CFP last date
20 May 2024
Reseach Article

Security Analysis of Medical Image Encryption using AES Modes for IoMT Systems

by Zied Guitouni, Mohammed Ali Ghaieb, Mohsen Machhout
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 2
Year of Publication: 2023
Authors: Zied Guitouni, Mohammed Ali Ghaieb, Mohsen Machhout
10.5120/ijca2023922668

Zied Guitouni, Mohammed Ali Ghaieb, Mohsen Machhout . Security Analysis of Medical Image Encryption using AES Modes for IoMT Systems. International Journal of Computer Applications. 185, 2 ( Apr 2023), 15-21. DOI=10.5120/ijca2023922668

@article{ 10.5120/ijca2023922668,
author = { Zied Guitouni, Mohammed Ali Ghaieb, Mohsen Machhout },
title = { Security Analysis of Medical Image Encryption using AES Modes for IoMT Systems },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2023 },
volume = { 185 },
number = { 2 },
month = { Apr },
year = { 2023 },
issn = { 0975-8887 },
pages = { 15-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number2/32677-2023922668/ },
doi = { 10.5120/ijca2023922668 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:25:03.953134+05:30
%A Zied Guitouni
%A Mohammed Ali Ghaieb
%A Mohsen Machhout
%T Security Analysis of Medical Image Encryption using AES Modes for IoMT Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 2
%P 15-21
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Internet of Medical Things (IoMT) driven health is the most advantageous aspect of technology in the global healthcare industry. Securing medical images in IoMT systems is a great challenge to protecting medical privacy. Many cryptographic schemes that provide the confidentiality and integrity of these images over IoMT devices are proposed. The Advanced Encryption Standard (AES), is one of the most standards used in digital image security systems, it employs five encryption modes. In this paper, the security analysis of medical images encryption was described for IoMT Systems using the AES modes. For the evaluation and analysis of security performance, several tests were employed such as the quality of the encrypted images, the Peak Signal to Noise Ratio (PSNR), the histogram analysis, the correlation between the adjacent pixels, and the encryption/decryption times for the five modes.

References
  1. R. Hireche, H. Mansouri and A. K. Pathan,"Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis", Journal of Cybersecurity an Privacy. 2022, 2, 640–661.
  2. B. Liu, H. Huang, “Picture archiving and communication systems and electronic medical records for the healthcare enterprise,” Biomedical Information Technology, Academic Press, pp. 105-164, 2020.
  3. Y. Wan, S. Gu, and B. Du, “A new image encryption algorithm based on composite chaos and hyperchaos combined with DNA coding,” Entropy, vol. 22, no. 2. 2020.
  4. A. Mitra, Y. S. Rao, and S. Prasanna, “A new image encryption approach using combinational permutation techniques,” International Journal of Computer Science, vol. 1, no. 2, pp. 127-131, 2006.
  5. Y. Dai, H. Wang, and Y. Wang, “Chaotic medical image encryption algorithm based on bit-plane decomposition,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 30, no. 4, p. 1657001, 2016.
  6. H. Nematzadeh, R. Enayatifar, H. Motameni, F. G. Guimarães, and V. N. Coelho, “Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices,” Optics and Lasers in Engineering, vol. 110, pp. 24-32, 2018.
  7. Ü. Çavuşoğlu, S. Kaçar, I. Pehlivan, and A. Zengin, “Secure image encryption algorithm design using a novel chaos based S-Box,” Chaos, Solitons & Fractals, vol. 95, pp. 92-101, 2017.
  8. Hongjun Liu, A. Kadir, ” Asymmetric color image encryption scheme using 2D discrete-time map”,  Signal processing journal, Volume 113, August 2015, Pages 104-112
  9. N. K. Pareek and V. Patidar, “Medical image protection using genetic algorithm operations,” Soft Comput., vol. 20, no. 2, pp. 763–772, 2016.
  10. M. Mukhedkar, P. Powar, and P. Gaikwad,” Secure non real time image encryption algorithm development using cryptography & steganography”, 2015 Annual IEEE India Conference (INDICON)
  11. Tauhid, A. , Tasnim, M. , Noor, S. , Faruqui, N. and Yousuf, M. (2019) A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform. Journal of Information Security, 10, 117-129.
  12. D. Aruna kumari M. Chandrika and B. Surekha Ratnam Bharadwaj,“Magnified Cipher Block Chaining Mode using DES to Ensure Data Security in Cloud Computing”, Indian Journal of Science and Technology, Vol 9,mar 2016.
  13. D. Blazhevski, A. Bozhinovski, B. Stojchevska, and V. Pachovski, “The 10 th Conference for Informatics and Information Technology (CIIT2013) MODES OF OPERATION OF THE AES ALGORITHM.” Accessed: Feb. 19, 2021.
  14. Stavroulakis, P., & Stamp. M, "Handbook of information and communication security, " Springer Science & Business Media, 2010.
  15. N. Set, S. Vijay, “Comparative Image Encryption Method Analysis Using New Transformed - Mapped Technique”, Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013).
Index Terms

Computer Science
Information Sciences

Keywords

IoMT AES AES modes image encryption images analysis.