999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Secure and Robust Optical Multi-Stage Medical Image Cryptosystem

2022-11-09 08:15:06WalidElShafaiMoustafaAlyAbeerAlgarniFathiAbdElSamieandNaglaaSoliman
Computers Materials&Continua 2022年1期

Walid El-Shafai,Moustafa H.Aly,Abeer D.Algarni,Fathi E.Abd El-Samie,3 and Naglaa F.Soliman

1Department Electronics and Electrical Communications,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

2Department of Electronics and Communications Engineering,College of Engineering and Technology,Arab Academy for Science,Technology and Maritime Transport,Alexandria,1029,Egypt

3Department of Information Technology,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,84428,Saudi Arabia

4Department of Electronics and Communications,Faculty of Engineering,Zagazig University,Zagazig,44519,Egypt

Abstract: Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested.Two different phases in the fractional Fourier and output planes are provided as deciphering keys.Accordingly,the ciphering keys will not be employed for the deciphering procedure.Thus,the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH (Optical Scanning Holography) and DRPE(Double Random Phase Encoding)algorithms.One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the onedimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components.More comparisons on various color medical images are examined and analyzed to substantiate the cryptosystem efficacy.The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure.It has terrific cryptography performance compared to conventional cryptography algorithms,even in the presence of noise and severe channel attacks.

Keywords: Optical encryption;medical image security;symmetric and asymmetric encryption;OSH;DRPE;PTFrFT

1 Introduction

Digitalization is a huge part of our life today,with broad applications in health,science,engineering,media,communication,etc.A large amount of digital multimedia data is often transmitted via open networks with the widespread use of the Internet.Therefore,the security and integrity of this large amount of data are of great concern [1,2].A type of the precious data is represented with digital images used in various beneficial applications such as military,biometric authentication,online shopping,online banking,healthcare systems,telemedicine,medical science,etc.[3-5].

The lack of powerful security and protection tools could cause various threats and attacks,leading to serious disasters for people and networks.In medical image communication through the Internet,intruders can simply retrieve the images because of the shortage in security levels.Therefore,the protection of the transmitted image information becomes a serious problem.Several papers described different multimedia encryption techniques like those found in [1-21].There are several chaotic maps in the state-of-the-art works,such as Arnold map,Logistic map,and Cat map [12-21].Various image security and image cryptography techniques based on chaos systems have been presented in [22-27].The main disadvantage of the traditional chaotic-mapbased cryptography procedures is that they depend on lower-order chaos functions.Therefore,it is essential to develop robust cryptography algorithms to avoid this disadvantage.

The conventional cryptography techniques [28-34] have nevertheless been found not appropriate for efficient image communication due to their underlying characteristics like large number of iterations,high pixel redundancy,strong correlation,and large computational cost.So,they minimize the inclusive security performance.Thus,it is urgent to preclude medical images from the risks of attacks and threats through employing effective cryptography techniques.Consequently,due to the importance of medical data security,this paper presents a robust way of managing and securing color medical image communication for achieving reliable security in telemedicine applications.

This motivated us,in this paper,to implement an effective and asymmetric optical color medical image cryptosystem,where two random phases are exploited as ciphering keys that are distinct from the deciphering keys.The introduced cryptosystem has an attractive advantage of nonlinear truncation of phase components for the communication of color medical images through insecure channels.Hence,it is suitable for cloud-based telemedicine and healthcare applications.Simulation results of the proposed cryptosystem on different color medical images prove better security performance with lower computational cost in the presence of different types of noise and multimedia attacks.

The paper is planned as follows.Section 2 presents some work related to medical image security.Section 3 introduces the inclusive clarification of the suggested asymmetric cryptosystem for secure color medical image communication.Simulation outcomes and comparisons are provided in Section 5.The main concluding remarks are offered in Section 6.

2 Related Work

There is a critical need for telemedicine healthcare opportunities and facilities that can be delivered through software tools.This will create a healthcare delivery system with more timeliness and efficiency.Security plays a crucial role in the transmission of medical data via the Internet.Recently,it has become a challenge to secure medical images in healthcare and telemedicine applications [35-38].Gupta et al.[39] introduced a high-security medical image cryptosystem that depends on logstic map.In [40],the authors introduced a comparison between chaos theory and elliptic curve cryptography as tools for image security.Abdel-Nabi et al.[41] proposed an algorithm that merges reversible data steganography and ciphering approaches to achieve the required protection of stored and transmitted medical data and images.

In [42],a hybrid approach was proposed for partial encryption.It guarantees optimal and robust storage and communication of medical information.This approach has low processing time for the ciphering-deciphering processes.Bharghavi et al.[43] presented an efficient security system based on chaotic logistic map for reliable medical image transmission.In [44],a robust and fast medical image ciphering approach was suggested for real-time medical communication services.In [45],the authors presented a powerful and efficient medical image ciphering approach.Two chaotic sequences are utilized in this approach for key generation.Then,a diffusion process with two rounds is adopted to create the encrypted medical images.Dai et al.[46] explained a new technique for medical image security based on a hybrid structure of Chebyshev maps and logistic maps to enhance the ciphering performance.In [47],the authors presented a partial encryption framework based on a chaotic map and DNA encoding for securing medical images.

Puech et al.[48] investigated different ciphering techniques for medical image communication.The advantage of these techniques is that they can be employed for images,videos,and 3D objects.In [49],corresponding to cellular automata chaotic features,the authors proposed an efficient medical image ciphering algorithm.The simulation findings showed that this algorithm offers more security and speed.Saraswathi et al.[50] introduced an efficient medical image crptosystem based on an asymmetric stream cipher security technique.It has been concluded that this cryptosystem is robust against various types of cyberattacks.Suganya et al.[51] proposed a hybrid cryptosystem that depends on stream-based and block-based ciphering algorithms.This cryptosystem highly provides integrity control and encryption of medical images.Zhou et al.[52]suggested a security technique that is capable of full protection of chosen regions/objects in medical images.

Moreover,several image security systems [53-58] can be exploited in medical imaging services.In [53],the authors introduced an optical image security algorithm using fringe projection profilometry and Fourier fringe analysis.Das et al.[54] developed an image security system in which the input image is ciphered based on a user-defined key.Jain et al.[55] proposed a partial-randomphase-encoding-based color image ciphering and deciphering framework.Li et al.[56] suggested an effective hybrid image ciphering/compression framework.Ramaraju et al.[57] proposed a leastsignificant-bit-based image hiding technique.It hides four images inside a single image to generate a stego-image that is then ciphered with a secret key.Wen et al.[58] proposed a robust optical salient region ciphering method,in which the salient regions are pre-ciphered by employing a chaotic optical ciphering technique.

Although the statistical security analysis of the previous related works [1-58] showed numerous differences,most of the presented methods have significant challenges with ciphering and deciphering processes.The traditional encryption methods do not achieve the required quality level in the presence of multimedia assaults.Consequently,the presented state-of-the-art methods have low performance levels in the presence of multimedia attacks and channel noise.Additionally,the state-of-the-art methods have not been assessessed with enough evaluation metrics and in-detail statistical security analysis.In addition,they necessitate additional calculations in the ciphering and deciphering procedures,and hence,they have large computational cost.Therefore,considering the shortcomings of the previous encryption methods in the literature,an efficient optical color medical image cryptosystem based on the asymmetric PTFrFT encryption algorithm is suggested in this paper for telemedicine and healthcare security applications.The security examination of the presented algorithm is investigated through visual results,differential analysis,histograms,encryption quality analysis,information entropy,communication noise analysis,and security analysis.Therefore,several statistical tests on different samples of color medical images are performed.

3 Proposed Optical PTFrFT-Based Color Medical Image Cryptosystem

The proposed optical cryptosystem consists of two stages of encryption and decryption as illustrated in Figs.1a and 1b.The encryption keys of the medical images comprise the generated optical keys of arbitrary phase masks (PMs) of the employed asymmetric PTFrFT algorithm.

Figure 1:Suggested multi-stage PTFrFT-based color medical image cryptosystem (a) Encryption stage (b) Decryption stage

The precious aspect of the employed asymmetric PTFrFT cryptosystem is that there are two distinct ciphering/deciphering secret keys.This tremendous trait has encouraged us to utilize it for building a secure and robust color medical image cryptosystem.The PTFrFT is estimated with the FrFT of the plain color medical image with the truncation operation of phase components,where the amplitude modular part of the FrFT spectrum is merely exploited,and the phase part of the FrFT spectrum is separated.The ciphering methodology of the introduced cryptosystem is executed with the steps demonstrated in Fig.1a.

1) Separate the input color medical image into the R,G,and B color componentsIR(m,n),IG(m,n),andIB(m,n)as offered in Eq.(1).

2) Multiply the separated color components by the first phase masksPMR1,PMG1,andPMB1,and then apply the first FrFT operation with the first fractional ordersOR1,OG1,andOB1to produce the primary encrypted image components.Each of these components can be decomposed into two parts: phase retaining part as in Eqs.(2)-(4) and phase truncated part as in Eqs.(5)-(7).

wherePR{.} andPT{.} are the phase reservation and truncation operators,respectively.ThePMR1(m,n),PMG1(m,n),andPMB1(m,n)are the primary encryption phase masks that are randomly generated by the 2D Arnold map [3].

3) Similarly,repeat Step (2) through multiplying by the second phase masksPMR2,PMG2,andPMB2,and performing the second FrFT operation with the second fractional ordersOR2,OG2,andOB2to produce the final encrypted image components.Each of these components has two parts: phase retaining part as in Eqs.(8)-(10) and the phase truncated part as in Eqs.(11)-(13).

where the obtainedPR2,PG2,andPB2are then utilized as the decrypted keys.ThePMR2(m,n),PMG2(m,n),andPMB2(m,n)are the final encryption phase masks that are given by Eqs.(14)-(16) comprising the phase functionexp[j ψ (m,n)].

whereψ(m,n)∈[0,2π].

The benefit from using two FrFT stages is significantly improving the robustness and security of the introduced medical image cryptosystem based on the fractional orders and scaling factors of the FrFT.Due to these advantages,it is highly recommended in the proposed cryptosystem.More detailed discussions about the FrFT are found [4,5].The deciphering steps are the inverse of the above-mentioned ciphering steps,as demonstrated in Fig.1b.Consequently,the deciphering procedure can be implemented by exploiting the private deciphering secret keysP2(m,n)andP1(m,n),where the PTFrFT is an asymmetric transform.

4 Results and Discussions

Different color medical images that have different features are chosen and examined to substantiate the profits of the suggested optical color medical image cryptosystem.The utilized color medical images are primarily decomposed into their R,G,and B components to be used as the cryptosystem input.The simulation experiments are performed using a laptop with 8 GB RAM,and i7-5200 Intel CPU.The utilized software in the simulation tests is the MATLAB R2020b.

4.1 Visual Results

The visual analysis is the most important assessment tool utilized to appraise the security strength and efficiency of the suggested cryptosystem.The examined color medical images and their encrypted versions with the suggested optical asymmetric cryptosystem and the conventional optical symmetric DRPE and OSH cryptosystems [7,9,10,22] are displayed in Fig.2.It is obvious that the suggested cryptosystem is more beneficial compared to other cryptosystems in concealing and diminishing the significant objects contained within the studied color medical images.

Figure 2:Original color medical images and their encrypted versions with the PTFrFT,OSH,and DRPE cryptosystems

4.2 Histogram Results

The pixel distributions of the original and ciphered images can be demonstrated through histogram analysis [16].Both histograms of the original and ciphered images must be different to illustrate good encryption.Fig.3 indicates the histogram security analysis of the examined original and ciphered images with the suggested and conventional cryptosystems.It is obvious that the original image histograms are entirely different from the ciphered image histograms.This proves the reliability of the suggested cryptosystem and the conventional ones.

Figure 3:Histogram outcomes for the PTFrFT,OSH,and DRPE cryptosystems

4.3 Entropy Results

The entropy metric is exploited to describe the unpredictability degree of the ciphered color medical image.The proposed cryptosystem is close to achieving an ideal entropy value of 8 [23].Tab.1 offers the entropy outcomes of the analyzed original,encrypted,and decrypted color medical images for the suggested optical PTFrFT cryptosystem and the conventional optical cryptosystems.The obtained superior entropy values for the suggested cryptosystem prove its robustness and reliability compared to other cryptosystems through achieving better values close to the desired optimal value.

Table 1:Entropy outcomes for the PTFrFT,OSH,and DRPE cryptosystems

4.4 Correlation Results

Remarkable cryptosystems are supposed to eliminate any relationship among color medical image pixels to protect the color medical image content from statistical channel attacks [20].Tabs.2-4 demonstrate the diagonal (D),horizontal (H),and vertical (V) correlation outcomes for the studied original,enciphered,and deciphered color medical images with the proposed cryptosystem compared to DRPE and OSH cryptosystems.The obtained D,H,and V correlation values are enormously low for the ciphered images obtained by the proposed cryptosystem compared to the traditional cryptosystems.This proves its superior security performance.

Table 2:Correlation outcomes of the DRPE cryptosystem [9,22]

Table 3:Correlation outcomes of the OSH cryptosystem [7,10]

Table 4:Correlation outcomes of the proposed PTFrFT cryptosystem

4.5 Encryption Quality Security Analysis

The deviation irregularity (ID) and the histogram deviation (HD) metrics [53] can be used to assess the quality performance and ciphering efficacy of the proposed optical cryptosystem.They are utilized to determine the deviation percentage of the irregularity and histogram difference between the original and ciphered medical images.Tab.5 demonstrates the estimatedIDandHDoutcomes,where lower values are obtained for both,which is recommended for achieving superior ciphering efficacy.Consequently,the larger the decorrelation between the original and ciphered images is,the improved the operation of the suggested cryptosystem compared to the conventional DRPE and OSH cryptosystems.

Table 5:Histogram and irregular deviation results of the encrypted color medical images

4.6 Differential Security Analysis

The differential security cryptanalysis in terms of the NPCR (Number of Changing Pixel Rate) and UACI (Unified Averaged Changed Intensity) [44] is employed to verify the robustness of the proposed cryptosystem in the presence of slight modifications of the encrypted images.For good security and robustness,it is required to achieve NPCR and UACI values of 0.996 and 0.33,respectively [9].It is observed that the obtained UACI and NPCR values in Tab.6 for the proposed cryptosystem are astonishingly close to the desired values in contrast to the conventional cryptosystems.

Table 6:NPCR and UACI outcomes of the tested color medical images

4.7 SSIM,FSIM and PSNR Analysis

The SSIM (Structural Similarity),PSNR (Peak Signal-to-Noise Ratio),and FSIM (Feature Similarity) metrics [12,17] are exploited to assess the cryptosystem performance.In our security analysis,these metrics are calculated between the enciphered and plain medical images.They need to have small values for a proper enciphering process.Tab.7 demonstrates the obtained results of the proposed and the conventional DRPE and OSH cryptosystems,where superior values are delivered by the proposed cryptosystem in contrast to the traditional cryptosystems.

Table 7:SSIM,FSIM and PSNR outcomes between the plain and encrypted medical images for the PTFrFT,OSH,and DRPE cryptosystems

4.8 Edge Security Analysis

The metric of EDR (Edge Differential Ratio) is employed to evaluate the misrepresentations in the boundaries and borders that result from the encryption process in the color medical images [24].Tab.8 reveals that the EDR outcomes of the examined color medical images are close to 1 for the proposed PTFrFT cryptosystem.Thus,this guarantees that the encrypted and plain images are totally different.Fig.4 shows the Laplacian edge Gaussian results of the original and enciphered images with the proposed cryptosystem compared to those of the conventional algorithms.These visual outcomes confirm the amazing benefit of the proposed cryptosystem in concealing the most important aspects and features within the transmitted medical images.

Table 8:EDR values of the encrypted images for the DRPE,OSH,and PTFrFT cryptosystems

4.9 Key Sensitivity Security Analysis

It is required for a cryptosystem to be susceptible to the control and initial values [17].This can be validated by investigating the key security analysis.The suggested cryptosystem provides different outcomes,when the control parameters are changed.Fig.5 offers the key sensitivity outcomes in the form of decrypted images and their histograms using incorrect key values.It is observed that the suggested cryptosystem and the tested DRPE and OSH cryptosystems have high sensitivity to slight changes in control parameters.

Figure 4:Laplacian edge Gaussian results for the plain and enciphered medical images with the DRPE,OSH,and PTFrFT cryptosystems

Figure 5:Results of key sensitivity analysis for the DRPE,OSH,and PTFrFT cryptosystems

4.10 Effect of Channel Noise

The transmission network commonly encompasses different types of noise.The proposed decryption process should survive the impact of noise.The effects of Salt and Pepper,Gaussian,and Speckle noise [14,22,47] are investigated in the simulation experiments.Figs.6-8 display the outcomes of deciphered medical images for the encrypted images presented in Fig.2 in the presence of noise with different amounts with the proposed PTFrFT and the conventional DRPE and OSH cryptosystems.It is observed that the deciphered color medical images are measurable and discernable if the transmission noise affects the enciphered color medical images.Hence,the proposed cryptosystem has a noticable advantage of resisting the effect of transmission noise compared to the conventional DRPE and OSH cryptosystems.

Figure 6:Decrypted images in the presence of Gaussian noise with the DRPE,OSH,and PTFrFT cryptosystems

4.11 Computational Processing Analysis

It is recommended for any cryptosystem to have less computations in addition to high security and efficacy.Tab.9 presents the estimated values of the encryption/decryption times for the DRPE,OSH,and PTFrFT cryptosystems.The estimated encryption/decryption computation times provide evidence that the suggested cryptosystem is highly appropriate for real-time telemedicine services compared to other conventional cryptosystems.

Figure 7:Decrypted images in the presence of Speckle noise with the DRPE,OSH,and PTFrFT cryptosystems

4.12 Comparative Study

In this section,we introduce a comprehensive comparative study for evaluating the performance of the proposed cryptosystem for confident color medical image transmission compared to the recent studies [3-6,8,11-21,29,30,32,34] using the color Lena image.The outcomes of the average UACI,correlation,entropy,PSNR,and NPCR values for the enciphered color image are demonstrated in Tab.10.It is noticed that all security evaluation metrics of the proposed cryptosystem are close or superior to those of the previous studies.Thus,the proposed optical cryptosystem can survive various types of multimedia attacks due to its robustness and reliability compared to related cryptosystems.It also achieves a higher level of confusion efficacy.The obtained outcomes reveal that the proposed optical cryptosystem has minimal complications and good resistance to various types of attacks compared to the conventional cryptosystems.In summary,the proposed cryptosystem provides more robustness and security and higher speed.

Figure 8:Decrypted images in the presence of Salt and Pepper noise with the DRPE,OSH,and PTFrFT cryptosystems

Table 9:Encryption/decryption times for the DRPE,OSH,and PTFrFT cryptosystems

Table 10:Comparative study of the proposed cryptosystem and recent related cryptosystems

5 Conclusion and Suggestions for Future Work

A secure optical cryptosystem was suggested for efficient color medical image communication.It is based on the utilization of the optical asymmetric PTFrFT algorithm.In the proposed cryptosystem,a multi-stage FrFT with different fractional orders is exploited for allowing a secure and robust color medical image transmission for telemedicine applications.The suggested asymmetric cryptosystem depends on two-phase distributions in the fractional Fourier and output planes as decryption keys.Comparison and simulation experiments have been carried out to compare the proposed optical cryptosystem with other optical and digital cryptosystems.The obtained results confirmed the exciting success of the proposed optical cryptosystem in meritoriously ciphering the transmitted color medical images.Subsequently,it is highly appreciated for safeguarding medical image telemedicine services rather than the conventional optical and digital cryptosystems.In the future work,we plan to test the proposed cryptosystem on 3D medical images with different modalities.A hybrid cryptosystem of digital and optical encryption algorithms could be introduced to merge their main advantages for achieving high robustness and security of medical image communication.

Acknowledgement: The authors would like to thank the support of the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University.

Funding statement:This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program to support publication in the top journal (Grant no.42-FTTJ-12).

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 国产精品微拍| 国产高清又黄又嫩的免费视频网站| 色偷偷综合网| 无码中文AⅤ在线观看| 亚洲高清中文字幕在线看不卡| 久久精品午夜视频| 国产伦片中文免费观看| 青青草原国产| 国产av剧情无码精品色午夜| 好紧好深好大乳无码中文字幕| 69免费在线视频| 国产人成网线在线播放va| 国产一区二区三区在线无码| 国产乱人激情H在线观看| 久久九九热视频| 综1合AV在线播放| 亚洲一区二区三区国产精品| 在线看片中文字幕| 中文字幕亚洲乱码熟女1区2区| 国产一区二区福利| 99ri国产在线| 欧美日韩一区二区三| 一级毛片高清| AV在线天堂进入| 四虎成人免费毛片| 日本亚洲成高清一区二区三区| 夜精品a一区二区三区| 国产成人精彩在线视频50| 制服丝袜国产精品| 婷婷激情五月网| 欧美三級片黃色三級片黃色1| 色婷婷啪啪| 婷婷丁香在线观看| 国产在线视频欧美亚综合| 午夜在线不卡| 国产精品三区四区| 免费高清毛片| 国产在线视频二区| 天天综合色网| 超碰91免费人妻| 国产欧美精品一区aⅴ影院| 欧美日韩免费观看| 亚洲中文字幕av无码区| 99久久这里只精品麻豆| 大陆精大陆国产国语精品1024| 国产国拍精品视频免费看| 欧美亚洲一二三区| 国产成熟女人性满足视频| 欧美一级黄色影院| 日韩精品无码一级毛片免费| 欧美国产日韩另类| 亚洲国产中文精品va在线播放| www.精品视频| 国产福利在线免费| 久久久噜噜噜久久中文字幕色伊伊| 国产一二三区视频| 99热这里都是国产精品| 白丝美女办公室高潮喷水视频| 亚洲成人精品久久| 亚洲天堂区| 成年片色大黄全免费网站久久| 992tv国产人成在线观看| 在线五月婷婷| 天堂岛国av无码免费无禁网站| 国产亚洲精品97AA片在线播放| 99精品伊人久久久大香线蕉| 国产欧美亚洲精品第3页在线| 色妞永久免费视频| 久久人人爽人人爽人人片aV东京热| 国产成人一区免费观看| 国产免费福利网站| 国产凹凸视频在线观看| 456亚洲人成高清在线| 国产亚洲精品无码专| 国产精品福利尤物youwu | 亚洲精品在线影院| 小蝌蚪亚洲精品国产| www.亚洲一区| 一级毛片视频免费| jizz在线免费播放| 99在线观看视频免费| 国产精品亚欧美一区二区|