亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Secure and Robust Optical Multi-Stage Medical Image Cryptosystem

        2022-11-09 08:15:06WalidElShafaiMoustafaAlyAbeerAlgarniFathiAbdElSamieandNaglaaSoliman
        Computers Materials&Continua 2022年1期

        Walid El-Shafai,Moustafa H.Aly,Abeer D.Algarni,Fathi E.Abd El-Samie,3 and Naglaa F.Soliman

        1Department Electronics and Electrical Communications,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

        2Department of Electronics and Communications Engineering,College of Engineering and Technology,Arab Academy for Science,Technology and Maritime Transport,Alexandria,1029,Egypt

        3Department of Information Technology,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,84428,Saudi Arabia

        4Department of Electronics and Communications,Faculty of Engineering,Zagazig University,Zagazig,44519,Egypt

        Abstract: Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested.Two different phases in the fractional Fourier and output planes are provided as deciphering keys.Accordingly,the ciphering keys will not be employed for the deciphering procedure.Thus,the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH (Optical Scanning Holography) and DRPE(Double Random Phase Encoding)algorithms.One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the onedimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components.More comparisons on various color medical images are examined and analyzed to substantiate the cryptosystem efficacy.The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure.It has terrific cryptography performance compared to conventional cryptography algorithms,even in the presence of noise and severe channel attacks.

        Keywords: Optical encryption;medical image security;symmetric and asymmetric encryption;OSH;DRPE;PTFrFT

        1 Introduction

        Digitalization is a huge part of our life today,with broad applications in health,science,engineering,media,communication,etc.A large amount of digital multimedia data is often transmitted via open networks with the widespread use of the Internet.Therefore,the security and integrity of this large amount of data are of great concern [1,2].A type of the precious data is represented with digital images used in various beneficial applications such as military,biometric authentication,online shopping,online banking,healthcare systems,telemedicine,medical science,etc.[3-5].

        The lack of powerful security and protection tools could cause various threats and attacks,leading to serious disasters for people and networks.In medical image communication through the Internet,intruders can simply retrieve the images because of the shortage in security levels.Therefore,the protection of the transmitted image information becomes a serious problem.Several papers described different multimedia encryption techniques like those found in [1-21].There are several chaotic maps in the state-of-the-art works,such as Arnold map,Logistic map,and Cat map [12-21].Various image security and image cryptography techniques based on chaos systems have been presented in [22-27].The main disadvantage of the traditional chaotic-mapbased cryptography procedures is that they depend on lower-order chaos functions.Therefore,it is essential to develop robust cryptography algorithms to avoid this disadvantage.

        The conventional cryptography techniques [28-34] have nevertheless been found not appropriate for efficient image communication due to their underlying characteristics like large number of iterations,high pixel redundancy,strong correlation,and large computational cost.So,they minimize the inclusive security performance.Thus,it is urgent to preclude medical images from the risks of attacks and threats through employing effective cryptography techniques.Consequently,due to the importance of medical data security,this paper presents a robust way of managing and securing color medical image communication for achieving reliable security in telemedicine applications.

        This motivated us,in this paper,to implement an effective and asymmetric optical color medical image cryptosystem,where two random phases are exploited as ciphering keys that are distinct from the deciphering keys.The introduced cryptosystem has an attractive advantage of nonlinear truncation of phase components for the communication of color medical images through insecure channels.Hence,it is suitable for cloud-based telemedicine and healthcare applications.Simulation results of the proposed cryptosystem on different color medical images prove better security performance with lower computational cost in the presence of different types of noise and multimedia attacks.

        The paper is planned as follows.Section 2 presents some work related to medical image security.Section 3 introduces the inclusive clarification of the suggested asymmetric cryptosystem for secure color medical image communication.Simulation outcomes and comparisons are provided in Section 5.The main concluding remarks are offered in Section 6.

        2 Related Work

        There is a critical need for telemedicine healthcare opportunities and facilities that can be delivered through software tools.This will create a healthcare delivery system with more timeliness and efficiency.Security plays a crucial role in the transmission of medical data via the Internet.Recently,it has become a challenge to secure medical images in healthcare and telemedicine applications [35-38].Gupta et al.[39] introduced a high-security medical image cryptosystem that depends on logstic map.In [40],the authors introduced a comparison between chaos theory and elliptic curve cryptography as tools for image security.Abdel-Nabi et al.[41] proposed an algorithm that merges reversible data steganography and ciphering approaches to achieve the required protection of stored and transmitted medical data and images.

        In [42],a hybrid approach was proposed for partial encryption.It guarantees optimal and robust storage and communication of medical information.This approach has low processing time for the ciphering-deciphering processes.Bharghavi et al.[43] presented an efficient security system based on chaotic logistic map for reliable medical image transmission.In [44],a robust and fast medical image ciphering approach was suggested for real-time medical communication services.In [45],the authors presented a powerful and efficient medical image ciphering approach.Two chaotic sequences are utilized in this approach for key generation.Then,a diffusion process with two rounds is adopted to create the encrypted medical images.Dai et al.[46] explained a new technique for medical image security based on a hybrid structure of Chebyshev maps and logistic maps to enhance the ciphering performance.In [47],the authors presented a partial encryption framework based on a chaotic map and DNA encoding for securing medical images.

        Puech et al.[48] investigated different ciphering techniques for medical image communication.The advantage of these techniques is that they can be employed for images,videos,and 3D objects.In [49],corresponding to cellular automata chaotic features,the authors proposed an efficient medical image ciphering algorithm.The simulation findings showed that this algorithm offers more security and speed.Saraswathi et al.[50] introduced an efficient medical image crptosystem based on an asymmetric stream cipher security technique.It has been concluded that this cryptosystem is robust against various types of cyberattacks.Suganya et al.[51] proposed a hybrid cryptosystem that depends on stream-based and block-based ciphering algorithms.This cryptosystem highly provides integrity control and encryption of medical images.Zhou et al.[52]suggested a security technique that is capable of full protection of chosen regions/objects in medical images.

        Moreover,several image security systems [53-58] can be exploited in medical imaging services.In [53],the authors introduced an optical image security algorithm using fringe projection profilometry and Fourier fringe analysis.Das et al.[54] developed an image security system in which the input image is ciphered based on a user-defined key.Jain et al.[55] proposed a partial-randomphase-encoding-based color image ciphering and deciphering framework.Li et al.[56] suggested an effective hybrid image ciphering/compression framework.Ramaraju et al.[57] proposed a leastsignificant-bit-based image hiding technique.It hides four images inside a single image to generate a stego-image that is then ciphered with a secret key.Wen et al.[58] proposed a robust optical salient region ciphering method,in which the salient regions are pre-ciphered by employing a chaotic optical ciphering technique.

        Although the statistical security analysis of the previous related works [1-58] showed numerous differences,most of the presented methods have significant challenges with ciphering and deciphering processes.The traditional encryption methods do not achieve the required quality level in the presence of multimedia assaults.Consequently,the presented state-of-the-art methods have low performance levels in the presence of multimedia attacks and channel noise.Additionally,the state-of-the-art methods have not been assessessed with enough evaluation metrics and in-detail statistical security analysis.In addition,they necessitate additional calculations in the ciphering and deciphering procedures,and hence,they have large computational cost.Therefore,considering the shortcomings of the previous encryption methods in the literature,an efficient optical color medical image cryptosystem based on the asymmetric PTFrFT encryption algorithm is suggested in this paper for telemedicine and healthcare security applications.The security examination of the presented algorithm is investigated through visual results,differential analysis,histograms,encryption quality analysis,information entropy,communication noise analysis,and security analysis.Therefore,several statistical tests on different samples of color medical images are performed.

        3 Proposed Optical PTFrFT-Based Color Medical Image Cryptosystem

        The proposed optical cryptosystem consists of two stages of encryption and decryption as illustrated in Figs.1a and 1b.The encryption keys of the medical images comprise the generated optical keys of arbitrary phase masks (PMs) of the employed asymmetric PTFrFT algorithm.

        Figure 1:Suggested multi-stage PTFrFT-based color medical image cryptosystem (a) Encryption stage (b) Decryption stage

        The precious aspect of the employed asymmetric PTFrFT cryptosystem is that there are two distinct ciphering/deciphering secret keys.This tremendous trait has encouraged us to utilize it for building a secure and robust color medical image cryptosystem.The PTFrFT is estimated with the FrFT of the plain color medical image with the truncation operation of phase components,where the amplitude modular part of the FrFT spectrum is merely exploited,and the phase part of the FrFT spectrum is separated.The ciphering methodology of the introduced cryptosystem is executed with the steps demonstrated in Fig.1a.

        1) Separate the input color medical image into the R,G,and B color componentsIR(m,n),IG(m,n),andIB(m,n)as offered in Eq.(1).

        2) Multiply the separated color components by the first phase masksPMR1,PMG1,andPMB1,and then apply the first FrFT operation with the first fractional ordersOR1,OG1,andOB1to produce the primary encrypted image components.Each of these components can be decomposed into two parts: phase retaining part as in Eqs.(2)-(4) and phase truncated part as in Eqs.(5)-(7).

        wherePR{.} andPT{.} are the phase reservation and truncation operators,respectively.ThePMR1(m,n),PMG1(m,n),andPMB1(m,n)are the primary encryption phase masks that are randomly generated by the 2D Arnold map [3].

        3) Similarly,repeat Step (2) through multiplying by the second phase masksPMR2,PMG2,andPMB2,and performing the second FrFT operation with the second fractional ordersOR2,OG2,andOB2to produce the final encrypted image components.Each of these components has two parts: phase retaining part as in Eqs.(8)-(10) and the phase truncated part as in Eqs.(11)-(13).

        where the obtainedPR2,PG2,andPB2are then utilized as the decrypted keys.ThePMR2(m,n),PMG2(m,n),andPMB2(m,n)are the final encryption phase masks that are given by Eqs.(14)-(16) comprising the phase functionexp[j ψ (m,n)].

        whereψ(m,n)∈[0,2π].

        The benefit from using two FrFT stages is significantly improving the robustness and security of the introduced medical image cryptosystem based on the fractional orders and scaling factors of the FrFT.Due to these advantages,it is highly recommended in the proposed cryptosystem.More detailed discussions about the FrFT are found [4,5].The deciphering steps are the inverse of the above-mentioned ciphering steps,as demonstrated in Fig.1b.Consequently,the deciphering procedure can be implemented by exploiting the private deciphering secret keysP2(m,n)andP1(m,n),where the PTFrFT is an asymmetric transform.

        4 Results and Discussions

        Different color medical images that have different features are chosen and examined to substantiate the profits of the suggested optical color medical image cryptosystem.The utilized color medical images are primarily decomposed into their R,G,and B components to be used as the cryptosystem input.The simulation experiments are performed using a laptop with 8 GB RAM,and i7-5200 Intel CPU.The utilized software in the simulation tests is the MATLAB R2020b.

        4.1 Visual Results

        The visual analysis is the most important assessment tool utilized to appraise the security strength and efficiency of the suggested cryptosystem.The examined color medical images and their encrypted versions with the suggested optical asymmetric cryptosystem and the conventional optical symmetric DRPE and OSH cryptosystems [7,9,10,22] are displayed in Fig.2.It is obvious that the suggested cryptosystem is more beneficial compared to other cryptosystems in concealing and diminishing the significant objects contained within the studied color medical images.

        Figure 2:Original color medical images and their encrypted versions with the PTFrFT,OSH,and DRPE cryptosystems

        4.2 Histogram Results

        The pixel distributions of the original and ciphered images can be demonstrated through histogram analysis [16].Both histograms of the original and ciphered images must be different to illustrate good encryption.Fig.3 indicates the histogram security analysis of the examined original and ciphered images with the suggested and conventional cryptosystems.It is obvious that the original image histograms are entirely different from the ciphered image histograms.This proves the reliability of the suggested cryptosystem and the conventional ones.

        Figure 3:Histogram outcomes for the PTFrFT,OSH,and DRPE cryptosystems

        4.3 Entropy Results

        The entropy metric is exploited to describe the unpredictability degree of the ciphered color medical image.The proposed cryptosystem is close to achieving an ideal entropy value of 8 [23].Tab.1 offers the entropy outcomes of the analyzed original,encrypted,and decrypted color medical images for the suggested optical PTFrFT cryptosystem and the conventional optical cryptosystems.The obtained superior entropy values for the suggested cryptosystem prove its robustness and reliability compared to other cryptosystems through achieving better values close to the desired optimal value.

        Table 1:Entropy outcomes for the PTFrFT,OSH,and DRPE cryptosystems

        4.4 Correlation Results

        Remarkable cryptosystems are supposed to eliminate any relationship among color medical image pixels to protect the color medical image content from statistical channel attacks [20].Tabs.2-4 demonstrate the diagonal (D),horizontal (H),and vertical (V) correlation outcomes for the studied original,enciphered,and deciphered color medical images with the proposed cryptosystem compared to DRPE and OSH cryptosystems.The obtained D,H,and V correlation values are enormously low for the ciphered images obtained by the proposed cryptosystem compared to the traditional cryptosystems.This proves its superior security performance.

        Table 2:Correlation outcomes of the DRPE cryptosystem [9,22]

        Table 3:Correlation outcomes of the OSH cryptosystem [7,10]

        Table 4:Correlation outcomes of the proposed PTFrFT cryptosystem

        4.5 Encryption Quality Security Analysis

        The deviation irregularity (ID) and the histogram deviation (HD) metrics [53] can be used to assess the quality performance and ciphering efficacy of the proposed optical cryptosystem.They are utilized to determine the deviation percentage of the irregularity and histogram difference between the original and ciphered medical images.Tab.5 demonstrates the estimatedIDandHDoutcomes,where lower values are obtained for both,which is recommended for achieving superior ciphering efficacy.Consequently,the larger the decorrelation between the original and ciphered images is,the improved the operation of the suggested cryptosystem compared to the conventional DRPE and OSH cryptosystems.

        Table 5:Histogram and irregular deviation results of the encrypted color medical images

        4.6 Differential Security Analysis

        The differential security cryptanalysis in terms of the NPCR (Number of Changing Pixel Rate) and UACI (Unified Averaged Changed Intensity) [44] is employed to verify the robustness of the proposed cryptosystem in the presence of slight modifications of the encrypted images.For good security and robustness,it is required to achieve NPCR and UACI values of 0.996 and 0.33,respectively [9].It is observed that the obtained UACI and NPCR values in Tab.6 for the proposed cryptosystem are astonishingly close to the desired values in contrast to the conventional cryptosystems.

        Table 6:NPCR and UACI outcomes of the tested color medical images

        4.7 SSIM,FSIM and PSNR Analysis

        The SSIM (Structural Similarity),PSNR (Peak Signal-to-Noise Ratio),and FSIM (Feature Similarity) metrics [12,17] are exploited to assess the cryptosystem performance.In our security analysis,these metrics are calculated between the enciphered and plain medical images.They need to have small values for a proper enciphering process.Tab.7 demonstrates the obtained results of the proposed and the conventional DRPE and OSH cryptosystems,where superior values are delivered by the proposed cryptosystem in contrast to the traditional cryptosystems.

        Table 7:SSIM,FSIM and PSNR outcomes between the plain and encrypted medical images for the PTFrFT,OSH,and DRPE cryptosystems

        4.8 Edge Security Analysis

        The metric of EDR (Edge Differential Ratio) is employed to evaluate the misrepresentations in the boundaries and borders that result from the encryption process in the color medical images [24].Tab.8 reveals that the EDR outcomes of the examined color medical images are close to 1 for the proposed PTFrFT cryptosystem.Thus,this guarantees that the encrypted and plain images are totally different.Fig.4 shows the Laplacian edge Gaussian results of the original and enciphered images with the proposed cryptosystem compared to those of the conventional algorithms.These visual outcomes confirm the amazing benefit of the proposed cryptosystem in concealing the most important aspects and features within the transmitted medical images.

        Table 8:EDR values of the encrypted images for the DRPE,OSH,and PTFrFT cryptosystems

        4.9 Key Sensitivity Security Analysis

        It is required for a cryptosystem to be susceptible to the control and initial values [17].This can be validated by investigating the key security analysis.The suggested cryptosystem provides different outcomes,when the control parameters are changed.Fig.5 offers the key sensitivity outcomes in the form of decrypted images and their histograms using incorrect key values.It is observed that the suggested cryptosystem and the tested DRPE and OSH cryptosystems have high sensitivity to slight changes in control parameters.

        Figure 4:Laplacian edge Gaussian results for the plain and enciphered medical images with the DRPE,OSH,and PTFrFT cryptosystems

        Figure 5:Results of key sensitivity analysis for the DRPE,OSH,and PTFrFT cryptosystems

        4.10 Effect of Channel Noise

        The transmission network commonly encompasses different types of noise.The proposed decryption process should survive the impact of noise.The effects of Salt and Pepper,Gaussian,and Speckle noise [14,22,47] are investigated in the simulation experiments.Figs.6-8 display the outcomes of deciphered medical images for the encrypted images presented in Fig.2 in the presence of noise with different amounts with the proposed PTFrFT and the conventional DRPE and OSH cryptosystems.It is observed that the deciphered color medical images are measurable and discernable if the transmission noise affects the enciphered color medical images.Hence,the proposed cryptosystem has a noticable advantage of resisting the effect of transmission noise compared to the conventional DRPE and OSH cryptosystems.

        Figure 6:Decrypted images in the presence of Gaussian noise with the DRPE,OSH,and PTFrFT cryptosystems

        4.11 Computational Processing Analysis

        It is recommended for any cryptosystem to have less computations in addition to high security and efficacy.Tab.9 presents the estimated values of the encryption/decryption times for the DRPE,OSH,and PTFrFT cryptosystems.The estimated encryption/decryption computation times provide evidence that the suggested cryptosystem is highly appropriate for real-time telemedicine services compared to other conventional cryptosystems.

        Figure 7:Decrypted images in the presence of Speckle noise with the DRPE,OSH,and PTFrFT cryptosystems

        4.12 Comparative Study

        In this section,we introduce a comprehensive comparative study for evaluating the performance of the proposed cryptosystem for confident color medical image transmission compared to the recent studies [3-6,8,11-21,29,30,32,34] using the color Lena image.The outcomes of the average UACI,correlation,entropy,PSNR,and NPCR values for the enciphered color image are demonstrated in Tab.10.It is noticed that all security evaluation metrics of the proposed cryptosystem are close or superior to those of the previous studies.Thus,the proposed optical cryptosystem can survive various types of multimedia attacks due to its robustness and reliability compared to related cryptosystems.It also achieves a higher level of confusion efficacy.The obtained outcomes reveal that the proposed optical cryptosystem has minimal complications and good resistance to various types of attacks compared to the conventional cryptosystems.In summary,the proposed cryptosystem provides more robustness and security and higher speed.

        Figure 8:Decrypted images in the presence of Salt and Pepper noise with the DRPE,OSH,and PTFrFT cryptosystems

        Table 9:Encryption/decryption times for the DRPE,OSH,and PTFrFT cryptosystems

        Table 10:Comparative study of the proposed cryptosystem and recent related cryptosystems

        5 Conclusion and Suggestions for Future Work

        A secure optical cryptosystem was suggested for efficient color medical image communication.It is based on the utilization of the optical asymmetric PTFrFT algorithm.In the proposed cryptosystem,a multi-stage FrFT with different fractional orders is exploited for allowing a secure and robust color medical image transmission for telemedicine applications.The suggested asymmetric cryptosystem depends on two-phase distributions in the fractional Fourier and output planes as decryption keys.Comparison and simulation experiments have been carried out to compare the proposed optical cryptosystem with other optical and digital cryptosystems.The obtained results confirmed the exciting success of the proposed optical cryptosystem in meritoriously ciphering the transmitted color medical images.Subsequently,it is highly appreciated for safeguarding medical image telemedicine services rather than the conventional optical and digital cryptosystems.In the future work,we plan to test the proposed cryptosystem on 3D medical images with different modalities.A hybrid cryptosystem of digital and optical encryption algorithms could be introduced to merge their main advantages for achieving high robustness and security of medical image communication.

        Acknowledgement: The authors would like to thank the support of the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University.

        Funding statement:This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program to support publication in the top journal (Grant no.42-FTTJ-12).

        Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

        欧美又大粗又爽又黄大片视频| 国产亚洲AV片a区二区| 国产一区二区三区porn| 激情亚洲一区国产精品| 亚洲av日韩av在线观看| 欧美亚州乳在线观看| 中文字幕一区二区网站| 日韩人妻精品视频一区二区三区| 无码国内精品久久人妻| 男女av一区二区三区| 中字幕人妻一区二区三区| 热99re久久精品这里都是免费| 一区二区特别黄色大片| 国产亚洲午夜精品久久久| 午夜无遮挡男女啪啪免费软件| 亚洲人成网站在线观看播放| 杨幂国产精品一区二区| 午夜福利视频一区二区二区| 亚洲av无码乱码国产精品| a级毛片免费观看视频| 成年人男女啪啪网站视频| 国产日本精品一二三四区| 玩弄放荡人妻少妇系列视频| 精品人妻无码中文字幕在线| 亚洲精品综合一区二区| 日本伊人精品一区二区三区| 欧美最猛黑人xxxx黑人表情| 久久久精品免费国产四虎| 亚洲免费在线视频播放| 波多野结衣久久精品99e| 黄色毛片在线看| 一区二区三区在线视频爽| 偷拍综合在线视频二区| 丰满人妻av无码一区二区三区| 韩日无码不卡| 美女露出奶头扒开内裤的视频| 国产熟妇另类久久久久| 精品五月天| 国产av精品一区二区三区视频| 中国少妇×xxxx性裸交| 免费无码成人av在线播|