54
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Enhancing image data security using the APFB model

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Article: 2379275 | Received 20 Jan 2024, Accepted 08 Jul 2024, Published online: 18 Jul 2024

References

  • Abbas, S. Z., Ibrahim, H., & Khan, M. (2021). A hybrid chaotic blowfish encryption for high-resolution satellite imagery. Multimedia Tools and Applications, 80(17), 26069–26091. https://doi.org/10.1007/s11042-021-10898-w
  • Abd-El-Atty, B., El-Affendi, M. A., Chelloug, S. A., & Abd El-Latif, A. A. (2023). Double Medical Image Cryptosystem Based on Quantum Walk. IEEE Access, 11, 69164–69176. https://doi.org/10.1109/ACCESS.2023.3289932
  • Abdelfatah, R. I., Saqr, H. M., & Nasr, M. E. (2023). An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map. Multimedia Tools and Applications, 82(14), 22213–22227. https://doi.org/10.1007/s11042-022-13343-8
  • Abu-Faraj, M., Al-Hyari, A., Al-Taharwa, I., Al-Ahmad, B., & Alqadi, Z. (2022). CASDC: A Cryptographically Secure Data System Based on Two Private Key Images. IEEE Access, 10, 126304–126314. https://doi.org/10.1109/ACCESS.2022.3226319
  • Ahmad, N., & Hasan, S. M. R. (2021). A new ASIC implementation of an advanced encryption standard (AES) crypto-hardware accelerator. Microelectronics Journal, 117, 105255. https://doi.org/10.1016/j.mejo.2021.105255
  • Ahuja, B., Doriya, R., Salunke, S., Hashmi, M. F., Gupta, A., & Bokde, N. D. (2023). HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system. Connection Science, 35(1), 2175792. https://doi.org/10.1080/09540091.2023.2175792
  • Akkasaligar, P. T., & Biradar, S. (2020). Selective medical image encryption using DNA cryptography. Information Security Journal: A Global Perspective, 29(2), 91–101. https://doi.org/10.1080/19393555.2020.1718248
  • Al-Hawawreh, M., & Hossain, M. S. (2023). A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning. Information Fusion, 99, 101889. https://doi.org/10.1016/j.inffus.2023.101889
  • Alexan, W., Elkandoz, M., Mashaly, M., Azab, E., & Aboshousha, A. (2023). Color Image Encryption Through Chaos and KAA Map. IEEE Access, 11, 11541–11554. https://doi.org/10.1109/ACCESS.2023.3242311
  • Alfrhan, A., Moulahi, T., & Alabdulatif, A. (2021). Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT). Blockchain: Research and Applications, 2(4), 100036. https://doi.org/10.1016/j.bcra.2021.100036
  • Ali, J., Jamil, M. K., Alali, A. S., Ali, R., & Gulraiz, G. (2024). A medical image encryption scheme based on Mobius transformation and Galois field. Heliyon, 10(1), e23652. https://doi.org/10.1016/j.heliyon.2023.e23652
  • Arian, M., Saberi Kamarposhti, M., & Broumandnia, A. (2024). A New Method for Image Encryption Using DNA Sequences and Hyper Chaos. In M. Awang, H. H. Al-Kayiem, T. C. Bor, & S. S. Emamian (Eds.), in Advances in Material Science and Engineering (pp. 371–378). Springer Nature Singapore.
  • Arif, J., Khan, M. A., Ghaleb, B., Ahmad, J., Munir, A., Rashid, U., & Al-Dubai, A.Y. (2022). A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access, 10, 12966–12982. https://doi.org/10.1109/ACCESS.2022.3146792
  • Barik, K., Misra, S., & Fernandez-Sanz, L. (2024). Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network. International Journal of Information Security, 23, 2353–2376. https://doi.org/10.1007/s10207-024-00844-w
  • Barik, K., Misra, S., Konar, K., Fernandez-Sanz, L., & Koyuncu, M. (2022). Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study. Applied Artificial Intelligence, 36(1), 2055399. https://doi.org/10.1080/08839514.2022.2055399
  • Barik, K., Misra, S., Ray, A. K., & Shukla, A. (2023). A blockchain-based evaluation approach to analyse customer satisfaction using AI techniques. Heliyon, 9(6), e16766. https://doi.org/10.1016/j.heliyon.2023.e16766
  • Benoit, G., Raguideau, S., James, R., Phillippy, A. M., Chikhi, R., & Quince, C. (2024). High-quality metagenome assembly from long accurate reads with metaMDBG. Nature Biotechnology, 1–6. https://doi.org/10.1038/s41587-023-01983-6
  • Ben Slimane, N., Aouf, N., Bouallegue, K., & Machhout, M. (2018). A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multimedia Tools and Applications, 77(23), 30993–31019. https://doi.org/10.1007/s11042-018-6145-8
  • Chai, X., Fu, J., Gan, Z., Lu, Y., & Zhang, Y. (2022). An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dynamics, 108(3), 2671–2704. https://doi.org/10.1007/s11071-022-07328-3
  • Chowdhary, C. L., Patel, P. V., Kathrotia, K. J., Attique, M., Perumal, K., & Ijaz, M. F. (2020). Analytical Study of Hybrid Techniques for Image Encryption and Decryption. Sensors, 20(18), 5162. https://doi.org/10.3390/s20185162
  • Cun, Q., Tong, X., Wang, Z., & Zhang, M. (2023). A new chaotic image encryption algorithm based on dynamic DNA coding and RNA computing. The Visual Computer, 39(12), 6589–6608. https://doi.org/10.1007/s00371-022-02750-5
  • Daoui, A., Yamni, M., Karmouni, H., Sayyouri, M., Qjidaa, H., Ahmad, M., & Abd El-Latif, A. A. (2022). Biomedical Multimedia Encryption by Fractional-Order Meixner Polynomials Map and Quaternion Fractional-Order Meixner Moments. IEEE Access, 10, 102599–102617. https://doi.org/10.1109/ACCESS.2022.3203067
  • El-Shafai, W., Almomani, I., Ara, A., & Alkhayer, A. (2023). An optical-based encryption and authentication algorithm for color and grayscale medical images. Multimedia Tools and Applications, 82(15), 23735–23770. https://doi.org/10.1007/s11042-022-14093-3
  • El Azzaoui, A., Sharma, P. K., & Park, J. H. (2022). Blockchain-based delegated Quantum Cloud architecture for medical big data security. Journal of Network and Computer Applications, 198, 103304. https://doi.org/10.1016/j.jnca.2021.103304
  • Elkandoz, M. T., & Alexan, W. (2022). Image encryption based on a combination of multiple chaotic maps. Multimedia Tools and Applications, 81(18), 25497–25518. https://doi.org/10.1007/s11042-022-12595-8
  • Elmoasry, A., Khan, L. S., Khan, M., & Hussain, I. (2022). A dual layer security scheme for medical images using Hessenberg and singular value decompositions. Multimedia Tools and Applications, 81(10), 14001–14022. https://doi.org/10.1007/s11042-022-12480-4
  • Feng, W., Zhang, J., Chen, Y., Qin, Z., Zhang, Y., Ahmad, M., & Woźniak, M. (2024). Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Systems with Applications, 246, 123190. https://doi.org/10.1016/j.eswa.2024.123190
  • Gadde, S., Amutharaj, J., & Usha, S. (2023). A security model to protect the isolation of medical data in the cloud using hybrid cryptography. Journal of Information Security and Applications, 73, 103412. https://doi.org/10.1016/j.jisa.2022.103412
  • Gao, X., Mou, J., Banerjee, S., & Zhang, Y. (2023). Color-Gray Multi-Image Hybrid Compression–Encryption Scheme Based on BP Neural Network and Knight Tour. IEEE Transactions on Cybernetics, 53(8), 5037–5047. https://doi.org/10.1109/TCYB.2023.3267785
  • Ghorbani, A., Saberikamarposhti, M., & Yadollahi, M. (2022). Using Ribonucleic acid (RNA) and Hénon map in new image encryption scheme. Optik, 259, 168961. https://doi.org/10.1016/j.ijleo.2022.168961
  • Gull, S., & Parah, S. A. (2024). Advances in medical image watermarking: a state of the art review. Multimedia Tools and Applications, 83(1), 1407–1447. https://doi.org/10.1007/s11042-023-15396-9
  • Guo, W., Wang, Y., Chen, X., & Jiang, P. (2024). Federated transfer learning for auxiliary classifier generative adversarial networks: framework and industrial application. Journal of Intelligent Manufacturing, 35(4), 1439–1454. https://doi.org/10.1007/s10845-023-02126-z
  • Gupta, M., Singh, V. P., Gupta, K. K., & Shukla, P. K. (2023). An efficient image encryption technique based on two-level security for internet of things. Multimedia Tools and Applications, 82(4), 5091–5111. https://doi.org/10.1007/s11042-022-12169-8
  • Güvenoğlu, E. (2024). An image encryption algorithm based on multi-layered chaotic maps and its security analysis. Connection Science, 36(1), 2312108. https://doi.org/10.1080/09540091.2024.2312108
  • Hadj Brahim, A., Ali Pacha, A., & Hadj Said, N. (2024). An image encryption scheme based on a modified AES algorithm by using a variable S-box. Journal of Optics, 53(2), 1170–1185. https://doi.org/10.1007/s12596-023-01232-8
  • Hafsa, A., Fradi, M., Sghaier, A., Malek, J., & Machhout, M. (2022). Real-time video security system using chaos- improved advanced encryption standard (IAES). Multimedia Tools and Applications, 81(2), 2275–2298. https://doi.org/10.1007/s11042-021-11668-4
  • Hasan, M. K., Islam, S., Sulaiman, R., Khan, S., Hashim, A. H. A., Habib, S., Islam, M., Alyahya, S., Ahmed, M. M., Kamil, S., & Hassan, M. A. (2021). Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications. IEEE Access, 9, 47731–47742. https://doi.org/10.1109/ACCESS.2021.3061710
  • Herbadji, D., Herbadji, A., Haddad, I., Kahia, H., Belmeguenai, A., & Derouiche, N. (2024). An enhanced logistic chaotic map based tweakable speech encryption algorithm. Integration (tokyo, Japan), 97, 102192. https://doi.org/10.1016/j.vlsi.2024.102192
  • Huang, X., Dong, Y., Zhu, H., & Ye, G. (2022). Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image. Alexandria Engineering Journal, 61(10), 7637–7647. https://doi.org/10.1016/j.aej.2022.01.015
  • Inam, S., Kanwal, S., Firdous, R., & Hajjej, F. (2024). Blockchain based medical image encryption using Arnold’s cat map in a cloud environment. Scientific Reports, 14(1), 5678. https://doi.org/10.1038/s41598-024-56364-z
  • Jiang, D., Tsafack, N., Boulila, W., Ahmad, J., & Barba-Franco, J. J. (2024). ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption. Expert Systems with Applications, 236, 121378. https://doi.org/10.1016/j.eswa.2023.121378
  • John, S., & Kumar, S. N. (2023). IoT based medical image encryption using linear feedback shift register – Towards ensuring security for teleradiology applications. Measurement: Sensors, 25, 100676. https://doi.org/10.1016/j.measen.2023.100676
  • Kiran, P., & Parameshachari, B. D. (2022). Resource Optimized Selective Image Encryption of Medical Images Using Multiple Chaotic Systems. Microprocessors and Microsystems, 91, 104546. https://doi.org/10.1016/j.micpro.2022.104546
  • Lin, C.-H., Lai, H.-Y., Huang, P.-T., Chen, P.-Y., Pai, N.-S., & Zhang, F.-Z. (2024). Combining Riemann–Lebesgue-Based Key Generator and Machine-Learning-Based Intelligent Encryption Scheme for IoMT Images Infosecurity. IEEE Internet of Things Journal, 11(1), 1344–1360. https://doi.org/10.1109/JIOT.2023.3288678
  • Lin, C.-C., Wang, P.-Y., Lin, Y.-H., Huang, H.-C., & Saberikamposhti, M. (2023). Visible Watermark Removal with Deep Learning Technology. In 2023 Sixth International Symposium on Computer, Consumer and Control (IS3C) (pp. 186–189). IEEE. https://doi.org/10.1109/IS3C57901.2023.00057.
  • Man, Z., Li, J., Di, X., Sheng, Y., & Liu, Z. (2021). Double image encryption algorithm based on neural network and chaos. Chaos, Solitons & Fractals, 152, 111318. https://doi.org/10.1016/j.chaos.2021.111318
  • Mansoor, S., & Parah, S. A. (2023). HAIE: a hybrid adaptive image encryption algorithm using Chaos and DNA computing. Multimedia Tools and Applications, 82(19), 28769–28796. https://doi.org/10.1007/s11042-023-14542-7
  • Mehta, D., Jha, M., Suhagiya, H., & Mangrulkar, R. (2024). DieRoll: A Unique Key Generation and Encryption Technique. Journal of Applied Security Research, 19(2), 168–195. https://doi.org/10.1080/19361610.2022.2124589
  • Nadhan, A. S., & Jeena Jacob, I. (2024). Enhancing healthcare security in the digital era: Safeguarding medical images with lightweight cryptographic techniques in IoT healthcare applications. Biomedical Signal Processing and Control, 88, 105511. https://doi.org/10.1016/j.bspc.2023.105511
  • Nagarajan, S. M., Deverajan, G. G., Kumaran, U., Thirunavukkarasan, M., Alshehri, M. D., & Alkhalaf, S. (2022). Secure Data Transmission in Internet of Medical Things Using RES-256 Algorithm. IEEE Transactions on Industrial Informatics, 18(12), 8876–8884. https://doi.org/10.1109/TII.2021.3126119
  • Nampalle, K. B., Manhas, S., & Raman, B. (2023). Medical image security and authenticity via dual encryption. Applied Intelligence, 53(17), 20647–20659. https://doi.org/10.1007/s10489-023-04550-3
  • Patel, S., & Thanikaiselvan, V. (2023). Latin Square and Machine Learning Techniques Combined Algorithm for Image Encryption. Circuits, Systems, and Signal Processing, 42(11), 6829–6853. https://doi.org/10.1007/s00034-023-02427-x
  • Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617–624. https://doi.org/10.1016/j.procs.2016.02.108
  • Pourasad, Y., Ranjbarzadeh, R., & Mardani, A. (2021). A New Algorithm for Digital Image Encryption Based on Chaos Theory. Entropy, 23(3), 341. https://doi.org/10.3390/e23030341
  • Pourjabbar Kari, A., Habibizad Navin, A., Bidgoli, A. M., & Mirnia, M. (2021). A new image encryption scheme based on hybrid chaotic maps. Multimedia Tools and Applications, 80(2), 2753–2772. https://doi.org/10.1007/s11042-020-09648-1
  • Rahman, M., Murmu, A., Kumar, P., Moparthi, N. R., & Namasudra, S. (2024). A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems. Journal of Information Security and Applications, 80, 103677. https://doi.org/10.1016/j.jisa.2023.103677
  • Rakheja, P., & Khurana, M. (2023). Multiple iris image encryption using phase retrieval mask, QZ algorithm and umbrella map in hybrid transform domain. Optical and Quantum Electronics, 55(10), 878. https://doi.org/10.1007/s11082-023-05131-x
  • Randive, K., Mohan, R., & Sivakrishna, A. M. (2023). An efficient pattern-based approach for insider threat classification using the image-based feature representation. Journal of Information Security and Applications, 73, 103434. https://doi.org/10.1016/j.jisa.2023.103434
  • Sahlabadi, M., Saberikamarposhti, M., Muniyandi, R. C., & Shukur, Z. (Oct. 2022). Using Cycling 3D Chaotic Map and DNA Sequences for Introducing a Novel Algorithm for Color Image Encryption. In 2022 International Conference on Cyber Resilience (ICCR) (pp. 1–7). IEEE.
  • Sarosh, P., Parah, S. A., Malik, B. A., Hijji, M., & Muhammad, K. (2023). Real-Time Medical Data Security Solution for Smart Healthcare. IEEE Transactions on Industrial Informatics, 19(7), 8137–8147. https://doi.org/10.1109/TII.2022.3217039
  • Singh, K. N., & Singh, A. K. (2022). Towards Integrating Image Encryption with Compression: A Survey. ACM Transactions on Multimedia Computing, Communications, and Applications, 18(3), 1–21. https://doi.org/10.1145/3498342
  • Singh, C. E. J., & Sunitha, C. A. (2022). Chaotic and Paillier secure image data sharing based on blockchain and cloud security. Expert Systems with Applications, 198, 116874. https://doi.org/10.1016/j.eswa.2022.116874
  • Soppari, K., & Chandra, N. S. (2023). Automated digital image watermarking based on multi-objective hybrid meta-heuristic-based clustering approach. International Journal of Intelligent Robotics and Applications, 7(1), 164–189. https://doi.org/10.1007/s41315-022-00241-3
  • Toktas, A., Erkan, U., Gao, S., & Pak, C. (2024). A robust bit-level image encryption based on Bessel map. Applied Mathematics and Computation, 462, 128340. https://doi.org/10.1016/j.amc.2023.128340
  • Ullah, S., Zheng, J., Din, N., Hussain, M. T., Ullah, F., & Yousaf, M. (2023). Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey. Computer Science Review, 47, 100530. https://doi.org/10.1016/j.cosrev.2022.100530
  • Vandic, D., Nederstigt, L. J., Frasincar, F., Kaymak, U., & Ido, E. (2024). A framework for approximate product search using faceted navigation and user preference ranking. Data & Knowledge Engineering, 149, 102241. https://doi.org/10.1016/j.datak.2023.102241
  • Veera, D., Mangrulkar, R., Bhadane, C., Bhowmick, K., & Chavan, P. (2024). Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption. Journal of Information and Telecommunication, 8(2), 280–300. https://doi.org/10.1080/24751839.2023.2285549
  • Wen, H., Lin, Y., Yang, L., & Chen, R. (2024). Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos. Expert Systems with Applications, 250, 123748. https://doi.org/10.1016/j.eswa.2024.123748
  • Xie, H., Zhang, Y., Zhang, H., & Li, Z. (2023). Novel medical image cryptogram technology based on segmentation and DNA encoding. Multimedia Tools and Applications, 82(18), 27593–27613. https://doi.org/10.1007/s11042-023-14546-3
  • Yang, F., Mou, J., Sun, K., & Chu, R. (2020). Lossless image compression-encryption algorithm based on BP neural network and chaotic system. Multimedia Tools and Applications, 79(27–28), 19963–19992. https://doi.org/10.1007/s11042-020-08821-w
  • Yu, C., Zhang, X., Qin, C., & Tang, Z. (2023). Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding. IEEE Transactions on Circuits and Systems for Video Technology, 33(11), 6443–6458. https://doi.org/10.1109/TCSVT.2023.3270882
  • Yuan, Y., He, H., Chen, F., & Qu, L. (2024). On the security of JPEG image encryption with RS pairs permutation. Journal of Information Security and Applications, 82, 103722. https://doi.org/10.1016/j.jisa.2024.103722
  • Zhang, B., Rahmatullah, B., Wang, S. L., Zaidan, A. A., Zaidan, B. B., & Liu, P. (2023). A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations. Multimedia Tools and Applications, 82(14), 21867–21906. https://doi.org/10.1007/s11042-020-09629-4
  • Zhou, W., Gao, S., Zhang, L., & Lou, X. (2020). Histogram of Oriented Gradients Feature Extraction From Raw Bayer Pattern Images. IEEE Transactions on Circuits and Systems II: Express Briefs, 67(5), 946–950. https://doi.org/10.1109/TCSII.2020.2980557
  • Zhu, S., Deng, X., Zhang, W., & Zhu, C. (2023). Secure image encryption scheme based on a new robust chaotic map and strong S-box. Mathematics and Computers in Simulation, 207, 322–346. https://doi.org/10.1016/j.matcom.2022.12.025