Encryption of DICOM medical images to increase security and prevent changes and unauthorized access to these images
Subject Areas : Information Technology in Engineering Design (ITED) Journal
Mohammad Soltani
1
,
Hassan Shakeri
2
*
,
Mahboobeh Houshmand
3
1 -
2 - Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran
3 - Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran
Keywords: Security, DICOM, Encryption using 3D logistics map, Patient biometric information, Digital signature,
Abstract :
Medical information, including electronic health records, is transmitted over an open network. One of the technologies used to protect medical images is encryption. In this paper, an efficient hybrid encryption algorithm is proposed for the security of digital images and medical communications in the healthcare field. The proposed algorithm uses an artificial intelligence algorithm and a 3D logistic map encryption algorithm. In this algorithm, before receiving the patient's DICOM image, the patient's biometric information is first evaluated by artificial intelligence, and if the received biometric information is correct, the DICOM image is encrypted using the 3D logistic map encryption algorithm in the next steps. In addition, to increase security, in the encryption of each DICOM image, all encryption and decryption keys in all stages depend on the patient's biometric information, such as fingerprint or iris. Based on the results obtained from the proposed algorithm, the maximum entropy is 7.9998, the NPCR value is 99.98%, the UACI value is 33.52%, the key space is more than 1089, and the correlation is non-zero. Also, the use of patient biometric information indicates the high resistance of the algorithm against brute force attacks.
[1] K. S. Mann and A. Bansal, "HIS integration systems using modality worklist and DICOM," Procedia Computer Science, vol. 37, pp. 16-23, 2014.
[2] M. Puppala, T. He, X. Yu, S. Chen, R. Ogunti, and S. T. Wong, "Data security and privacy management in healthcare applications and clinical data warehouse environment," in 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), 2016: IEEE, pp. 5-8.
[3] P. Shojaei, E. Vlahu-Gjorgievska, and Y.-W. Chow, "Security and privacy of technologies in health information systems: A systematic literature review," Computers, vol. 13, no. 2, p. 41, 2024.
[4] J. Chandrasekaran and S. J. Thiruvengadam, "A hybrid chaotic and number theoretic approach for securing DICOM images," Security and Communication Networks, vol. 2017, 2017.
[5] X. Chai, Y. Chen, and L. Broyde, "A novel chaos-based image encryption algorithm using DNA sequence operations," Optics and Lasers in engineering, vol. 88, pp. 197-213, 2017.
[6] M. Magdy, K. M. Hosny, N. I. Ghali, and S. Ghoniemy, "Security of medical images for telemedicine: a systematic review," Multimedia Tools and Applications, vol. 81, no. 18, pp. 25101-25145, 2022.
[7] B. Zhang, B. Rahmatullah, S. L. Wang, A. Zaidan, B. Zaidan, and P. Liu, "A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations," Multimedia Tools and Applications, pp. 1-40, 2023.
[8] J. C. Dagadu, J.-P. Li, and E. O. Aboagye, "Medical image encryption based on hybrid chaotic DNA diffusion," Wireless Personal Communications, vol. 108, pp. 591-612, 2019.
[9] P. Praveenkumar, R. Amirtharajan, K. Thenmozhi, and J. B. B. Rayappan, "Medical data sheet in safe havens–A tri-layer cryptic solution," Computers in biology and medicine, vol. 62, pp. 264-276, 2015.
[10] P. T. Akkasaligar and S. Biradar, "Selective medical image encryption using DNA cryptography," Information Security Journal: A Global Perspective, vol. 29, no. 2, pp. 91-101, 2020.
[11] C. Fu, G.-y. Zhang, O. Bian, W.-m. Lei, and H.-f. Ma, "A novel medical image protection scheme using a 3-dimensional chaotic system," PloS one, vol. 9, no. 12, p. e115773, 2014.
[12] S. M. Seyedzadeh and S. Mirzakuchaki, "A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map," Signal processing, vol. 92, no. 5, pp. 1202-1215, 2012.
[13] Y. Dai and X. Wang, "Medical image encryption based on a composition of logistic maps and chebyshev maps," in 2012 IEEE international conference on information and automation, 2012: IEEE, pp. 210-214.
[14] Y. Zhou, L. Bao, and C. L. P. Chen, "A new 1D chaotic system for image encryption," Signal processing, vol. 97, pp. 172-182, 2014.
[15] D. Ravichandran, P. Praveenkumar, J. B. B. Rayappan, and R. Amirtharajan, "Chaos based crossover and mutation for securing DICOM image," Computers in biology and medicine, vol. 72, pp. 170-184, 2016.
[16] M. Boussif, N. Aloui, and A. Cherif, "Smartphone application for medical images secured exchange based on encryption using the matrix product and the exclusive addition," IET Image Processing, vol. 11, no. 11, pp. 1020-1026, 2017.
[17] W. Wen, K. Wei, Y. Zhang, Y. Fang, and M. Li, "Colour light field image encryption based on DNA sequences and chaotic systems," Nonlinear Dynamics, vol. 99, no. 2, pp. 1587-1600, 2020.
[18] J. S. Muthu and P. Murali, "A novel DICOM image encryption with JSMP map," Optik, vol. 251, p. 168416, 2022.
[19] S. Mortajez, M. Tahmasbi, J. Zarei, and A. Jamshidnezhad, "A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images," Informatics in Medicine Unlocked, vol. 20, p. 100396, 2020.
[20] D. Ravichandran, A. Banu S, B. Murthy, V. Balasubramanian, S. Fathima, and R. Amirtharajan, "An efficient medical image encryption using hybrid DNA computing and chaos in transform domain," Medical & biological engineering & computing, vol. 59, pp. 589-605, 2021.
[21] W. Yang, S. Wang, J. Hu, G. Zheng, and C. Valli, "Security and accuracy of fingerprint-based biometrics: A review," Symmetry, vol. 11, no. 2, p. 141, 2019.
[22] A. Banu S and R. Amirtharajan, "A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach," Medical & biological engineering & computing, vol. 58, pp. 1445-1458, 2020.
[23] A. K. Trivedi, D. M. Thounaojam, and S. Pal, "Non-invertible cancellable fingerprint template for fingerprint biometric," Computers & Security, vol. 90, p. 101690, 2020.
[24] W. U. Wickramaarachchi, D. Zhao, J. Zhou, and J. Xiang, "An effective iris biometric privacy protection scheme with renewability," Journal of Information Security and Applications, vol. 80, p. 103684, 2024.
[25] P. P. Polash and M. M. Monwar, "Human iris recognition for biometric identification," in 2007 10th international conference on computer and information technology, 2007: IEEE, pp. 1-5.
[26] F. Jan, S. Alrashed, and N. Min-Allah, "Iris segmentation for non-ideal Iris biometric systems," Multimedia Tools and Applications, vol. 83, no. 5, pp. 15223-15251, 2024.
[27] S. B. Abdullahi et al., "Biometric information recognition using artificial intelligence algorithms: A performance comparison," IEEE Access, vol. 10, pp. 49167-49183, 2022.
[28] A. P. Iyer, J. Karthikeyan, R. Khan, and P. Binu, "An analysis of artificial intelligence in biometrics-the next level of security," J Crit Rev, vol. 7, no. 1, pp. 571-576, 2020.
[29] G. P. Babu, U. S. Aswal, M. Sindhu, V. J. Upadhye, and H. Patil, "Enhancing security with machine learning-based finger-vein biometric authentication system," in 2024 5th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI), 2024: IEEE, pp. 797-802.
[30] H. Khanzadi, M. Eshghi, and S. E. Borujeni, "Image encryption using random bit sequence based on chaotic maps," Arabian Journal for Science and engineering, vol. 39, no. 2, pp. 1039-1047, 2014.
[31] R. Karim, L. S. Rumi, M. Ashiqul Islam, A. A. Kobita, T. Tabassum, and M. Sagar Hossen, "Digital signature authentication for a bank using asymmetric key cryptography algorithm and token based encryption," in Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2020, 2021: Springer, pp. 853-859.
[32] N. Kumar, S. Saini, and D. Garg, "Color Image Encryption Model Based on 3-D Chaotic Logistic Map and JAYA Algorithm," IETE Journal of Research, vol. 70, no. 12, pp. 8414-8424, 2024.
[33] Y. Huang, L. Wang, Z. Li, and Q. Zhang, "A new 3D robust chaotic mapping and its application to speech encryption," Chaos, Solitons & Fractals, vol. 184, p. 115038, 2024.
[34] D. Zhang, L. Chen, and T. Li, "Hyper-chaotic color image encryption based on 3D orthogonal Latin cubes and RNA diffusion," Multimedia Tools and Applications, vol. 83, no. 2, pp. 3473-3496, 2024.
[35] M. Kumari and S. Gupta, "A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res 9 (1): 10," ed, 2018.
[36] Z. Zhuang, Z. Zhuang, and T. Wang, "Medical image encryption algorithm based on a new five-dimensional multi-band multi-wing chaotic system and QR decomposition," Scientific Reports, vol. 14, no. 1, p. 402, 2024.
[37] S. Zhu, X. Deng, W. Zhang, and C. Zhu, "Secure image encryption scheme based on a new robust chaotic map and strong S-box," Mathematics and Computers in Simulation, vol. 207, pp. 322-346, 2023.
[38] C. Xu, Y. Shang, Y. Yang, and C. Zou, "An encryption algorithm for multiple medical images based on a novel chaotic system and an odd-even separation strategy," Scientific Reports, vol. 15, no. 1, p. 2863, 2025.
[39] H. Wen et al., "Exploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing," Scientific Reports, vol. 14, no. 1, p. 8805, 2024.
[40] M. Kumari and S. Gupta, "A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher," 3D Research, vol. 9, pp. 1-20, 2018.
[41] M. Kumar, A. S. Chivukula, and G. Barua, "Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain," Scientific Reports, vol. 15, no. 1, p. 1211, 2025.
[42] H. Kolivand, S. F. Hamood, S. Asadianfam, and M. S. Rahim, "Image encryption techniques: A comprehensive review," Multimedia Tools and Applications, 2024.
[43] S. S. Jamal, M. M. Hazzazi, M. F. Khan, Z. Bassfar, A. Aljaedi, and Z. ul Islam, "Region of interest-based medical image encryption technique based on chaotic S-boxes," Expert Systems with Applications, vol. 238, p. 122030, 2024.
[44] S. T. Ahmed, D. A. Hammood, R. F. Chisab, A. Al-Naji, and J. Chahl, "Medical image encryption: a comprehensive review," Computers, vol. 12, no. 8, p. 160, 2023.
[45] Rosset. "The world famous medical imaging viewer." https://www.osirixviewer.com/,2022,5 (accessed.
[46] NCI. "Cancer imaging archive." https://www.cancerimagingarchive.net/,2022 (accessed.
[47] W. Newhauser et al., "Anonymization of DICOM electronic medical records for radiation therapy," Computers in biology and medicine, vol. 53, pp. 134-140, 2014.
[48] R. Gauriau et al., "Using DICOM metadata for radiological image series categorization: a feasibility study on large clinical brain MRI datasets," Journal of digital imaging, vol. 33, pp. 747-762, 2020.
[49] W. Hou, S. Li, J. He, and Y. Ma, "A novel image-encryption scheme based on a non-linear cross-coupled hyperchaotic system with the dynamic correlation of plaintext pixels," Entropy, vol. 22, no. 7, p. 779, 2020.
[50] A. G. Radwan, S. K. Abd-El-Hafiz, and S. H. AbdElHaleem, "Image encryption in the fractional-order domain," in 2012 International Conference on Engineering and Technology (ICET), 2012: IEEE, pp. 1-6.
[51] P. Praveenkumar et al., "Transreceiving of encrypted medical image–a cognitive approach," Multimedia Tools and Applications, vol. 77, pp. 8393-8418, 2018.
[52] M. Soltani, H. Shakeri, and M. Houshmand, "Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images," Iranian Journal of Electrical and computer Engineering, 2023.
[53] M. Soltani and A. K. Bardsiri, "Designing A Novel Hybrid Algorithm for QR-Code Images Encryption and Steganography," J. Comput., vol. 13, no. 9, pp. 1075-1088, 2018.
[54] M. Soltani, "A New Secure Image Encryption Algorithm using Logical and Visual Cryptography Algorithms and based on Symmetric Key Encryption," Journal of Basic and Applied Scientific Research, vol. 3, no. 6, pp. 1193-1201, 2013.
[55] X. Chai, J. Zhang, Z. Gan, and Y. Zhang, "Medical image encryption algorithm based on Latin square and memristive chaotic system," Multimedia Tools and Applications, vol. 78, pp. 35419-35453, 2019.
[56] J. C. Dagadu, J.-P. Li, and E. O. Aboagye, "Medical image encryption based on hybrid chaotic DNA diffusion," Wireless Personal Communications, vol. 108, no. 1, pp. 591-612, 2019.
[57] X. Chai, J. Zhang, Z. Gan, and Y. Zhang, "Medical image encryption algorithm based on Latin square and memristive chaotic system," Multimedia Tools and Applications, vol. 78, no. 24, pp. 35419-35453, 2019.
[58] J. Tully, J. Selzer, J. P. Phillips, P. O'Connor, and C. Dameff, "Healthcare challenges in the era of cybersecurity," Health security, vol. 18, no. 3, pp. 228-231, 2020.
[59] R. Tertulino, N. Antunes, and H. Morais, "Privacy in electronic health records: a systematic mapping study," Journal of Public Health, vol. 32, no. 3, pp. 435-454, 2024.
[60] Priyanka and A. K. Singh, "A survey of image encryption for healthcare applications," Evolutionary Intelligence, vol. 16, no. 3, pp. 801-818, 2023.