Enhancing medical image privacy in IoT with bit-plane level encryption using chaotic map.

IF 2.1 4区 医学 Q2 MATHEMATICAL & COMPUTATIONAL BIOLOGY
Frontiers in Computational Neuroscience Pub Date : 2025-06-06 eCollection Date: 2025-01-01 DOI:10.3389/fncom.2025.1591972
Fatima Asiri, Wajdan Al Malwi, Tamara Zhukabayeva, Ibtehal Nafea, Abdullah Aziz, Nadhmi A Gazem, Abdullah Qayyum
{"title":"Enhancing medical image privacy in IoT with bit-plane level encryption using chaotic map.","authors":"Fatima Asiri, Wajdan Al Malwi, Tamara Zhukabayeva, Ibtehal Nafea, Abdullah Aziz, Nadhmi A Gazem, Abdullah Qayyum","doi":"10.3389/fncom.2025.1591972","DOIUrl":null,"url":null,"abstract":"<p><strong>Introduction: </strong>Preserving privacy is a critical concern in medical imaging, especially in resource limited settings like smart devices connected to the IoT. To address this, a novel encryption method for medical images that operates at the bit plane level, tailored for IoT environments, is developed.</p><p><strong>Methods: </strong>The approach initializes by processing the original image through the Secure Hash Algorithm (SHA) to derive the initial conditions for the Chen chaotic map. Using the Chen chaotic system, three random number vectors are generated. The first two vectors are employed to shuffle each bit plane of the plaintext image, rearranging rows and columns. The third vector is used to create a random matrix, which further diffuses the permuted bit planes. Finally, the bit planes are combined to produce the ciphertext image. For further security enhancement, this ciphertext is embedded into a carrier image, resulting in a visually secured output.</p><p><strong>Results: </strong>To evaluate the effectiveness of our algorithm, various tests are conducted, including correlation coefficient analysis (<i>C</i>.<i>C</i> < or negative), histogram analysis, key space [(10<sup>90</sup>)<sup>8</sup>] and sensitivity assessments, entropy evaluation [<i>E</i>(<i>S</i>) > 7.98], and occlusion analysis.</p><p><strong>Conclusion: </strong>Extensive evaluations have proven that the designed scheme exhibits a high degree of resilience to attacks, making it particularly suitable for small IoT devices with limited processing power and memory.</p>","PeriodicalId":12363,"journal":{"name":"Frontiers in Computational Neuroscience","volume":"19 ","pages":"1591972"},"PeriodicalIF":2.1000,"publicationDate":"2025-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12179213/pdf/","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers in Computational Neuroscience","FirstCategoryId":"3","ListUrlMain":"https://doi.org/10.3389/fncom.2025.1591972","RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2025/1/1 0:00:00","PubModel":"eCollection","JCR":"Q2","JCRName":"MATHEMATICAL & COMPUTATIONAL BIOLOGY","Score":null,"Total":0}
引用次数: 0

Abstract

Introduction: Preserving privacy is a critical concern in medical imaging, especially in resource limited settings like smart devices connected to the IoT. To address this, a novel encryption method for medical images that operates at the bit plane level, tailored for IoT environments, is developed.

Methods: The approach initializes by processing the original image through the Secure Hash Algorithm (SHA) to derive the initial conditions for the Chen chaotic map. Using the Chen chaotic system, three random number vectors are generated. The first two vectors are employed to shuffle each bit plane of the plaintext image, rearranging rows and columns. The third vector is used to create a random matrix, which further diffuses the permuted bit planes. Finally, the bit planes are combined to produce the ciphertext image. For further security enhancement, this ciphertext is embedded into a carrier image, resulting in a visually secured output.

Results: To evaluate the effectiveness of our algorithm, various tests are conducted, including correlation coefficient analysis (C.C < or negative), histogram analysis, key space [(1090)8] and sensitivity assessments, entropy evaluation [E(S) > 7.98], and occlusion analysis.

Conclusion: Extensive evaluations have proven that the designed scheme exhibits a high degree of resilience to attacks, making it particularly suitable for small IoT devices with limited processing power and memory.

在医学成像中,保护隐私是一个关键问题,特别是在资源有限的环境中,如连接到物联网的智能设备。为了解决这个问题,开发了一种针对物联网环境量身定制的、在位平面级别运行的新型医学图像加密方法。方法:该方法通过安全哈希算法(SHA)对原始图像进行初始化处理,推导出陈混沌映射的初始条件。利用陈氏混沌系统,生成了三个随机数向量。前两个向量用于打乱明文图像的每个位平面,重新排列行和列。第三个向量用于创建一个随机矩阵,该矩阵进一步扩散排列的位平面。最后,将这些位平面进行组合,生成密文图像。为了进一步增强安全性,该密文被嵌入到载体图像中,从而产生视觉上安全的输出。结果:为了评价算法的有效性,我们进行了相关系数分析(C.C <或负)、直方图分析、键空间[(1090)8]和灵敏度评估、熵评估[E(S) > 7.98]、遮挡分析等测试。结论:广泛的评估已经证明,所设计的方案对攻击具有高度的弹性,特别适合处理能力和内存有限的小型物联网设备。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Frontiers in Computational Neuroscience
Frontiers in Computational Neuroscience MATHEMATICAL & COMPUTATIONAL BIOLOGY-NEUROSCIENCES
CiteScore
5.30
自引率
3.10%
发文量
166
审稿时长
6-12 weeks
期刊介绍: Frontiers in Computational Neuroscience is a first-tier electronic journal devoted to promoting theoretical modeling of brain function and fostering interdisciplinary interactions between theoretical and experimental neuroscience. Progress in understanding the amazing capabilities of the brain is still limited, and we believe that it will only come with deep theoretical thinking and mutually stimulating cooperation between different disciplines and approaches. We therefore invite original contributions on a wide range of topics that present the fruits of such cooperation, or provide stimuli for future alliances. We aim to provide an interactive forum for cutting-edge theoretical studies of the nervous system, and for promulgating the best theoretical research to the broader neuroscience community. Models of all styles and at all levels are welcome, from biophysically motivated realistic simulations of neurons and synapses to high-level abstract models of inference and decision making. While the journal is primarily focused on theoretically based and driven research, we welcome experimental studies that validate and test theoretical conclusions. Also: comp neuro
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信