Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images
Subject Areas : electrical and computer engineeringMohammad Soltani 1 , Hassan Shakeri 2 * , Mahboobeh Houshmand 3
1 - Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran
2 - Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran
3 - Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran
Keywords: DICOM, cryptography, security, patient's biometric information, DNA encryption algorithm, digital signature,
Abstract :
With the development of telecommunication and communication technologies, especially wireless communications, information cryptography is one of the communication necessities. Today, cryptographic algorithms are used to increase security and prevent DICOM medical images from unauthorized access. It should be noted that changes in DICOM medical images will cause the doctor to misdiagnose the patient's treatment process. In this paper, a type of hybrid cryptographic algorithms is designed. In the proposed algorithm, DNA encryption algorithm is used to encrypt DICOM images and patient biometric information such as fingerprint or iris image is used to make digital signature and validate DICOM medical images. The designed encryption algorithm is resistant to brute force attacks and the entropy of the encrypted DICOM images is above 7.99.
[1] J. Andersen, B. Lo, and G. Z. Yang, "Experimental platform for usability testing of secure medical sensor network protocols," in Proc. 5th Int. Summer School and Symp. on Medical Devices and Biosensors, pp. 179-182, Hong Kong, China, 1-3 Jun. 2008.
[2] C. C. Lin, et al., "A healthcare integration system for disease assessment and safety monitoring of dementia patients," IEEE Trans. on Information Technology in Biomedicine, vol. 12, no. 5, pp. 579-586, Sept. 2008.
[3] -, Encryption, Google Trends, https://www.google.com/trends (accessed).
[4] F. Ayankoya and B. Ohwo, "Brute-force attack prevention in cloud computing using one-time password and cryptographic hash function," International J. of Computer Science and Information Security, vol. 17, no. 2, pp. 7-19, Feb. 2019.
[5] E. Tirado, et al., "A new distributed brute-force password cracking technique," in Proc. Int. Conf. on Future Network Systems and Security, Springer, vol. 878, pp. 117-127, Jun. 2018.
[6] "DICOM Conformance Tests," Aliza Medical Imaging. https://www.aliza-dicom-viewer.com/ (accessed), 2022. [7] B. Zhang, B. Rahmatullah, S. L. Wang, A. Zaidan, B. Zaidan, and P. Liu, "A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations," Multimedia Tools and Applications, vol. 82, pp. 21867-21906, Aug. 2023.
[8] S. H. Shin, W. S. Yoo, and H. Choi, "Development of modified RSA algorithm using fixed mersenne prime numbers for medical ultrasound imaging instrumentation," Computer Assisted Surgery, vol. 24, no. 2, pp. 73-78, Oct. 2019.
[9] Q. Natsheh, B. Li, and A. G. Gale, "Security of multi-frame DICOM images using XOR encryption approach," Procedia Computer Science, vol. 90, no. 1, pp. 175-181, Jul. 2016.
[10] R. M. Kumar and M. Viswanath, "A symmetric medical image encryption scheme based on irrational numbers," Biomedical Research, vol. 1, no. 5, pp. 494-498, Jan. 2018.
[11] O. Dorgham, B. Al-Rahamneh, A. Almomani, and K. F. Khatatneh, "Enhancing the security of exchanging and storing DICOM medical images on the cloud," International J. of Cloud Applications and Computing, vol. 8, no. 1, pp. 154-172, Jan. 2018.
[12] A. Al-Haj, G. Abandah, and N. Hussein, "Crypto-based algorithms for secured medical image transmission," IET Information Security, vol. 9, no. 6, pp. 365-373, Mar. 2015.
[13] P. Subhasri and A. Padmapriya, "Enhancing the security of DICOM content using modified vigenere cipher," International J. of Applied Engineering Research, vol. 10, no. 55, pp. 1951-1956, Jan. 2015.
[14] R. Matthews, "On the derivation of a "chaotic" encryption algorithm," Cryptologia, vol. 13, no. 1, pp. 29-42, Jan. 1989.
[15] J. Fridrich, "Symmetric ciphers based on two-dimensional chaotic maps," International J. of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259-1284, Jun. 1998.
[16] S. M. Ismail, L. A. Said, A. G. Radwan, A. H. Madian, and M. F. Abu-Elyazeed, "Generalized double-humped logistic map-based medical image encryption," J. of Advanced Research, vol. 10, no. 1, pp. 85-98, Mar. 2018.
[17] R. Gupta, R. Pachauri, and A. K. Singh, "An effective approach of secured medical image transmission using encryption method," Molecular & Cellular Biomechanics, vol. 15, no. 2, pp. 63-83, May 2018.
[18] M. M. Parvees, J. A. Samath, and B. P. Bose, "Protecting large size medical images with logistic map using dynamic parameters and key image," Int. J. Netw. Secur., vol. 19, no. 6, pp. 984-994, Jan. 2017.
[19] Y. Dai, H. Wang, and Y. Wang, "Chaotic medical image encryption algorithm based on bit-plane decomposition," International J. of Pattern Recognition and Artificial Intelligence, vol. 30, no. 4, Article ID: 1657001, May 2016.
[20] X. Li, L. Wang, Y. Yan, and P. Liu, "An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems," Optik, vol. 127, no. 5, pp. 2558-2565, Mar. 2016.
[21] Q. Zhang, L. Guo, and X. Wei, "Image encryption using DNA addition combining with chaotic maps," Mathematical and Computer Modelling, vol. 52, no. 11, pp. 2028-2035, Dec. 2010.
[22] A. Belazi, M. Talha, S. Kharbech, and W. Xiang, "Novel medical image encryption scheme based on chaos and DNA encoding," IEEE Access, vol. 7, pp. 36667-36681, 2019.
[23] J. C. Dagadu, J. P. Li, and E. O. Aboagye, "Medical image encryption based on hybrid chaotic DNA diffusion," Wireless Personal Communications, vol. 108, no. 1, pp. 591-612, Apr. 2019.
[24] R. S. Devi, K. Thenmozhi, J. B. B. Rayappan, R. Amirtharajan, and P. Praveenkumar, "Entropy influenced RNA diffused quantum chaos to conserve medical data privacy," International J. of Theoretical Physics, vol. 58, no. 6, pp. 1937-1956, Mar. 2019.
[25] A. Kumari, B. Akshaya, B. Umamaheswari, K. Thenmozhi, R. Amirtharajan, and P. Praveenkumar, "3D lorenz map governs DNA rule in encrypting DICOM images," Biomedical and Pharmacology J., vol. 11, no. 2, pp. 897-906, Jun. 2018.
[26] P. Praveenkumar, et al., "Transreceiving of encrypted medical image-a cognitive approach," Multimedia Tools and Applications, vol. 77, no. 7, pp. 8393-8418, Apr. 2018.
[27] N. Sasikaladevi, K. Geetha, and A. Revathi, "EMOTE-multilayered encryption system for protecting medical images based on binary curve," J. of King Saud University-Computer and Information Sciences, vol. 34, no. 3?, pp. 676-686, Mar. 2019.
[28] S. Sheela, K. Suresh, and D. Tandur, "Secured transmission of clinical signals using hyperchaotic DNA confusion and diffusion transform," International J. of Digital Crime and Forensics, vol. 11, no. 3, pp. 43-64, Jul. 2019.
[29] N. Yuvaraj, K. Praghash, and T. Karthikeyan, "Data privacy preservation and trade-off balance between privacy and utility using deep adaptive clustering and elliptic curve digital signature algorithm," Wireless Personal Communications, vol. 124, pp. 655-670, Nov. 2021.
[30] J. Katz, "Digital signatures,"in Digital Signatures, Springer Science & Business Media, pp. 3-33, Jan. 2010.
[31] R. Kaur and A. Kaur, "Digital signature," in Proc. Int. Conf. on Computing Sciences, pp. 295-301, Phagwara, India, 14-15 Sept. 2012.
[32] D. M. Davide Maltoni, A. K. Jain, and Salil Prabhakar, Handbook of Fingerprint Recognition, Springer London, 2009.
[33] R. Agarwal and A. S. Jalal, "Presentation attack detection system for fake Iris: a review," Multimedia Tools and Applications, vol. 80, no. 10, pp. 15193-15214, Feb. 2021.
[34] J. Jayanthi, E. L. Lydia, N. Krishnaraj, T. Jayasankar, R. L. Babu, and R. Suji, "An effective deep learning features based integrated framework for iris detection and recognition," J. of Ambient Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3271-3281, Jun. 2021.
[35] R. Amirtharajan, R. Akila, and P. Deepikachowdavarapu, "A comparative analysis of image steganography," International J. of Computer Applications, vol. 2, no. 3, pp. 41-47, May. 2010.
[36] T. Morkel, J. H. Eloff, and M. S. Olivier, "An overview of image steganography," ISSA, vol. 1, no. 2, pp. 1-11, Jan. 2005.
[37] R. Ahlswede, "A short course on cryptography," in Hiding Data-Selected Topics: Springer, vol. 12, pp. 1-54, Apr. 2016.
[38] M. J. Durand-Richard, "Probability, cryptology and meaning in Claude Shannon (1916-2001)'s works," in Proc. Cryptologic History Symp.: Global Perspectives on Cryptologic History, 12 pp., Baltimore, Washington, USA,15-16 Oct 2009.
[39] R. G. Gallager, "Claude E. Shannon: A retrospective on his life, work, and impact," IEEE Trans. on Information Theory, vol. 47, no. 7, pp. 2681-2695, Nov. 2001.
[40] M. Soltani, "A new secure image encryption algorithm using logical and visual cryptography algorithms and based on symmetric key encryption," J. of Basic and Applied Scientific Research, vol. 3, no. 6, pp. 1193-1201, 2013.
[41] M. Soltani and A. K. Bardsiri, "Designing a novel hybrid algorithm for QR-code images encryption and steganography," J. Comput., vol. 13, no. 9, pp. 1075-1088, Sept. 2018.
[42] S. Lian, J. Sun, and Z. Wang, "Security analysis of a chaos-based image encryption algorithm," Physica A: Statistical Mechanics and its Applications, vol. 351, no. 2-4, pp. 645-661, Jun. 2005.
[43] O. F. Mohammad, M. S. M. Rahim, S. R. M. Zeebaree, and F. Ahmed, "A survey and analysis of the image encryption methods," International J. of Applied Engineering Research, vol. 12, no. 23, pp. 13265-13280, Dec. 2017.
[44] Sample DICOM Images. [Online]. Available: http://deanvaughan.org
[45] DICOMs category. [Online]. Available: https://www.nitrc.org/
[46] H. Khanzadi, M. Eshghi, and S. E. Borujeni, "Image encryption using random bit sequence based on chaotic maps," Arabian J. for Science and Engineering, vol. 39, no. 2, pp. 1039-1047, Feb. 2014.
[47] H. Arora, G. K. Soni, R. K. Kushwaha, and P. Prasoon, "Digital image security based on the hybrid model of image hiding and encryption," in Proc IEEE. 6th Int. Conf. on Communication and Electronics Systems, vol. 6, pp. 1153-1157, 8-10 Jul. 2021.
[48] 2015, "Key space in cryptiography," http://csrc.nist.gov (accessed).
[49] X. Chai, Y. Chen, and L. Broyde, "A novel chaos-based image encryption algorithm using DNA sequence operations," Optics and Lasers in Engineering, vol. 88, pp. 197-213, Jan. 2017.
[50] J. Wu, X. Liao, and B. Yang, "Image encryption using 2D Hénon-Sine map and DNA approach," Signal Processing, vol. 153, pp. 11-23, Dec. 2018.
[51] G. Ye, K. Jiao, C. Pan, and X. Huang, "An effective framework for chaotic image encryption based on 3D logistic map," Security and Communication Networks, vol. 2018, pp. 1-11, Oct. 2018.
[52] P. T. Akkasaligar and S. Biradar, "Selective medical image encryption using DNA cryptography," Information Security J.: a Global Perspective, vol. 29, no. 2, pp. 91-101, Mar. 2020.
[53] X. Chai, J. Zhang, Z. Gan, and Y. Zhang, "Medical image encryption algorithm based on Latin square and memristive chaotic system," Multimedia Tools and Applications, vol. 78, no. 24, pp. 35419-35453, Dec. 2019.
[54] A. Mahmood, R. Dony, and S. Areibi, "An adaptive encryption based genetic algorithms for medical images," in Proc. IEEE Int. Workshop on Machine Learning for Signal Processing, 6 pp., Southampton, UK, 20-25 Sept. 2013.