Skip to main content

Advertisement

Log in

An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, diagnosing patient diseases remotely is a routine and digital medical images analysis as a part of Telecare Medical Information Systems (TMIS) play a fundamental role in early diagnosing and treating most common and serious diseases such as breast cancer. In this context, altering or distorting even a single pixel of a medical image during its transmission over an unsure channel could lead to a wrong diagnosis and harm patient health, induce damaging delays. Therefore the security and privacy of the transmitted medical images must be addressed most seriously. Several techniques are proposed in the literature to address these issues using different techniques such as chaos theory, more recently, elliptic curves cryptography (ECC) or improved classical methods such as linear cryptography. In this paper, we address the security level concern of an image encryption technique combining ECC with Hill cipher (ECCHC) which has been recently proposed by Dawahdeh et al [13]. Our study rises concerns about some weaknesses and flaws of the analyzed encryption scheme against some plain-text and known plain-text attacks. In addition, and not least issue, it is found that the key length used in Dawahdeh et al. scheme is not sufficiently large to be robust against brute force attack. To fix the found flaws and to improve the encryption scheme, a generalized cryptosystem is suggested. In the enhanced version, the key matrix negotiation is redefined to a cipher that combines a modified EC Integrated Encryption Scheme (ECIES) and the linear multiplication matrix is generalized to key matrix of (2n × 2n), n > 2 to counter efficiently the exhaustive search attack. The effectiveness of the proposed version is evaluated and verified through extensive experimentation and most recent available security tools. Compared with the state-of-the art techniques, the proposed version exhibits excellent security features and can resist to various knowing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. http://sipi.usc.edu/database/database.php?volume=miscZ, Access date November 2019

  2. Abdulla AA, Sellahewa H, Jassim SA (2014) .. In: International conference on research in security standardisation. Springer, pp 151–166

  3. Acharya B, Rath GS, Patra SK, Panigrahy SK (2007) Novel methods of generating self-invertible matrix for Hill Cipher algorithm. Int J Secur 1 (1):14

    Google Scholar 

  4. Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools and Applications, 1–21

  5. Allaf AH, Kbir MA (2018) A review of digital watermarking applications for medical image exchange security. The proceedings of the third international conference on smart city applications, pp 472–480

  6. Alshanbari HS (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools and Applications 76(3):3669

    Article  Google Scholar 

  7. Alshanbari HS (2020) Medical image watermarking for ownership & tamper detection, Multimedia Tools and Applications, pp 1–16

  8. Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667

    Article  Google Scholar 

  9. Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96

    Article  Google Scholar 

  10. Chai X, Gan Z, Zhang M (2017) A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimedia Tools and Applications 76(14):15561

    Article  Google Scholar 

  11. Chen Y, Yang Q (2014) Dynamics of a hyperchaotic Lorenz-type system. Nonlinear Dynamics 77(3):569

    Article  MathSciNet  Google Scholar 

  12. Chen J, Zhu Zl, Zhang Lb, Zhang Y, Yang Bq (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Processing 142:340

    Article  Google Scholar 

  13. Dawahdeh ZE, Yaakob SN, bin Othman RR (2018) A new image encryption technique combining elliptic curve cryptosystem with Hill Cipher. Journal of King Saud University-Computer and Information Sciences 30(3):349

    Article  Google Scholar 

  14. Ding J, Li S, Gu Z (2018) High-speed ECC processor over NIST prime fields applied with Toom–Cook multiplication. IEEE Transactions on Circuits and Systems I: Regular Papers 66(3):1003

    Article  Google Scholar 

  15. Dzwonkowski M, Papaj M, Rykaczewski R (2015) A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process 24 (11):4614

    Article  MathSciNet  Google Scholar 

  16. El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144

    Article  Google Scholar 

  17. Farash MS (2013) Cryptography: A New Approach of Classical Hill Cipher. International Journal of Security and Its Applications 7(2):179

    Google Scholar 

  18. Farwa S, Bibi N, Muhammad N (2020) An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling. Multimedia Tools and Applications, pp 1–14

  19. Hayat U, Azam NA (2019) A novel image encryption scheme based on an elliptic curve. Signal Process 155:391

    Article  Google Scholar 

  20. Hill LS (1929) Cryptography in an algebraic alphabet. American Mathematical Monthly 36(6):306

    Article  MathSciNet  Google Scholar 

  21. Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Information sciences 396:97

    Article  Google Scholar 

  22. Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134

    Article  Google Scholar 

  23. Hua Z, Yi S, Zhou Y (2018) A new plaintext-related image encryption scheme based on chaotic sequence. Signal Processing 144:134

    Article  Google Scholar 

  24. Huang H, He Y, Yang S, Ye R (2020) Chaotic image encryption based on bidimensional empirical mode decomposition and double random phase encoding. Multimedia Tools and Applications, pp 1–14

  25. Kannammal A, Rani SS (2012) DICOM image authentication and encryption based on RSA and AES algorithms. In: International conference on intelligent robotics, automation, and manufacturing. Springer, pp 349–360

  26. Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory. Multimedia Tools and Applications, pp 1–17

  27. Karmakar J, Nandi D, Mandal M (2020) A novel hyper-chaotic image encryption with sparserepresentation based compression. Multimedia Tools and Applications, pp 1–24

  28. Kahn D (1996) The Codebreakers: The comprehensive history of secret communication from ancient times to the internet, Simon and Schuster

  29. Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Designs, codes and cryptography 19(2-3):173

    Article  MathSciNet  Google Scholar 

  30. Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187

    Article  Google Scholar 

  31. Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved ElGamal encryption technique. Optik-International Journal for Light and Electron Optics 147:88

    Article  Google Scholar 

  32. Laiphrakpam DS, Khumanthem MS (2018) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimedia Tools and Applications 77(7):8629

    Article  Google Scholar 

  33. Li L, El-Latif AAA, Niu X (2012) Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process 92 (4):1069

    Article  Google Scholar 

  34. Miller VS (1985) .. In: Conference on the theory and application of cryptographic techniques. Springer, pp 417–426

  35. Muhammad K, Ahmad J, Rho S, Baik SW (2017) Baik, Image steganography for authenticity of visual contents in social networks. Multimedia Tools and Applications 76(18):18985

    Article  Google Scholar 

  36. Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC. Int J Commun Syst, p e3913

  37. Parvees MM, Samath JA, Bose BP (2017) Medical images are safe-an enhanced chaotic scrambling approach. J Med Sys 41(10):167

    Article  Google Scholar 

  38. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine 72:170

    Article  Google Scholar 

  39. Saeednia S (2000) How to make the Hill cipher secure. Cryptologia 24(4):353

    Article  Google Scholar 

  40. Shang M, Yan Z, Zeguo Y, Jianhao H, Xin L (2019) A new plaintext-related image encryption scheme based on chaotic sequence. IEEE Access 7:30344

    Article  Google Scholar 

  41. Soualmi A, Alti A, Laouamer L (2018) A new blind medical image watermarking based on Weber descriptors and Arnold chaotic map. Arabian, Journal for Science and Engineering, pp 1–13

  42. Soualmi A, Alti A, Laouamer L (2018) A new blind medical image watermarking based on Weber descriptors and Arnold chaotic map. Arabian Journal for Science and Engineering, https://doi.org/10.1007/s13369-018-3246-7

  43. Vincent J (2018) 1.5 million affected by hack targeting Singapore’s health data. https://www.theverge.com

  44. Washington LC (2003) Elliptic curves: number theory and cryptography. Chapman and Hall/CRC

  45. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Multimedia Tools and Applications 24(9.10):1613

    MATH  Google Scholar 

  46. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption, Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT) 1(2):31

    Google Scholar 

  47. Wu X, Zhu B, Hu Y, Ran Y (2017) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5:6429

    Google Scholar 

  48. Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292

    Article  Google Scholar 

  49. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inform Sci 222:323

    Article  MathSciNet  Google Scholar 

  50. Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74

    Article  Google Scholar 

  51. Zhang X, Wang X (2019) Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimedia Tools and Applications 78(6):7841

    Article  Google Scholar 

  52. Zhang LB, Zhu ZL, Yang BQ, Liu WY, Zhu HF, Zou MY (2015) Medical image encryption and compression scheme using compressive sensing and pixel swapping based permutation approach, Mathematical Problems in Engineering 2015

  53. Zefreh EZ (2020) An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimedia Tools and Applications, 1–30

  54. Zhou Y, Bao L, Chen CP (2014) A new 1-D chaotic system for image encryption. Signal Process 97:172

    Article  Google Scholar 

  55. Zhou Y, Hua Z, Pun CM, Chen CP (2014) Cascade chaotic system with applications. IEEE Trans Cybern 45(9):2001

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mustapha Benssalah.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Benssalah, M., Rhaskali, Y. & Drouiche, K. An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimed Tools Appl 80, 2081–2107 (2021). https://doi.org/10.1007/s11042-020-09775-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09775-9

Keywords

Navigation