CLC number: TP391
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2023-07-24
Cited: 0
Clicked: 2003
Citations: Bibtex RefMan EndNote GB/T7714
Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE. A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services[J]. Frontiers of Information Technology & Electronic Engineering, 2023, 24(7): 1045-1061.
@article{title="A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services",
author="Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="24",
number="7",
pages="1045-1061",
year="2023",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2200372"
}
%0 Journal Article
%T A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
%A Fatma KHALLAF
%A Walid EL-SHAFAI
%A El-Sayed M. EL-RABAIE
%A Naglaa F. SOLIMAN
%A Fathi E. Abd EL-SAMIE
%J Frontiers of Information Technology & Electronic Engineering
%V 24
%N 7
%P 1045-1061
%@ 2095-9184
%D 2023
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2200372
TY - JOUR
T1 - A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
A1 - Fatma KHALLAF
A1 - Walid EL-SHAFAI
A1 - El-Sayed M. EL-RABAIE
A1 - Naglaa F. SOLIMAN
A1 - Fathi E. Abd EL-SAMIE
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 24
IS - 7
SP - 1045
EP - 1061
%@ 2095-9184
Y1 - 2023
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2200372
Abstract: quaternion algebra has been used to apply the fractional Fourier transform (FrFT) to color images in a comprehensive approach. However, the discrete fractional random transform (DFRNT) with adequate basic randomness remains to be examined. This paper presents a novel multistage privacy system for color medical images based on discrete quaternion fractional Fourier transform (DQFrFT) watermarking and three-dimensional chaotic logistic map (3D-CLM) encryption. First, we describe quaternion DFRNT (QDFRNT), which generalizes DFRNT to handle quaternion signals effectively, and then use QDFRNT to perform color medical image adaptive watermarking. To efficiently evaluate QDFRNT, this study derives the relationship between the QDFRNT of a quaternion signal and the four components of the DFRNT signal. Moreover, it uses the human vision system’s (HVS) masking qualities of edge, texture, and color tone immediately from the color host image to adaptively modify the watermark strength for each block in the color medical image using the QDFRNT-based adaptive watermarking and support vector machine (SVM) techniques. The limitations of watermark embedding are also explained to conserve watermarking energy. Second, 3D-CLM encryption is employed to improve the system’s security and efficiency, allowing it to be used as a multistage privacy system. The proposed security system is effective against many types of channel noise attacks, according to simulation results.
[1]Abdelwahab KM, El-Atty SMA, El-Saied M, et al., 2020. Efficient SVD-based audio watermarking technique in FRT domain. Multim Tools Appl, 79(9):5617-5648.
[2]Al-Afandy KA, El-Shafai W, El-Rabaie ESM, et al., 2018. Robust hybrid watermarking techniques for different color imaging systems. Multim Tools Appl, 77(19):25709-25759.
[3]Alarifi A, Sankar S, Altameem T, et al., 2020a. A novel hybrid cryptosystem for secure streaming of high efficiency H.265 compressed videos in IoT multimedia applications. IEEE Access, 8:128548-128573.
[4]Alarifi A, Amoon M, Aly MH, et al., 2020b. Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access, 8:221246-221268.
[5]Algarni AD, El Banby G, Ismail S, et al., 2020. Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security applications. Entropy, 22(12):1361.
[6]Almomani I, Alkhayer A, El-Shafai W, 2022a. A crypto-steganography approach for hiding ransomware within HEVC streams in Android IoT devices. Sensors, 22(6):2281.
[7]Almomani I, AlKhayer A, El-Shafai W, 2022b. Novel ransomware hiding model using HEVC steganography approach. Comput Mater Contin, 70(1):1209-1228.
[8]Alqahtani F, Amoon M, El-Shafai W, 2022. A fractional Fourier based medical image authentication approach. Comput Mater Contin, 70(2):3133-3150.
[9]Arab A, Rostami MJ, Ghavami B, 2019. An image encryption method based on chaos system and AES algorithm. J Supercomput, 75(10):6663-6682.
[10]Belazi A, Talha M, Kharbech S, et al., 2019. Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access, 7:36667-36681.
[11]Chen BJ, Zhou CF, Jeon B, et al., 2018. Quaternion discrete fractional random transform for color image adaptive watermarking. Multim Tools Appl, 77(16):20809-20837.
[12]Daoui A, Yamni M, Karmouni H, et al., 2022. Biomedical multimedia encryption by fractional-order Meixner polynomials map and quaternion fractional-order Meixner moments. IEEE Access, 10:102599-102617.
[13]Duan CF, Zhou J, Gong LH, et al., 2022. New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt Lasers Eng, 150:106881.
[14]Elashry IF, El-Shafai W, Hasan ES, et al., 2020. Efficient chaotic-based image cryptosystem with different modes of operation. Multim Tools Appl, 79(29):20665-20687.
[15]El-Meadawy SA, Farghal AE, Shalaby HMH, et al., 2021. Efficient and secure bit-level chaos security algorithm for orbital angular momentum modulation in free-space optical communications. IEEE Access, 9:74817-74835.
[16]El-Shafai W, 2015. Joint adaptive pre-processing resilience and post-processing concealment schemes for 3D video transmission. 3D Res, 6(1):10.
[17]El-Shafai W, Hemdan EED, 2021. Robust and efficient multi-level security framework for color medical images in telehealthcare services. J Amb Intell Human Comput, 14:3675-3690.
[18]El-Shafai W, El-Rabaie S, El-Halawany M, et al., 2017. Enhancement of wireless 3D video communication using color-plus-depth error restoration algorithms and Bayesian Kalman filtering. Wirel Pers Commun, 97(1):245-268.
[19]El-Shafai W, El-Rabaie S, El-Halawany MM, et al., 2018a. Efficient hybrid watermarking schemes for robust and secure 3D-MVC communication. Int J Commun Syst, 31(4):e3478.
[20]El-Shafai W, El-Rabaie ESM, El-Halawany M, et al., 2018b. Efficient multi-level security for robust 3D color-plus-depth HEVC. Multim Tools Appl, 77(23):30911-30937.
[21]El-Shafai W, El-Rabaie S, El-Halawany MM, et al., 2018c. Recursive Bayesian filtering-based error concealment scheme for 3D video communication over severely lossy wireless channels. Circ Syst Signal Process, 37(11):4810-4841.
[22]El-Shafai W, El-Rabaie S, El-Halawany MM, et al., 2019. Security of 3D-HEVC transmission based on fusion and watermarking techniques. Multim Tools Appl, 78(19):27211-27244.
[23]El-Shafai W, Almomani IM, Alkhayer A, 2021a. Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access, 9:35004-35026.
[24]El-Shafai W, Khallaf F, El-Rabaie ESM, et al., 2021b. Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J Amb Intell Human Comput, 12(10):9007-9035.
[25]El-Shafai W, Mesrega AK, Ahmed HEH, et al., 2022a. An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks. J Inform Secur Appl, 64:103039.
[26]El-Shafai W, Khallaf F, El-Rabaie ESM, et al., 2022b. Proposed neural SAE-based medical image cryptography framework using deep extracted features for smart IoT healthcare applications. Neur Comput Appl, 34(13):10629-10653.
[27]El-Shafai W, Khallaf F, El-Rabaie ESM, et al., 2022c. Proposed 3D chaos-based medical image cryptosystem for secure cloud-IoMT eHealth communication services. J Amb Intell Human Comput, p.1-28.
[28]Faragallah OS, Alzain MA, El-Sayed HS, et al., 2019. Block-based optical color image encryption based on double random phase encoding. IEEE Access, 7:4184-4194.
[29]Faragallah OS, Afifi A, El-Shafai W, et al., 2020a. Investigation of chaotic image encryption in spatial and FrFT domains for cybersecurity applications. IEEE Access, 8:42491-42503.
[30]Faragallah OS, Afifi A, El-Sayed HS, et al., 2020b. Efficient HEVC integrity verification scheme for multimedia cybersecurity applications. IEEE Access, 8:167069-167089.
[31]Faragallah OS, AlZain MA, El-Sayed HS, et al., 2020c. Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multim Tools Appl, 79(3):2495-2519.
[32]Faragallah OS, El-Sayed HS, Afifi A, et al., 2021. Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform. Opt Lasers Eng, 137:106333.
[33]Faragallah OS, El-Shafai W, Sallam AI, et al., 2022. Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J Amb Intell Human Comput, 13(2):1215-1239.
[34]Huang ZW, Zhou NR, 2022. Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion. Opt Laser Technol, 149:107879.
[35]Jin LH, Song EM, Li L, et al., 2013. A quaternion gradient operator for color image edge detection. IEEE Int Conf on Image Processing, p.3040-3044.
[36]Khafaga DS, Karim FK, Darwish MM, et al., 2022. Robust zero-watermarking of color medical images using multi-channel Gaussian-Hermite moments and 1D Chebyshev chaotic map. Sensors, 22(15):5612.
[37]Khan M, Masood F, 2019. A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multim Tools Appl, 78(18):26203-26222.
[38]Pandey R, Gamit N, Naik S, 2014. Non-destructive quality grading of mango (Mangifera Indica L) based on CIELab colour model and size. IEEE Int Conf on Advanced Communications, Control and Computing Technologies, p.1246-1251.
[39]Salah E, Amine K, Redouane K, et al., 2021. A Fourier transform based audio watermarking algorithm. Appl Acoust, 172:107652.
[40]Siam AI, Almaiah MA, Al-Zahrani A, et al., 2021. Secure health monitoring communication systems based on IoT and cloud computing for medical emergency applications. Comput Intell Neurosci, 2021:8016525.
[41]Soliman NF, Khalil MI, Algarni AD, et al., 2021. Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multim Tools Appl, 80(3):4789-4823.
[42]Urynbassarova D, Teali AA, Zhang F, 2022. Discrete quaternion linear canonical transform. Dig Signal Process, 122:103361.
[43]Wang H, Hu XJ, Xu H, et al., 2019. No-reference quality assessment method for blurriness of SEM micrographs with multiple texture. Scanning, 2019:4271761.
[44]Wen WY, Zhang YS, Fang YM, et al., 2016. A novel selective image encryption method based on saliency detection. Visual Communications and Image Processing, p.1-4.
[45]Yamni M, Karmouni H, Sayyouri M, et al., 2021. Robust zero-watermarking scheme based on novel quaternion radial fractional Charlier moments. Multim Tools Appl, 80(14):21679-21708.
[46]Zhang XC, Wang LF, Zhou Z, et al., 2019. A chaos-based image encryption technique utilizing Hilbert curves and H-fractals. IEEE Access, 7:74734-74746.
Open peer comments: Debate/Discuss/Question/Opinion
<1>