Log in

RISE: Rubik’s cube and image segmentation based secure medical images encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Despite the ease of digital image distribution, storage, and replication, averting identity theft, privacy breaches, and ownership issues can be challenging. Medical image encryption plays a vital role in ensuring the confidentiality of sensitive medical data and safeguarding patient privacy. This research addresses these concerns by introducing a novel approach, RISE, to medical image security by using the fusion of chaotic keys and a secret-sharing technique. The key advancement is the use of a Rubik’s cube-based bit-plane shuffling technique to reduce the complexity of strong image encryption, adding a unique dimension to the field of medical image security. Another distinguishing aspect of our approach is the strategic use of segmentation to encrypt only the sensitive part of the image and reduce the time complexity. This area is encrypted using a chaotic key with a Rubik’s cube-based bit-plane shuffling algorithm, followed by the implementation of the confusion process. The encrypted image is shared using a K-N Secret sharing method, which provides authentication and high robustness. The final decrypted image is enhanced using super-resolution to provide better information outputs. The proposed technique offers excellent security and produces better outcomes while being simple. The average NPCR and UACI scores of the proposed encryption technique are 99.47, and 49.90, respectively, and the entropy is 7.995, underscoring the robustness and effectiveness of our proposed approach. It has a high key bit sensitivity and average time complexity. The result analysis further ensures resistance against crop attacks or data loss, positioning it as a formidable contender in the landscape of modern image security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Canada)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Algorithm 2
Fig. 5
Algorithm 3
Algorithm 4
Algorithm 5

Similar content being viewed by others

Data Availability

The dataset generated during and/or analyzed during the current study are available online [36].

References

  1. Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72–80

    Article  Google Scholar 

  2. Gunasekaran S, Kumar M (2023) Chapter nine-secure data communication using DNA computing adaptable to wireless sensor network. Adv Comput 129:317–361

    Article  Google Scholar 

  3. Khaldi A, Kafi MR, Meghni B (2023) Electrocardiogram signal security by digital watermarking. J Ambient Intell Humaniz Comput 14(10):13901–13913

    Article  Google Scholar 

  4. Farri E, Ayubi P (2022) A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection. J Ambient Intell Humanized Comput pp 1–25

  5. Ayubi P, Jafari Barani M, Yousefi Valandar M, Yosefnezhad Irani B, Sedagheh Maskan Sadigh R (2021) A new chaotic complex map for robust video watermarking. Artif Intell Rev 54:1237–1280

  6. Amine K, Redouane KM, Sayah MM (2023) A wavelet-based watermarking for secure medical image transmission in telemedicine application, Multimed Tools Appl pp 1–17

  7. Singh KU, Aljrees T, Kumar A, Singh T (2023) Secure NIfTI image authentication scheme for modern healthcare system. Appl Sci 13(9):5308

    Article  CAS  Google Scholar 

  8. Moad MS, Zermi N, Khaldi A, Kafi MR (2023) Stationary wavelet-based image watermarking for e-healthcare applications. Cybern Syst pp 1–16

  9. Faraj O, Megías D, Garcia-Alfaro J (2023) ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks. ar**v:2305.00266

  10. Mahto DK, Anand A, Singh AK (2022) Hybrid optimisation-based robust watermarking using denoising convolutional neural network. Soft Comput 26(16):8105–8116

    Article  Google Scholar 

  11. Yousefi Valandar M, Jafari Barani M, Ayubi P (2020) A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional hénon map. Soft Comput 24(2):771–794

    Article  Google Scholar 

  12. Sahu AK, Sahu M, Patro P, Sahu G, Nayak SR (2023) Dual image-based reversible fragile watermarking scheme for tamper detection and localization. Pattern Anal Appl 26(2):571–590

    Article  Google Scholar 

  13. Amine K, Redouane K, Bilel M (2023) A redundant wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Multimed Tools Appl 82(5):7901–7915

    Article  Google Scholar 

  14. Security I (2020) Cost of a data breach report 2020. https://www.ibm.com/security/data-breach

  15. Sahu AK, Umachandran K, Biradar VD, Comfort O, Sri Vigna Hema V, Odimegwu F, Saifullah M (2023) A study on content tampering in multimedia watermarking. Comput Sci 4(3):222

    Google Scholar 

  16. Anand A, Kumar Singh A (2022) A comprehensive study of deep learning-based covert communication. ACM Trans Multimed Comput Commun Appl (TOMM) 18(2s):1–19

    Article  Google Scholar 

  17. Anand A, Singh AK (2022) Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare. IEEE Trans Comput Soc Syst

  18. Valandar MY, Ayubi P, Barani MJ, Irani BY (2022) A chaotic video steganography technique for carrying different types of secret messages. J Inform Secur Appl 66:103160

    Google Scholar 

  19. Kumar D, Sudha V, Ranjithkumar R (2023) A one-round medical image encryption algorithm based on a combined chaotic key generator. Med Biol Eng Comput 61(1):205–227

    Article  CAS  Google Scholar 

  20. Odeh A, Al-Haija QA (2023) Medical image encryption techniques: a technical survey and potential challenges. Int J Electr Comput Eng (IJECE) 13(3):3170–3177

    Article  Google Scholar 

  21. Zhu H, Dai L, Liu Y, Wu L (2021) A three-dimensional bit-level image encryption algorithm with Rubik’s cube method. Math Comput Simul 185:754–770. https://doi.org/10.1016/j.matcom.2021.02.009

    Article  MathSciNet  Google Scholar 

  22. Priyanka A, Singh K (2022) FastMIE: Faster medical image encryption without compromising security. Measurement 196:111175

    Article  Google Scholar 

  23. Zhao Y, Meng R, Zhang Y, Yang Q (2023) Image encryption algorithm based on a new chaotic system with Rubik’s cube transform and Brownian motion model. Optik 273:170342

    Article  ADS  Google Scholar 

  24. Xu D, Li G, Xu W, Wei C (2023) Design of artificial intelligence image encryption algorithm based on hyperchaos. Ain Shams Eng J 14(3):101891

    Article  Google Scholar 

  25. Kumar M, Gupta P (2021) A new medical image encryption algorithm based on the 1D logistic map associated with pseudo-random numbers. Multimed Tools Appl 80(12):18941–18967

    Article  Google Scholar 

  26. Kumar S, Panna B, Jha RK (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 57:2517–2533

    Article  PubMed  Google Scholar 

  27. Chidambaram N, Raj P, Thenmozhi K, Rajagopalan S, Amirtharajan R (2019) A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multimed Tools Appl 78:33837–33863

    Article  Google Scholar 

  28. Ye G, Jiao K, Pan C, Huang X et al (2018) An effective framework for chaotic image encryption based on 3D logistic map. Secur Commun Netw 2018

  29. Khan JS, Khan MA, Ahmad J, Hwang SO, Ahmed W (2017) An improved image encryption scheme based on a non-linear chaotic algorithm and substitution boxes. Informatica 28(4):629–649. https://doi.org/10.15388/Informatica.2017.149

    Article  Google Scholar 

  30. Zhang C, Fan H, Zhang M, Lu H, Li M, Liu Y (2023) Plaintext-related image encryption scheme without additional plaintext based on 2DCS. Optik 272:170312

    Article  ADS  Google Scholar 

  31. Gupta M, Singh VP, Gupta KK, Shukla PK (2023) An efficient image encryption technique based on two-level security for internet of things. Multimed Tool Appl 82(4):5091–5111

    Article  Google Scholar 

  32. Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A (2023) Color image encryption through chaos and KAA map. IEEE Access 11:11541–11554

    Article  Google Scholar 

  33. Azam NA, Murtaza G, Hayat U (2023) A novel image encryption scheme based on elliptic curves and coupled map lattices. Optik pp 170517

  34. Lai Q, Hu G, Erkan U, Toktas A (2023) A novel pixel-split image encryption scheme based on 2D Salomon map. Expert Syst Appl 213:118845

    Article  Google Scholar 

  35. FC et al (2018) ISR. https://github.com/idealo/image-super-resolution

  36. N. CHAKRABARTY, Brain MRI images for brain tumor detection. https://www.kaggle.com/datasets/navoneel/brain-mri-images-for-brain-tumor-detection. Accessed 28 March 2023

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashima Anand.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Demla, K., Anand, A. RISE: Rubik’s cube and image segmentation based secure medical images encryption. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18351-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18351-4

Keywords

Navigation