Abstract
Despite the ease of digital image distribution, storage, and replication, averting identity theft, privacy breaches, and ownership issues can be challenging. Medical image encryption plays a vital role in ensuring the confidentiality of sensitive medical data and safeguarding patient privacy. This research addresses these concerns by introducing a novel approach, RISE, to medical image security by using the fusion of chaotic keys and a secret-sharing technique. The key advancement is the use of a Rubik’s cube-based bit-plane shuffling technique to reduce the complexity of strong image encryption, adding a unique dimension to the field of medical image security. Another distinguishing aspect of our approach is the strategic use of segmentation to encrypt only the sensitive part of the image and reduce the time complexity. This area is encrypted using a chaotic key with a Rubik’s cube-based bit-plane shuffling algorithm, followed by the implementation of the confusion process. The encrypted image is shared using a K-N Secret sharing method, which provides authentication and high robustness. The final decrypted image is enhanced using super-resolution to provide better information outputs. The proposed technique offers excellent security and produces better outcomes while being simple. The average NPCR and UACI scores of the proposed encryption technique are 99.47, and 49.90, respectively, and the entropy is 7.995, underscoring the robustness and effectiveness of our proposed approach. It has a high key bit sensitivity and average time complexity. The result analysis further ensures resistance against crop attacks or data loss, positioning it as a formidable contender in the landscape of modern image security.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18351-4/MediaObjects/11042_2024_18351_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18351-4/MediaObjects/11042_2024_18351_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18351-4/MediaObjects/11042_2024_18351_Figa_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18351-4/MediaObjects/11042_2024_18351_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18351-4/MediaObjects/11042_2024_18351_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18351-4/MediaObjects/11042_2024_18351_Figb_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18351-4/MediaObjects/11042_2024_18351_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18351-4/MediaObjects/11042_2024_18351_Figc_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18351-4/MediaObjects/11042_2024_18351_Figd_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18351-4/MediaObjects/11042_2024_18351_Fige_HTML.png)
Similar content being viewed by others
Data Availability
The dataset generated during and/or analyzed during the current study are available online [36].
References
Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72–80
Gunasekaran S, Kumar M (2023) Chapter nine-secure data communication using DNA computing adaptable to wireless sensor network. Adv Comput 129:317–361
Khaldi A, Kafi MR, Meghni B (2023) Electrocardiogram signal security by digital watermarking. J Ambient Intell Humaniz Comput 14(10):13901–13913
Farri E, Ayubi P (2022) A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection. J Ambient Intell Humanized Comput pp 1–25
Ayubi P, Jafari Barani M, Yousefi Valandar M, Yosefnezhad Irani B, Sedagheh Maskan Sadigh R (2021) A new chaotic complex map for robust video watermarking. Artif Intell Rev 54:1237–1280
Amine K, Redouane KM, Sayah MM (2023) A wavelet-based watermarking for secure medical image transmission in telemedicine application, Multimed Tools Appl pp 1–17
Singh KU, Aljrees T, Kumar A, Singh T (2023) Secure NIfTI image authentication scheme for modern healthcare system. Appl Sci 13(9):5308
Moad MS, Zermi N, Khaldi A, Kafi MR (2023) Stationary wavelet-based image watermarking for e-healthcare applications. Cybern Syst pp 1–16
Faraj O, Megías D, Garcia-Alfaro J (2023) ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks. ar**v:2305.00266
Mahto DK, Anand A, Singh AK (2022) Hybrid optimisation-based robust watermarking using denoising convolutional neural network. Soft Comput 26(16):8105–8116
Yousefi Valandar M, Jafari Barani M, Ayubi P (2020) A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional hénon map. Soft Comput 24(2):771–794
Sahu AK, Sahu M, Patro P, Sahu G, Nayak SR (2023) Dual image-based reversible fragile watermarking scheme for tamper detection and localization. Pattern Anal Appl 26(2):571–590
Amine K, Redouane K, Bilel M (2023) A redundant wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Multimed Tools Appl 82(5):7901–7915
Security I (2020) Cost of a data breach report 2020. https://www.ibm.com/security/data-breach
Sahu AK, Umachandran K, Biradar VD, Comfort O, Sri Vigna Hema V, Odimegwu F, Saifullah M (2023) A study on content tampering in multimedia watermarking. Comput Sci 4(3):222
Anand A, Kumar Singh A (2022) A comprehensive study of deep learning-based covert communication. ACM Trans Multimed Comput Commun Appl (TOMM) 18(2s):1–19
Anand A, Singh AK (2022) Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare. IEEE Trans Comput Soc Syst
Valandar MY, Ayubi P, Barani MJ, Irani BY (2022) A chaotic video steganography technique for carrying different types of secret messages. J Inform Secur Appl 66:103160
Kumar D, Sudha V, Ranjithkumar R (2023) A one-round medical image encryption algorithm based on a combined chaotic key generator. Med Biol Eng Comput 61(1):205–227
Odeh A, Al-Haija QA (2023) Medical image encryption techniques: a technical survey and potential challenges. Int J Electr Comput Eng (IJECE) 13(3):3170–3177
Zhu H, Dai L, Liu Y, Wu L (2021) A three-dimensional bit-level image encryption algorithm with Rubik’s cube method. Math Comput Simul 185:754–770. https://doi.org/10.1016/j.matcom.2021.02.009
Priyanka A, Singh K (2022) FastMIE: Faster medical image encryption without compromising security. Measurement 196:111175
Zhao Y, Meng R, Zhang Y, Yang Q (2023) Image encryption algorithm based on a new chaotic system with Rubik’s cube transform and Brownian motion model. Optik 273:170342
Xu D, Li G, Xu W, Wei C (2023) Design of artificial intelligence image encryption algorithm based on hyperchaos. Ain Shams Eng J 14(3):101891
Kumar M, Gupta P (2021) A new medical image encryption algorithm based on the 1D logistic map associated with pseudo-random numbers. Multimed Tools Appl 80(12):18941–18967
Kumar S, Panna B, Jha RK (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 57:2517–2533
Chidambaram N, Raj P, Thenmozhi K, Rajagopalan S, Amirtharajan R (2019) A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multimed Tools Appl 78:33837–33863
Ye G, Jiao K, Pan C, Huang X et al (2018) An effective framework for chaotic image encryption based on 3D logistic map. Secur Commun Netw 2018
Khan JS, Khan MA, Ahmad J, Hwang SO, Ahmed W (2017) An improved image encryption scheme based on a non-linear chaotic algorithm and substitution boxes. Informatica 28(4):629–649. https://doi.org/10.15388/Informatica.2017.149
Zhang C, Fan H, Zhang M, Lu H, Li M, Liu Y (2023) Plaintext-related image encryption scheme without additional plaintext based on 2DCS. Optik 272:170312
Gupta M, Singh VP, Gupta KK, Shukla PK (2023) An efficient image encryption technique based on two-level security for internet of things. Multimed Tool Appl 82(4):5091–5111
Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A (2023) Color image encryption through chaos and KAA map. IEEE Access 11:11541–11554
Azam NA, Murtaza G, Hayat U (2023) A novel image encryption scheme based on elliptic curves and coupled map lattices. Optik pp 170517
Lai Q, Hu G, Erkan U, Toktas A (2023) A novel pixel-split image encryption scheme based on 2D Salomon map. Expert Syst Appl 213:118845
FC et al (2018) ISR. https://github.com/idealo/image-super-resolution
N. CHAKRABARTY, Brain MRI images for brain tumor detection. https://www.kaggle.com/datasets/navoneel/brain-mri-images-for-brain-tumor-detection. Accessed 28 March 2023
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Demla, K., Anand, A. RISE: Rubik’s cube and image segmentation based secure medical images encryption. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18351-4
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-18351-4