Digital medical image encryption approach in real-time applications




real time applications, medical images, encryption, security, peak detection


Patient information and medical imaging data are now subject to stringent data security and confidentiality standards due to the proliferation of telemedicine techniques and medical imaging instruments. Because of the problems described above, as well as the possibility of data or information being stolen, this brings up the dilemma of transmitting data on medical images via an open network. In the past, potential solutions included the utilization of methods such as information concealment and image encryption. Nevertheless, attempting to reconstruct the original image utilizing these approaches may result in complications. In the process of this paper, an algorithm for safeguarding medical images based on the pixels of interest was established. Detection of image histogram peaks for the purpose of calculating peaks in medical images pixels of interest in medical image that have had their threshold values processed. The threshold is shown by taking the average of all the peaks in the histogram. After that, a Sudoku matrix is used to assign values of interest to each of these pixels. The proposed method will be assessed by a variety of statistical procedures, and the outcomes of these analyses will be compared to previously established standards. According to the findings, the suggested method has superior security performance compared to other image encryption methods already in use.

Author Biographies

Izz Abboud, Mustansiriyah University, Baghdad

Master of Engineering, Computer Engineering Department, College of Engineering, Mustansiriyah University, Baghdad, Iraq.

Muaayed Al-Rawi, Mustansiriyah University, Baghdad

Researcher, Computer Engineering Department, College of Engineering, Mustansiriyah University, Baghdad, Iraq.

Nasir Al-Awad, Mustansiriyah University, Baghdad

Professor, Computer Engineering Department, College of Engineering, Mustansiriyah University, Baghdad, Iraq.


B. Thomee, D.A. Shamma, and G. Friedland, “YFCC100M: The New Data in Multimedia Research,” Communications of the ACM, vol. 59, no. 2, pp. 64–73, 2015.

S. Pouyanfar, Y. Yang, and S.C. Chen, “Multimedia Big Data Analytics: A Survey,” ACM Computing Surveys, vol. 51, no. 1, pp. 1–34, 2018.

Y. Sun, S. Fang, and Y. Hwang, “Investigating Privacy and Information Disclosure Behavior in Social Electronic Commerce,” Sustainability, vol. 11, no. 12, pp. 1–27, 2019.

M. Han, L. Li, and Y. Xie, “Cognitive Approach for Location Privacy Protection,” IEEE Access, vol. 6, pp. 13466–13477, 2018.

S. Liu, C. Guo, and J.T. Sheridan, “A review of optical image encryption techniques,” Optics & Laser Technology, vol. 57, pp. 327–342, 2014.

Y. Dai, H. Wang, and Z. Zhou, “Research on medical image encryption in telemedicine systems,” Technology and Health Care, vol. 24, no. s2, pp. S435–S445, 2016.

G. Chen, Y. Mao, and C. Chui, “A symmetric image encryption based on 3d chaotic cat maps,” Chaos, Solitons Fractals, vol. 21, pp. 749–761, 2018.

R. Enayatifar, A.H. Abdullah, and I.F. Isnin, “Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence,” Optics and Lasers in Engineering, vol. 56, pp. 83–93, 2014.

Ü. Çavuşoğlu, S. Kaçar, A. Zengin, and I. Pehlivan, “A novel hybrid encryption algorithm based on chaos and S-AES algorithm,” Nonlinear Dynamics, vol. 92, pp. 1745–1759, 2018.

J. Wu, X. Liao, and B. Yang, “Color image encryption based on chaotic systems and elliptic curve EIGamal scheme,” Signal Processing, vol. 141, pp. 109–124, 2017.

C. Paar, J. Pelzl, Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media, 2009.

Z. Su, G. Zhang, and J. Jiang, “Multimedia security: a survey of chaos based encryption technology,” in Multimedia-A Multidisciplinary Approach to Complex Issues, InTech, pp. 99–124, 2012.

T. Xiang, S. Guo, and X. Li, “Perceptual visual security index based on edge and texture similarities,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 5, pp. 951–963, 2016.

M. Noura, H. Noura, A. Chehab, M.M. Mansour, L. Sleem, and R. Couturier, “A dynamic approach for a lightweight and secure cipher for medical images,” Multimedia Tools and Applications, vol. 77, no. 23, pp. 31397–31426, 2018.

M. Li, D. Lu, and W. Wen, “Cryptanalyzing a color image encryption scheme based on hybrid hyper-chaotic system and cellular automata,” IEEE Access, vol. 6, pp. 47102–47111, 2018.

L. Xu, Z. Li, and J. Li, “A novel bit-level image encryption algorithm based on chaotic maps,” Optics and Lasers in Engineering, vol.78, pp. 17–25, 2016.

L. Teng, X. Wang, and J. Meng, “A chaotic color image encryption using integrated bit-level permutation,” Multimedia Tools and Applications, vol. 77, no. 6, pp. 6883–6896, 2018.






Progressive information technologies, high-efficiency computer systems