Computers, Materials & Continua DOI:10.32604/cmc.2022.030267 | |
Article |
Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment
1Department of Electronics & Instrumentation Engineering, V. R. Siddhartha Engineering College, Vijayawada, 520007, India
2Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia
3Department of Computer Science and Engineering, Malla Reddy Engineering College(A), Hyderabad, 500100, India
4Department of Computer Science and Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, 530049, India
5Department of Applied Data Science, Noroff University College, 4612, Kristiansand, Norway
6Department of Computer Engineering, Mokwon University, Daejeon, 35349, Korea
7Department of Technology Education, Chungnam National University 99, Daehak-ro, Yuseong-gu, Daejeon, 34134, Korea
*Corresponding Author: Yongsung Kim. Email: kys1001@cnu.ac.kr
Received: 22 March 2022; Accepted: 04 May 2022
Abstract: Internet of Things (IoT) and blockchain receive significant interest owing to their applicability in different application areas such as healthcare, finance, transportation, etc. Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks. This paper presents a new wind driven optimization algorithm based medical image encryption (WDOA-MIE) technique for blockchain enabled IoT environments. The WDOA-MIE model involves three major processes namely data collection, image encryption, optimal key generation, and data transmission. Initially, the medical images were captured from the patient using IoT devices. Then, the captured images are encrypted using signcryption technique. In addition, for improving the performance of the signcryption technique, the optimal key generation procedure was applied by WDOA algorithm. The goal of the WDOA-MIE algorithm is to derive a fitness function dependent upon peak signal to noise ratio (PSNR). Upon successful encryption of images, the IoT devices transmit to the closest server for storing it in the blockchain securely. The performance of the presented method was analyzed utilizing the benchmark medical image dataset. The security and the performance analysis determine that the presented technique offers better security with maximum PSNR of 60.7036 dB.
Keywords: Internet of things; image security; medical images; encryption; optimal key generation; blockchain
With the fast advancement in medical innovation, it became normal to analyze different sicknesses utilizing medical images. Medical images are communicated through various organizations; hence, getting these images turned into a fundamental theme lately [1]. Safe transmission of medical images requires secrecy, trustworthiness, and validation. Unapproved use of such images might prompt loss of security of patients’ information [2]. The Internet of Things (IoT) characterizes the idea of associated gadgets and objects of numerous types over the web, remote, or wired. For example, the most recent movements from 1G to 5G organizations assume a significant part in the IoT applications and frameworks. This idea draws in scientists’ interest and consideration about the conceivable protection and security chances, especially with high transmission capacity and recurrence [3]. The short frequency is probably going to change the framework, making a requirement for more base stations serving a similar area covered by the other remote system [4]. The absence of gadget refreshes, oblivious utilization of the gadgets without understanding the related outcomes, and change of passwords have expanded the cybersecurity access and dangers to malignant uses of touchy information on IoT frameworks [5]. The unseemly security components increment the chance of an information break, among different dangers. Additional, one of the security specialists consider that IoT gadgets give weak focus to digital assaults due to powerless security strategies and conventions [6]. Notwithstanding the few security systems that have been created and set up to safeguard IoT gadgets from digital assaults, rules on arising security challenges are satisfactorily recorded. This implies that the end-client can’t utilize defensive measures to turn away the assaults on information. Overseeing IoT-empowered security thinks about three contemplations.
To start with, perceive the gadgets as associated with an organization. Second, decide and uphold what different frameworks, applications, and devices convey [7]. In conclusion, guarantee that these IoT gadgets have disrupted different gadgets in the organization or the associations assuming something turns out badly. The openness of IoT applications permits to make a finding, make duplicates, information, and recover an enormous number of advanced images all over the planet. It regularly brings about the creation of ill-conceived duplicates or unapproved use in concern [8]. In this manner, to safeguard images, numerous scientists have zeroed in on creating procedures for image security in IoT applications [9]. To get each kind of image, for instance, medical images, numerous innovations have been grown up until this point. Encryption is among these innovations the most unconstrained and proficient method for changing images into unnoticed examples. Just with the upholding right (secret) key, would the first image be able to be recuperated productively [10]. A few image encryptions plans have as of late been proposed which can be utilized to safeguard high-security medical images.
This paper presents a new wind driven optimization algorithm based medical image encryption (WDOA-MIE) technique for blockchain enabled IoT environments. The WDOA-MIE model involves three major processes namely data collection, image encryption, optimal key generation, and data transmission. Initially, the medical images are captured from the patient using IoT devices. Then, the captured images are encrypted using signcryption technique. Moreover, for improving the performance of the signcryption technique, the optimal key generation process was applied by WDOA algorithm. The performance of the presented algorithm was examined using the benchmark medical image dataset.
Alqaralleh et al. [11] designed deep learning (DL) using blockchain-aided secured image communication and diagnoses method for the IoT setting. Mainly, elliptic curve cryptography (ECC) is exploited, also the optimum key generation of ECC occurs by hybridizing grasshopper using fruit-fly optimization (GO-FFO) approach. Next, the neighborhood indexing sequence (NIS) using burrow wheeler transform (BWT), named NIS-BWT was applied for encrypting the hash value. In conclusion, a DBN was employed as the classifier method for diagnosing the presence of disease. Khasawneh et al. [12] examine the parallel technique of image encryption on a massive amount of remotely sensed image from Hadoop. The Hadoop file visit technique is improved thus it could process the whole Tiff files as an individual unit. Moreover, the file setup is expanded to support Hadoop for supporting GeoTiff in Hadoop. The outcomes of the experiment show that the presented approach is scalable and effective to a massive amount of images in comparison with other familiar techniques.
Bharadwaj et al. [13] presented a simple security architecture for ensuring the secrecy of medicinal information in the transmission among IoT hops. The presented architecture employs the idea of encryption to guarantee safety. In [14], presented a V-net convolution neural network (CNN) based 4D hyperchaotic scheme for medicinal image encryption. Initially, the plaintext medicinal image is processed into 4D hyperchaotic sequential image, involving pseudorandom sequence generation, image segmentation, and chaotic system processing. Jan et al. [15] proposed an Image Encryption architecture based on Hessenberg transform and Chaotic encryption (IEFHAC), for reducing computation time and enlightening privacy when encrypting patient information. IEFHAC employs 2 1D-chaotic maps: Sine and Logistic maps for the data confusion, whereas diffusion was accomplished by employing the Hessenberg household transform. The Logistic and Sin maps were utilized for regeneration affecting output, as dynamically changes the primary parameter. Some other models are available in the literature [16–25].
In this article, a new WDOA-MIE technique has been developed for blockchain enabled IoT environment. The WDOA-MIE model enables the acquisition of medical images from the patient via IoT devices. Followed by, the acquired images are coded by the use of signcryption technique. For enhancing the efficacy of the signcryption technique, the optimal key generation process was applied by WDOA algorithm.
At this stage, the acquired images are coded by the use of signcryption technique [26]. Signcryption is determined by a public-key primitive that performs the use of encryption and digital signature. The digital signature and encryption are considered important cryptographic tool that ensures redundancy, privacy, and reliability. However, it can be constraint with two potential objectives namely maximum processing cost and minimum efficiency. The signcryption is determined by an expanded method of cryptographic framework that is applied for implementing encryption and digital signature in a single logical stage and to limit the transmission overhead and assessment cost. A signcryption includes digital signature and encryption methods which are appropriate rather than encryption and individual signature. Assume the hybrid encryption was employed rather than utilizing easier encryption, the single session-key was treated in various encryption for achieving optimal signature-encryption in comparison to signcryption method.
The signcryption indicates the public-key primitive that constituted 2 indispensable cryptographic tool that is capable of ensuring honesty, non-repudiation, and privacy. The initialized technique initialized the prime number, hash function (HF) with key. It develops the public and private keys to the sender and receiver. To increase the information security, the presented method uses the perfect private key by enhanced method.
Initialization:-
Sender Key pair
3.2 Level II: Optimal Key Generation Using WDOA
For enhancing the efficacy of the signcryption technique, the optimal key generation procedure is carried out by WDOA algorithm [27]. The stimulus of the presented WDOA develops in the atmosphere. During the atmosphere, wind blows from try for balancing the imbalance of pressures. It flows in maximal pressure regions for minimal regions at a velocity. The initial point of WDOA technique was Newton’s second law of motion that was utilized for providing accurate outcomes for investigation of atmospheric motion from the Lagrangian description
whereas
In which
In which
whereas the acceleration
At the beginning of (2), the density
In which
The formula of updating the place was explained as in (11):
whereas
The WDOA derived a fitness function for optimum key generation procedure, as follows.
The purpose of the WDOA is to choose the optimum key for the signcryption method that the peak signal to noise ratio (PSNR) is increased. Fig. 1 depicts the flowchart of WDOA.
3.3 Level III: Blockchain Enabled Secure Transmission
The recognized field of Blockchain is a Bitcoin Blockchain that can be determined as a ledger established to provide economic transactions via Bitcoin cryptocurrency [28]. The miners are appropriate in confirming the operation and gathering into block; miners are appropriate in solving exclusive cryptographic puzzles termed “proof-of-work,” wherein a determined hash value is associated with concluding blocks. In recent times, alternative class of Blockchain model has been organized.
For example, Ethereum Blockchain Buterin provides a standardized technique by using “smart contracts” which allows the program to implement the Blockchain and implements retrieval and storage operation. Furthermore, the information is stored in inner state parameter and describes the convention procedure to alter the real state. The procedure implemented in current contracts is transmitted in transaction that is universally progressive. Such techniques are validated and measurable by miners in Ethereum Blockchain and guarantee legitimacy. This feature develops Blockchain model in healthcare field and thus, developer enhances the healthcare prediction. Fig. 2 depicts the framework of blockchain.
This section portrays the results offered by the WDOA-MIE model on benchmark medical images. Fig. 3 shows the sample set of test medical images. Besides, Fig. 4 illustrates the histogram of the input and encrypted images.
Tab. 1 reports the overall results offered by the WDOA-MIE model on six test images. The experimental values implied that the WDOA-MIE model has obtained minimal values of MSE and RMSE with maximum values of PSNR and structural similarity (SSIM). For instance, on image-1, the WDOA-MIE method has gained mean square error (MSE) of 0.0713, root mean square error (RMSE) of 0.2670, PSNR of 59.5999 dB, and SSIM of 0.9999. Besides, on image-2, the WDOA-MIE model has obtained MSE of 0.1021, RMSE of 0.3195, PSNR of 58.0405 dB, and SSIM of 0.9992. At last, on image-6, the WDOA-MIE model has resulted in MSE of 0.0553, RMSE of 0.2352, PSNR of 60.7036 dB, and SSIM of 0.9993.
Tab. 2 and Fig. 5 illustrate a comparative MSE examination of the WDOA-MIE model with other encryption models. The results signified the betterment of the WDOA-MIE model with least values of MSE. For instance, with Image-1, the WDOA-MIE model has gained lower MSE of 0.0713 while the RSA, ECC, cuckoo search (CS), and particle swarm optimization (PSO) approaches have achieved superior MSE of 0.3379, 0.2446, 0.1792, and 0.1680 respectively. Moreover, with Image-4, the WDOA-MIE model has gained lower MSE of 0.0748 while the RSA, ECC, CS, and PSO models have reached increased MSE of 0.3449, 0.2140, 0.1865, and 0.1747 respectively. Furthermore, with Image-5, the WDOA-MIE model has resulted in least MSE of 0.0553 but the RSA, ECC, CS, and PSO models have accomplished increased MSE of 0.3225, 0.2398, 0.1744, and 0.1245 respectively.
A comprehensive PSNR investigation of the WDOA-MIE model with recent models is made in Tab. 3 and Fig. 6. The obtained values implied that the WDOAMIE model has accomplished effectual outcomes with increased PSNR values under all images. For instance, with image1, the WDOAMIE approach has provided maximum PSNR of 59.60 dB but the RSA, ECC, CS, and PSO models have resulted to lower PSNR of 52.84, 54.25, 55.60, and 55.88 dB respectively. Simultaneously, with image5, the WDOAMIE model has delivered enhanced PSNR of 57.82 dB whereas the RSA, ECC, CS, and PSO models have accomplished reduced PSNR of 53, 54.80, 55.88, and 56.55 dB respectively.
A comprehensive SSIM investigation of the WDOAMIE model with existing models is made in Tab. 4 and Fig. 7. The achieved values implied that the WDOAMIE model has accomplished effectual outcomes with increased SSIM values under all images. For instance, with Image-1, the WDOAMIE method has provided superior SSIM of 0.9989 while the RSA, ECC, CS, and PSO models have resulted to lower SSIM 0.9600, 0.9706, 0.9782, and 0.9836 respectively. Simultaneously, with Image-5, the WDOAMIE model has delivered enhanced SSIM of 0.9949 whereas the RSA, ECC, CS, and PSO models have accomplished reduced SSIM of 0.9260, 0.9700, 0.9707, and 0.9825 respectively.
Tab. 5 and Fig. 8 exemplify a comparative computation time (CT) investigation of the WDOA-MIE model with other encryption models [29]. The results indicated the improvement of the WDOA-MIE model with minimum values of CT. For instance, with Image-1, the WDOA-MIE model has gained lower CT of 72.60 s whereas the RSA, ECC, CS, and PSO models have obtained higher CT 106.56, 122.76, 110.22, and 104.10 s respectively. Also, with Image-4, the WDOA-MIE model has gained lower CT of 66.90 s whereas the RSA, ECC, CS, and PSO models have obtained higher CT of 124.62, 80.88, 81.78, 132 s, respectively. In addition, with Image-6, the WDOA-MIE model has resulted in least CT of 42.60 s whereas the RSA, ECC, CS, and PSO models have accomplished increased CT of 128.04, 113.88, 52.38, and 54.66 s respectively.
From the comprehensive results and discussion, it can be evident that the WDOA-MIE model has gained effectual encryption performance over the other methods.
In this article, a new WDOA-MIE technique was established for blockchain enabled IoT environment. The WDOA-MIE model enables the acquisition of medical images from the patient via IoT devices. Followed by, the acquired images are coded by the use of signcryption technique. For enhancing the efficacy of the signcryption technique, the optimal key generation procedure was executed by WDOA algorithm. The goal of the WDOA-MIE algorithm is to derive a fitness function based on PSNR. Upon successful encryption of images, the IoT devices transmit to the closest server for storing it in the blockchain securely. The performance of the presented approach was analyzed utilizing the benchmark medical image dataset. The security and the performance analysis establish that the presented method offers better security with increased PSNR of 60.7036 dB. In future, hybrid metaheuristic optimization algorithms can be designed to further enhance security performance. In addition, lightweight cryptographic techniques can be involved to ensure security.
Acknowledgement: This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2020R1G1A1099559).
Funding Statement: The authors received no specific funding for this study.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |