has terrific cryptography performance compared to conventional cryptography algorithms, even in the presence of noise and severe channel attacks.
Keywords: Optical encryption; medical image security; symmetric and asymmetric encryption; OSH; DRPE; PTFrFT
Digitalization is a huge part of our life today, with broad applications in health, science, engineering, media, communication, etc. A large amount of digital multimedia data is often transmitted via open networks with the widespread use of the Internet. Therefore, the security and integrity of this large amount of data are of great concern [1,2]. A type of the precious data is represented with digital images used in various beneficial applications such as military, biometric authentication, online shopping, online banking, healthcare systems, telemedicine, medical science, etc. [3–5].
The lack of powerful security and protection tools could cause various threats and attacks, leading to serious disasters for people and networks. In medical image communication through the Internet, intruders can simply retrieve the images because of the shortage in security levels. Therefore, the protection of the transmitted image information becomes a serious problem. Several papers described different multimedia encryption techniques like those found in [1–21]. There are several chaotic maps in the state-of-the-art works, such as Arnold map, Logistic map, and Cat map [12–21]. Various image security and image cryptography techniques based on chaos systems have been presented in [22–27]. The main disadvantage of the traditional chaotic-map-based cryptography procedures is that they depend on lower-order chaos functions. Therefore, it is essential to develop robust cryptography algorithms to avoid this disadvantage.
The conventional cryptography techniques [28–34] have nevertheless been found not appropriate for efficient image communication due to their underlying characteristics like large number of iterations, high pixel redundancy, strong correlation, and large computational cost. So, they minimize the inclusive security performance. Thus, it is urgent to preclude medical images from the risks of attacks and threats through employing effective cryptography techniques. Consequently, due to the importance of medical data security, this paper presents a robust way of managing and securing color medical image communication for achieving reliable security in telemedicine applications.
This motivated us, in this paper, to implement an effective and asymmetric optical color medical image cryptosystem, where two random phases are exploited as ciphering keys that are distinct from the deciphering keys. The introduced cryptosystem has an attractive advantage of nonlinear truncation of phase components for the communication of color medical images through insecure channels. Hence, it is suitable for cloud-based telemedicine and healthcare applications. Simulation results of the proposed cryptosystem on different color medical images prove better security performance with lower computational cost in the presence of different types of noise and multimedia attacks.
The paper is planned as follows. Section 2 presents some work related to medical image security. Section 3 introduces the inclusive clarification of the suggested asymmetric cryptosystem for secure color medical image communication. Simulation outcomes and comparisons are provided in Section 5. The main concluding remarks are offered in Section 6.
There is a critical need for telemedicine healthcare opportunities and facilities that can be delivered through software tools. This will create a healthcare delivery system with more timeliness and efficiency. Security plays a crucial role in the transmission of medical data via the Internet. Recently, it has become a challenge to secure medical images in healthcare and telemedicine applications [35–38]. Gupta et al. [39] introduced a high-security medical image cryptosystem that depends on logstic map. In [40], the authors introduced a comparison between chaos theory and elliptic curve cryptography as tools for image security. Abdel-Nabi et al. [41] proposed an algorithm that merges reversible data steganography and ciphering approaches to achieve the required protection of stored and transmitted medical data and images.
In [42], a hybrid approach was proposed for partial encryption. It guarantees optimal and robust storage and communication of medical information. This approach has low processing time for the ciphering-deciphering processes. Bharghavi et al. [43] presented an efficient security system based on chaotic logistic map for reliable medical image transmission. In [44], a robust and fast medical image ciphering approach was suggested for real-time medical communication services. In [45], the authors presented a powerful and efficient medical image ciphering approach. Two chaotic sequences are utilized in this approach for key generation. Then, a diffusion process with two rounds is adopted to create the encrypted medical images. Dai et al. [46] explained a new technique for medical image security based on a hybrid structure of Chebyshev maps and logistic maps to enhance the ciphering performance. In [47], the authors presented a partial encryption framework based on a chaotic map and DNA encoding for securing medical images.
Puech et al. [48] investigated different ciphering techniques for medical image communication. The advantage of these techniques is that they can be employed for images, videos, and 3D objects. In [49], corresponding to cellular automata chaotic features, the authors proposed an efficient medical image ciphering algorithm. The simulation findings showed that this algorithm offers more security and speed. Saraswathi et al. [50] introduced an efficient medical image crptosystem based on an asymmetric stream cipher security technique. It has been concluded that this cryptosystem is robust against various types of cyberattacks. Suganya et al. [51] proposed a hybrid cryptosystem that depends on stream-based and block-based ciphering algorithms. This cryptosystem highly provides integrity control and encryption of medical images. Zhou et al. [52] suggested a security technique that is capable of full protection of chosen regions/objects in medical images.
Moreover, several image security systems [53–58] can be exploited in medical imaging services. In [53], the authors introduced an optical image security algorithm using fringe projection profilometry and Fourier fringe analysis. Das et al. [54] developed an image security system in which the input image is ciphered based on a user-defined key. Jain et al. [55] proposed a partial-random-phase-encoding-based color image ciphering and deciphering framework. Li et al. [56] suggested an effective hybrid image ciphering/compression framework. Ramaraju et al. [57] proposed a least-significant-bit-based image hiding technique. It hides four images inside a single image to generate a stego-image that is then ciphered with a secret key. Wen et al. [58] proposed a robust optical salient region ciphering method, in which the salient regions are pre-ciphered by employing a chaotic optical ciphering technique.
Although the statistical security analysis of the previous related works [1–58] showed numerous differences, most of the presented methods have significant challenges with ciphering and deciphering processes. The traditional encryption methods do not achieve the required quality level in the presence of multimedia assaults. Consequently, the presented state-of-the-art methods have low performance levels in the presence of multimedia attacks and channel noise. Additionally, the state-of-the-art methods have not been assessessed with enough evaluation metrics and in-detail statistical security analysis. In addition, they necessitate additional calculations in the ciphering and deciphering procedures, and hence, they have large computational cost. Therefore, considering the shortcomings of the previous encryption methods in the literature, an efficient optical color medical image cryptosystem based on the asymmetric PTFrFT encryption algorithm is suggested in this paper for telemedicine and healthcare security applications. The security examination of the presented algorithm is investigated through visual results, differential analysis, histograms, encryption quality analysis, information entropy, communication noise analysis, and security analysis. Therefore, several statistical tests on different samples of color medical images are performed.
3 Proposed Optical PTFrFT-Based Color Medical Image Cryptosystem
The proposed optical cryptosystem consists of two stages of encryption and decryption as illustrated in Figs. 1a and 1b. The encryption keys of the medical images comprise the generated optical keys of arbitrary phase masks (PMs) of the employed asymmetric PTFrFT algorithm.
The precious aspect of the employed asymmetric PTFrFT cryptosystem is that there are two distinct ciphering/deciphering secret keys. This tremendous trait has encouraged us to utilize it for building a secure and robust color medical image cryptosystem. The PTFrFT is estimated with the FrFT of the plain color medical image with the truncation operation of phase components, where the amplitude modular part of the FrFT spectrum is merely exploited, and the phase part of the FrFT spectrum is separated. The ciphering methodology of the introduced cryptosystem is executed with the steps demonstrated in Fig. 1a.
1) Separate the input color medical image into the R, G, and B color components
2) Multiply the separated color components by the first phase masks
where PR{.} and PT{.} are the phase reservation and truncation operators, respectively. The
3) Similarly, repeat Step (2) through multiplying by the second phase masks
where the obtained
where
The benefit from using two FrFT stages is significantly improving the robustness and security of the introduced medical image cryptosystem based on the fractional orders and scaling factors of the FrFT. Due to these advantages, it is highly recommended in the proposed cryptosystem. More detailed discussions about the FrFT are found [4,5]. The deciphering steps are the inverse of the above-mentioned ciphering steps, as demonstrated in Fig. 1b. Consequently, the deciphering procedure can be implemented by exploiting the private deciphering secret keys
Different color medical images that have different features are chosen and examined to substantiate the profits of the suggested optical color medical image cryptosystem. The utilized color medical images are primarily decomposed into their R, G, and B components to be used as the cryptosystem input. The simulation experiments are performed using a laptop with 8 GB RAM, and i7-5200 Intel CPU. The utilized software in the simulation tests is the MATLAB R2020b.
The visual analysis is the most important assessment tool utilized to appraise the security strength and efficiency of the suggested cryptosystem. The examined color medical images and their encrypted versions with the suggested optical asymmetric cryptosystem and the conventional optical symmetric DRPE and OSH cryptosystems [7,9,10,22] are displayed in Fig. 2. It is obvious that the suggested cryptosystem is more beneficial compared to other cryptosystems in concealing and diminishing the significant objects contained within the studied color medical images.
The pixel distributions of the original and ciphered images can be demonstrated through histogram analysis [16]. Both histograms of the original and ciphered images must be different to illustrate good encryption. Fig. 3 indicates the histogram security analysis of the examined original and ciphered images with the suggested and conventional cryptosystems. It is obvious that the original image histograms are entirely different from the ciphered image histograms. This proves the reliability of the suggested cryptosystem and the conventional ones.
The entropy metric is exploited to describe the unpredictability degree of the ciphered color medical image. The proposed cryptosystem is close to achieving an ideal entropy value of 8 [23]. Tab. 1 offers the entropy outcomes of the analyzed original, encrypted, and decrypted color medical images for the suggested optical PTFrFT cryptosystem and the conventional optical cryptosystems. The obtained superior entropy values for the suggested cryptosystem prove its robustness and reliability compared to other cryptosystems through achieving better values close to the desired optimal value.
Remarkable cryptosystems are supposed to eliminate any relationship among color medical image pixels to protect the color medical image content from statistical channel attacks [20]. Tabs. 2–4 demonstrate the diagonal (D), horizontal (H), and vertical (V) correlation outcomes for the studied original, enciphered, and deciphered color medical images with the proposed cryptosystem compared to DRPE and OSH cryptosystems. The obtained D, H, and V correlation values are enormously low for the ciphered images obtained by the proposed cryptosystem compared to the traditional cryptosystems. This proves its superior security performance.
4.5 Encryption Quality Security Analysis
The deviation irregularity (ID) and the histogram deviation (HD) metrics [53] can be used to assess the quality performance and ciphering efficacy of the proposed optical cryptosystem. They are utilized to determine the deviation percentage of the irregularity and histogram difference between the original and ciphered medical images. Tab. 5 demonstrates the estimated ID and HD outcomes, where lower values are obtained for both, which is recommended for achieving superior ciphering efficacy. Consequently, the larger the decorrelation between the original and ciphered images is, the improved the operation of the suggested cryptosystem compared to the conventional DRPE and OSH cryptosystems.
4.6 Differential Security Analysis
The differential security cryptanalysis in terms of the NPCR (Number of Changing Pixel Rate) and UACI (Unified Averaged Changed Intensity) [44] is employed to verify the robustness of the proposed cryptosystem in the presence of slight modifications of the encrypted images. For good security and robustness, it is required to achieve NPCR and UACI values of 0.996 and 0.33, respectively [9]. It is observed that the obtained UACI and NPCR values in Tab. 6 for the proposed cryptosystem are astonishingly close to the desired values in contrast to the conventional cryptosystems.
4.7 SSIM, FSIM and PSNR Analysis
The SSIM (Structural Similarity), PSNR (Peak Signal-to-Noise Ratio), and FSIM (Feature Similarity) metrics [12,17] are exploited to assess the cryptosystem performance. In our security analysis, these metrics are calculated between the enciphered and plain medical images. They need to have small values for a proper enciphering process. Tab. 7 demonstrates the obtained results of the proposed and the conventional DRPE and OSH cryptosystems, where superior values are delivered by the proposed cryptosystem in contrast to the traditional cryptosystems.
The metric of EDR (Edge Differential Ratio) is employed to evaluate the misrepresentations in the boundaries and borders that result from the encryption process in the color medical images [24]. Tab. 8 reveals that the EDR outcomes of the examined color medical images are close to 1 for the proposed PTFrFT cryptosystem. Thus, this guarantees that the encrypted and plain images are totally different. Fig. 4 shows the Laplacian edge Gaussian results of the original and enciphered images with the proposed cryptosystem compared to those of the conventional algorithms. These visual outcomes confirm the amazing benefit of the proposed cryptosystem in concealing the most important aspects and features within the transmitted medical images.
4.9 Key Sensitivity Security Analysis
It is required for a cryptosystem to be susceptible to the control and initial values [17]. This can be validated by investigating the key security analysis. The suggested cryptosystem provides different outcomes, when the control parameters are changed. Fig. 5 offers the key sensitivity outcomes in the form of decrypted images and their histograms using incorrect key values. It is observed that the suggested cryptosystem and the tested DRPE and OSH cryptosystems have high sensitivity to slight changes in control parameters.
The transmission network commonly encompasses different types of noise. The proposed decryption process should survive the impact of noise. The effects of Salt and Pepper, Gaussian, and Speckle noise [14,22,47] are investigated in the simulation experiments. Figs. 6–8 display the outcomes of deciphered medical images for the encrypted images presented in Fig. 2 in the presence of noise with different amounts with the proposed PTFrFT and the conventional DRPE and OSH cryptosystems. It is observed that the deciphered color medical images are measurable and discernable if the transmission noise affects the enciphered color medical images. Hence, the proposed cryptosystem has a noticable advantage of resisting the effect of transmission noise compared to the conventional DRPE and OSH cryptosystems.
4.11 Computational Processing Analysis
It is recommended for any cryptosystem to have less computations in addition to high security and efficacy. Tab. 9 presents the estimated values of the encryption/decryption times for the DRPE, OSH, and PTFrFT cryptosystems. The estimated encryption/decryption computation times provide evidence that the suggested cryptosystem is highly appropriate for real-time telemedicine services compared to other conventional cryptosystems.
In this section, we introduce a comprehensive comparative study for evaluating the performance of the proposed cryptosystem for confident color medical image transmission compared to the recent studies [3–6,8,11–21,29,30,32,34] using the color Lena image. The outcomes of the average UACI, correlation, entropy, PSNR, and NPCR values for the enciphered color image are demonstrated in Tab. 10. It is noticed that all security evaluation metrics of the proposed cryptosystem are close or superior to those of the previous studies. Thus, the proposed optical cryptosystem can survive various types of multimedia attacks due to its robustness and reliability compared to related cryptosystems. It also achieves a higher level of confusion efficacy. The obtained outcomes reveal that the proposed optical cryptosystem has minimal complications and good resistance to various types of attacks compared to the conventional cryptosystems. In summary, the proposed cryptosystem provides more robustness and security and higher speed.
5 Conclusion and Suggestions for Future Work
A secure optical cryptosystem was suggested for efficient color medical image communication. It is based on the utilization of the optical asymmetric PTFrFT algorithm. In the proposed cryptosystem, a multi-stage FrFT with different fractional orders is exploited for allowing a secure and robust color medical image transmission for telemedicine applications. The suggested asymmetric cryptosystem depends on two-phase distributions in the fractional Fourier and output planes as decryption keys. Comparison and simulation experiments have been carried out to compare the proposed optical cryptosystem with other optical and digital cryptosystems. The obtained results confirmed the exciting success of the proposed optical cryptosystem in meritoriously ciphering the transmitted color medical images. Subsequently, it is highly appreciated for safeguarding medical image telemedicine services rather than the conventional optical and digital cryptosystems. In the future work, we plan to test the proposed cryptosystem on 3D medical images with different modalities. A hybrid cryptosystem of digital and optical encryption algorithms could be introduced to merge their main advantages for achieving high robustness and security of medical image communication.
Acknowledgement: The authors would like to thank the support of the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University.
Funding statement: This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program to support publication in the top journal (Grant no. 42-FTTJ-12).
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |