Medical Image Encryption through Chaotic Asymmetric Cryptosystem
Keywords:
Blum-Goldwasser Cryptosystem, Chaotic Encryption, Alexander Raharjo, Elliptic Curve Cryptography, Image Encryption, Public Key EncryptionAbstract
With the soaring heights of digital advancements, the necessity of securing medical images has become utmost, as healthcare information remains highly confidential. The proposed work being presented suggests a new approach for image encryption which is based on Elliptic Curve Cryptography and on Blum-Goldwasser Cryptosystem in a public-key environment beside the generation of chaotic sequence to increase the randomness of the system. The encryption workflow begins with secure key exchange, using the computational efficiency of ECC in conjunction with the probabilistic security features of BGC, which are based on the discrete logarithm and quadratic residuosity problems, to initiate the encryption process. Chaotic map pixel randomization is added to obscure data even further by introducing high unpredictability and resistance against pattern-based attacks. The added security layers are the combination of ECC and BGC, which make the system robust against brute-force attempts and differential cryptanalysis. In-depth performance evaluations through extensive simulation narratively support the superiority of the proposed method over existing cryptosystems. Telemetry Evidence-It achieved the highest information entropy of 7.9998, which indicates nearly maximum randomness; An average correlation coefficient of 0.0010 implies negligible pixel dependency while an NPCR of 99.6901% and UACI of 33.5260% therefore indicate utmost resistance towards differential attacks. Moreover, the encryption process proceeds in just 0.142 seconds, thereby cementing its real-time application feasibility. The proposed hybrid chaotic image encryption method has been substantiated by several experiments as showing much strength concerning emergent cyber threats against medical data and other sensitive images.
Downloads
References
H. Shen, J. Zhou, G. Wu, and M. Zhang, "Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data," IEEE Access, vol. 11, pp. 139715–139727, 2023, doi: 10.1109/ACCESS.2023.3334733.
M. Elhoseny, X. Yuan, Q. Lin, H. Zhang, and A. S. El-Metwally, "Secure Medical Data Transmission Model for IoT-Based Healthcare Systems," IEEE Access, vol. 6, pp. 20596–20608, 2018, doi: 10.1109/ACCESS.2018.2817615.
S. N. M. Shah, M. U. Ghaffar, and M. A. Khan, "Chaotic Image Encryption for Medical Images Using Logistic Map and Henon Map," IEEE Access, vol. 10, pp. 112456–112467, 2022, doi: 10.1109/ACCESS.2022.3214423.
A. Jolfaei and X. Bai, "A Secure Image Encryption Scheme Based on Affine Transformation and XOR Operation," IEEE Access, vol. 9, pp. 95173–95183, 2021, doi: 10.1109/ACCESS.2021.3094023.
M. S. Hossain and G. Muhammad, "Cloud-Assisted Industrial Internet of Things (IIoT) – Enabled Framework for Health Monitoring," IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2606–2613, 2018, doi: 10.1109/JIOT.2018.2825286.
M. B. Alom, V. B. Mollah, and H. K. Kim, "Design and Implementation of Efficient Elliptic Curve Cryptography Based Security System," IEEE Access, vol. 8, pp. 103174–103184, 2020, doi: 10.1109/ACCESS.2020.2999816.
A. K. Bera, A. K. Das, and P. Mukherjee, "Design of an Efficient and Secure Medical Image Encryption Scheme Using Elliptic Curve Cryptography," IEEE Transactions on Industrial Informatics, vol. 15, no. 8, pp. 4572–4580, 2019, doi: 10.1109/TII.2018.2881001.
T. J. Lim and H. S. Park, "A Study on Medical Image Protection Using Chaotic Cryptography," IEEE Access, vol. 7, pp. 147660–147674, 2019, doi: 10.1109/ACCESS.2019.2946378.
R. K. Sharma and P. S. Rani, "A Hybrid Encryption Scheme for Securing Medical Images Using ECC and DNA Cryptography," IEEE Access, vol. 9, pp. 78617–78628, 2021, doi: 10.1109/ACCESS.2021.3079350.
J. Zhang, Y. Wu, and W. Wang, "Efficient Medical Image Encryption Using Hybrid Chaotic and Public Key Algorithms," IEEE Transactions on Dependable and Secure Computing, early access, 2023, doi: 10.1109/TDSC.2023.3245781.
S. Roy and D. Bhattacharyya, "Medical Image Security Using Chaos and Elliptic Curve Cryptography," IEEE Access, vol. 10, pp. 14253–14265, 2022, doi: 10.1109/ACCESS.2022.3148036.
K. A. Darabkh, I. H. El-Khudari, and A. H. Altamimi, "An Efficient and Secure Chaos-Based Image Encryption System for Real-Time Applications," IEEE Access, vol. 8, pp. 161570–161584, 2020, doi: 10.1109/ACCESS.2020.3019024.
F. Li, R. Xiao, and H. Liu, "Hybrid Chaos-Based Medical Image Encryption Using Bitplane and Elliptic Curve Cryptography," IEEE Access, vol. 9, pp. 99918–99930, 2021, doi: 10.1109/ACCESS.2021.3096752.
M. Khan and S. A. Khan, "A Novel Image Encryption Technique Using Multiple Chaotic Maps and Discrete Wavelet Transform," IEEE Access, vol. 6, pp. 14060–14074, 2018, doi: 10.1109/ACCESS.2018.2801221.
L. Shu, J. Wan, and D. Li, "Security in the Internet of Things: A Review on Application-Layer Encryption," IEEE Access, vol. 4, pp. 537–547, 2016, doi: 10.1109/ACCESS.2016.2547746.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.