| Literature DB >> 35730031 |
Abstract
Recently, medical image encryption has attracted many researchers because of security issues in the communication process. The recent COVID-19 has highlighted the fact that medical images are consistently created and disseminated online, leading to a need for protection from unauthorised utilisation. This paper intends to review the various medical image encryption approaches along with their merits and limitations. It includes a survey, a brief introduction, and the most utilised interesting applications of image encryption. Then, the contributions of reviewed approaches are summarised and compared regarding different technical perspectives. Lastly, we highlight the recent challenges along with several directions of potential research that could fill the gaps in these domains for researchers and developers.Entities:
Keywords: Cellular Automata; Chaotic map; DNA; E-Healthcare; ECC; Fuzzy; Image encryption; Security
Year: 2022 PMID: 35730031 PMCID: PMC9192930 DOI: 10.1007/s12065-021-00683-x
Source DB: PubMed Journal: Evol Intell ISSN: 1864-5909
Fig. 1Basic medical image encryption and decryption procedure
Fig. 2Basic requirements of image encryption
standard metrics for image encryption
| Type of assessment | Description | Metric |
|---|---|---|
| Security | Any encryption process invulnerable to all possible attacks | Perception security, huge key space,key sensitivity, defence against possible attacks |
| Computational time | The required time to execute a set of instructions | -Depends on the permutation and diffusion operations -Significantly low complexity and minimum time value of image encryption and decryption |
| Compression ratio | To reduce storage space or bandwidth required for an image transmission lossless compression of an image required | Compression ratio = (uncompressed size image)/(compressed size image) |
| Robustness | Resistance against statistical and differential attack | Histogram analysis, correlation coefficient, NPCR, UACI |
| Quality | It is a quality assessment between the decrypted and plain images | PSNR, SSIM |
| Entropy [ | It is used to estimate the randomness of information of cipher images |
Evaluation method for image encryption
| Metric | Description | Formula | Highlights |
|---|---|---|---|
Number of Changing Pixel Rate (NPCR), Unified Averaged Changed Intensity (UACI) | Assessment of the encryption technique implemented Range of NPCR: 0 to + 1 Ideal value of NPCR: + 1 Ideal value of UACI for image of size 512 × 512 ≈ 34 | where, C1 and C2 are encrypted images before and after one pixel change, L is the maximum pixel value supported and Tot is the total number of pixels | Any encryption algorithm should have a NPCR ≥ 0.9, and UACI≈ 0.33 |
| Correlation Coefficient (CC) | It defines the relationship between correlated pixels of a plain and encoded image It is calculated in three directions: horizontal, diagonal, vertical Range of CC: -1 to + 1 | Here, where E(x), E(y) and D(x), D(y) indicate mean and standard deviation of x and y, respectively. C(x,y) represent the covariance between coordinates x and y and p is the number of pixel pairs (xi,yi) | For an encoded image CC should be ≈ 0 |
| Mean Squared Error (MSE) | Evaluation, of error values, that define distinction between plain image from decrypted image Range of MSE: 0 to ∞ | MSE = | For high quality of images, MSE should be near to zero |
| Peak Signal to Noise Ratio (PSNR)[ | It is a quality assessment between the decrypted and plain images It is measured in decibel (dB) Range of PSNR: 0 to ∞ | PSNR value should be high between original image and decrypted images | |
| Structural Similarity Index (SSIM) | Used to compute the homogeneity between plain and associated decrypted images It is quality measure parameter of decrypted image Range of SSIM: -1 to + 1 | Where (µx, µy) indicate the average and (σx2, σy2) indicate variance of an input x and decrypted y images, respectively. σxyrepresent covariance of x and y. c1 and c2 are regularization constant | For an identical images it should be ≈ 1 |
| Information Entropy (IE) | It computed as the average information per bit in an image Each pixel has different value Range of IE: 0 to + 8 | Where P(Si) represents the probability of occurrence of Si in message source (S) | Value of IE should be close to 8 for 8-bit image |
| Execution Time (ET) | It defines the time needed to execute an image encryption process It is aggregation of compiletime and run time It is measured in:ms, seconds, minutes | – | The value of ET should be less for any encryption technique |
Summary of various encryption methods based on chaotic maps
| Ref | Objective | Used approaches | Evaluation metric used | Database information | Attack considered | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| NPCR and UACI | PSNR | Key space | Complexity (time or space) | Entropy | CC | Histogram | |||||
| [ | To developed a systematic image encryption scheme with high processing speed | Bülban chaotic map, Circular Shift, XOR | Y | – | 2360 | Time | Y | Y | Y | USC-SIPI Image Database | Differential attacks |
| [ | To produces an image encryption method that eluding the attacker | Logistic Map, Confusion, Diffusion | Y | – | – | – | Y | Y | – | USC-SIPI Image Database | – |
| [ | To developed an secure and improve image encryption systems that can resist plaintext attacks and differential attacks | Scrambling associates Josephus traversing,Chaotic system | Y | Y | – | Time | Y | Y | Y | Lena images of size 256 × 256 | Statistical attacks, Selective-plaintext attacks, Exhaustive attacks |
| [ | To introduce an image encryption schemes that increase the protection of an image | Beta Chaotic Map,Confusion,Diffusion | Y | Y | 2512 | – | Y | Y | Y | USC-SIPI Image Database | Brute force attacks, differential attacks |
| [ | To developed an improve image encryption systems that provide more security and efficiency | Double Chaotic S -Box, Confusion,Diffusion | Y | – | 2258 | Time | Y | Y | Y | USC-SIPI Image Database | Various notable attacks |
| [ | To develop a bit-level secure and reliable image encryption method | Cyclic shift, linear chaotic maps | Y | – | 2210 | Time | Y | Y | Y | Greyscale 8-bit images. (256 × 256) | Brute-force attack, statistical, differential attack attacks |
| [ | To provide a reliable encryption technique to secure medical image | Permutation based image, adaptive diffusion | Y | Y | 3.402 × 1094 | Time | Y | Y | Y | Various image of different sizes | Known-plaintext, Chosen-plaintext attacks, statistical attacks |
| [ | To design an adaptive medical image encryption algorithm that overcomes the defects of the pre present chaotic encryption schemes | Logistic-sine chaos mapping, hyper-chaotic system | Y | – | 2512 | – | Y | Y | – | Lena (256 × 256) | Differential attacks |
| [ | To develop an algorithm that achieve high encryption throughput | Dynamic S-boxes, Baker map or Henon map | Y | – | 128-bit | Speed | Y | Y | y | CT image (750 × 870), MRI image (512 × 512), X-ray image (1338 × 1094) | Chosen plaintext and ciphertext, Reset attacks |
Summary of ECC based encryption
| Ref | Objective | Used approaches | Evaluation metric used | Database information | Attack considered | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| NPCR and UACI | PSNR | Key space | Complexity (time or space) | Entropy | CC | Histogram | |||||
| [ | To develop a method that digitally signs the cipher image to provide authenticity and integrity | 12 bit Standard Elliptic curve | – | – | 2512 | Time | Y | Y | Y | Lena (1024 × 1040) Pepper (512 × 520) Mandrill (256 × 260 | Known Plaintext attack |
| [ | To introduce a method that encodes largesize images with high security in efficient time | ECC (Elliptic curve),MAES (Modified AES) | Y | – | 2128 | Time | Y | Y | Y | Lena (512 × 512 × 3) Peppers (512 × 512 × 3) Baboon (512 × 512 × 3) 3D scanner ankle (1080 × 1920 × 3) | Statistical attacks, Noise attack, Differential attacks, Brute force attack |
| [ | To develop a secure key transmission and management method | ECC, Chaotic System | Y | – | 2512 | Time | Y | Y | Y | Airfield (512 × 512) | Various notable attacks |
| [ | To develop a robust encryption method with time efficiency | Elliptic curve ElGamal, chaotic theory, SHA-512 hash | Y | Y | 2100 | Time | Y | Y | Y | Lena (512 × 512) Barbara (512 × 512) Peppers (512 × 512) Baboon (512 × 512) Car (512 × 512) | Various notable attacks |
| [ | To develop a method that resists various attacks and exhibits better security features | ECC, Hyper chaotic Lorenz generator (HCLG), Arnold cat map, Hill cipher | Y | Y | – | Time | Y | Y | Y | Lena (512 × 512) | Exhaustive search attack, data losses attacks, noise attacks, Differential-statistical attacks, occlusion attacks |
| [ | To propose a scheme that is applicable for secure image communication | ECC, Hill cipher, Arnold, Linear congruence generator | Y | Y | – | Time | Y | Y | Y | Lena ( 512 × 512) DICOM (512 × 512) | Differential, Statistical attacks |
| [ | To develop a method that is resistant against cryptographic attacks without losing information | ECC, Dynamic S-boxes, pseudo random numbers (PRN) | Y | 2128 | Y | Y | Y | Circuit (450 × 600) Boat (256 × 256) Lena (256 × 256) Pepper (512 × 512) | Various notable attacks | ||
| [ | To introduce a n efficient method which provides secure transmission, without losing confidentiality of image | ECC, Genetic Algorithm (GA) | – | Y | – | – | – | Y | – | USC-SIPI Image Database | Breach of confidentiality |
| [ | To develop firm and structured image encryption procedure | ECC, Henon Chaotic map,Dynamic S-Boxes | Y | 1062 | Time | Y | Y | Y | USC-SIPI Image Database | Chosen-plaintext, Chosen-ciphertext attacks, Brute-force attacks | |
| [ | To develop a secure and fast encryption process that utilize for real-time image operations | ECC, Chaotic system, Arnold’s transform, Diffie-Hellman public key | Y | 2512 | Time | Y | Y | Y | Lena (512 × 512) Plane (512 × 512) Baboon (512 × 512) | Chosen-plaintext attack, Brute force attack, Occlusion attack | |
Summary of DNA based encryption
| Ref | Objective | Used approaches | Evaluation metric used | Database information | Attack considered | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| NPCR and UACI | PSNR | Key space | Complexity (time or space) | Entropy | CC | Histogram | |||||
| [ | To develop a robust image encryption algorithm which provides a totally invertible method that can resist various attacks | DNA,1D & 2D Chaotic maps | Y | Y | 1096 | Time | Y | Y | Y | USC-SIPI | Known plaintext attack, Statistical attacks, Differential attacks |
| [ | To suggest a method that ensures a secure transmission of image information | DNA,ILM,SHA-256 | Y | – | 2256 | – | Y | Y | Y | Lena (256 × 256) Bungee (256 × 256) Baboon (256 × 256) | Differential attack, Statistical attack, Brute-force attack |
| [ | To introduce a reliable image encryption method based on the Feistel network | Feistel network, dynamic DNA encoding, Hill matrix, chaotic sequence | Y | – | 10100 | – | Y | Y | Y | Lena (256 × 256) gray scale | Exhaustive attack, Plaintext attack, Differential attack, Statistical attack, |
| [ | To develop a high-speed image encryption and decryption method | DNA encoding, Pair coupled Chaotic map | – | – | 10450 | – | Y | Y | Y | Lena (256 × 256)Color image | Statistical attack, Differential attack, Exhaustive attack |
| [ | To introduce a secure encryption method for robust transmission | DNA sequence, 2D Henon- Sine map | Y | 10112 | Space | Y | Y | Y | Lena (256 × 256) (512 × 512) cameramen (256 × 256)(512 × 512) Baboon (256 × 256)(512 × 512) | Exhaustive attack, Robustness against noise, Anti noise attacks, statistical attack, differential attack | |
Summary of various encryption methods based on miscellaneous schemes
| Ref | Objective | Used approaches | Evaluation metric used | Database information | Attack considered | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| NPCR and UACI | PSNR | Key space | Complexity (time or space) | Entropy | CC | Histogram | |||||
| [ | To evolve a robust unique image encoding scheme | Cellular automata,Chaotic tent map | Y | – | 2576 | Time | Y | Y | Y | Eight different-sized images Lena ( 256 × 256) | Various popular attacks |
| [ | To develop a novel image encryption that can resist most known attacks | A skew tent, CA | Y | Y | 2256 | Time | Y | Y | Y | Lena, Checkbox, Airplane, Baboon, Barbara, Ship, Pepper, Nike logo | Various popular attacks |
| [ | To propose a scheme that uses RCA and DNA increases the security | Deoxyribonucleic Acid (DNA), Recursive Cellular Automata (RCA) | Y | – | Time | Y | Y | Y | Lena, Baboon, Cameraman, House, Jet Plane, Lake,(512 × 512) (256 × 256) | Brute-force attacks | |
| [ | To design a method that protects the content of image with high efficiency | Hyper chaotic functions, non-uniform CA | Y | 2128 | Y | Y | Y | Lena, Peppers, Baboon images (256 × 256 × 3) | Statistical attacks, data loss attack, Noise attack, Brute-force attacks, differential attack | ||
| [ | To propose a secure and robust image encryption scheme | Cellular automata, Memristive hyper chaotic system, DNA sequence operations | Y | 2128 | Y | Y | Y | Lena (256 × 256) | Various popular attacks | ||
| [ | To develop a lightweight scheme that is secure from statistical attacks | Elementary cellular automata with novel permutation box | Y | Y |
| Y | Y | Y | Lena, Baboon, Airplane,Peppers Barbara (256 × 256) | Statistical attacks | |
| [ | To design secure and a high sensitivity system | Choquet fuzzy integral (CFI) | Y | 2128 | Time | Y | Y | Y | CVG-UGR, PSU | Statistical analysis attack, entropy attack, brute-force attack, plaintext attack | |
| [ | To design an encryption method that resists various attacks | CA combined with chaotic map, 2D-LASM | Y | 2512 | time | Y | Y | Y | CVG-UGR image database | Chosen-plaintext, known-plaintext attacks, brute-force attack, statistical attack | |
| [ | To introduce an encryption scheme that overcomes security shortcomings | Choquet Fuzzy Integral, DNA | Y | Y | time | Y | Y | Y | Lena (256 × 256) | Chosen plaintext attack, Differential attacks | |
| [ | To develop an algorithm of encryption that provides high key sensitivity and least information loss | 3D hybrid chaos map, Choquet Fuzzy Integral, B-spline functions | Y | Y | Y | Y | Lena (256 × 256 × 3), Sailboat, Panda | Various attacks | |||