a secure medical image transmission scheme aided by
TRANSCRIPT
Journal of Information Security and Applications 59 (2021) 102832
A2
ArTD
A
KQTCME
1
ncsamaXsmFdt
1
tsms
h
Contents lists available at ScienceDirect
Journal of Information Security and Applications
journal homepage: www.elsevier.com/locate/jisa
secure medical image transmission scheme aided by quantumepresentation. Janani, M. Brindha β
epartment of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, India
R T I C L E I N F O
eywords:uantumelemedicinehaosedical image
ncryption
A B S T R A C T
Quantum information and quantum image processing have made immense progress in the most recent years.The proposed paper investigates the proficiency of quantum image encryption in the field of Telehealthwhich can be built by incorporating quantum block-based spatial transformations. The proposed quantumcryptosystem introduced two levels of security for medical image and its sensitive content. The secrecy ofmedical image is reinforced by choosing a plain image based initial seed values for encryption. It is foundthat the suggested quantum block-based scrambling can serve as a novel method for intensifying the privacy-preserving process of medical image. It additionally ensures the medical image integrity by introducingdedicated quantum encryption for ROI based regional data. With a bilateral image transmission perspective,the proposed paper introduced InterPlanetary Features based file system for proficient retrieval of medicalimages. The quantitative simulation and performance evaluation done on the Cancer Imaging Archive datasetmanifests that the suggested quantum-based two-level security for medical images is suitable for reinforcing theconfidentiality and privacy-preserving process. It also enlarges the effectiveness of quantum image processingapplications in Telemedicine.
. Introduction
Medicinal services and Information Technology have recently fasci-ated a lot of works in an affiliated manner which results in numeroushanges in the medicinal domain. Telehealth is a data-centric clinicalpace where an immense amount of information is generated andccessed in a distributed cloud as a standard approach. In Telehealth,edical image processing is the predominant task where the treating
nd diagnosing of diseases can be done by sharing the images of-ray, CT scan, MRIs and so on. Meanwhile, this ease of transmis-ion increases data privacy and security issues as patient informationoves around a distributed environment for storage and processing.
or guaranteeing the secrecy and authentication of medical imageata, cryptographic techniques are universally accepted in the bilateralransmission environment.
.1. Background of the research
Over the past decades, broad investigations have been carried withhe aspects of secure image transmission and retrieval techniques. Manychemes are proposed for securing the medical image by using chaoticaps at their pixel scrambling and diffusion stage [1β4]. Though these
chemes ensure the randomization in the encryption, it may undergo
β Corresponding author.E-mail addresses: [email protected] (T. Janani), [email protected] (M. Brindha).
classical attacks due to their fixed secret keys. To attain a secure andefficient keystream, Xingyuan W. et al. [5] proposed an LL compoundchaos and ZigZag transform-based image encryption algorithm. Here,the advanced ZigZag transform and Lu system are jointly utilized forscrambling the input image whereas the composite chaotic system isused at the diffusion stage. The image sensitivity depends on localpixels which leads to minimal global entropy measures. Also, manyone-time key based encryption schemes [6β8] are introduced for ensur-ing the resistance towards cryptanalytic attacks. H. Liu [6] presenteda one-time-key cryptosystem using chaotic maps. For generating ran-dom sequences, author utilized MD5 based initial conditions and TrueRandom Number Generator. Although the scheme has a very good keyspace using a low dimension chaotic map, it requires a large numberof iterations for ensuring the divergence of the chaotic map.
Similarly, Mohamed Boussif [9] presented an adaptive block key forencrypting the medical image. Hua Z et al. [10] suggested high-speedpixel shuffling and adaptive diffusion-based medical image encryp-tion by inserting random data into image for shuffling process. Thereversible process is very tedious as it may lead to data loss duringthe image compression stage. B Abd-El-Atty [11] suggested Logistic-Chebyshev map based S-box and pseudo-random number generator forimage encryption. By executing the combinational 1-D chaotic map, the
vailable online 26 April 2021214-2126/Β© 2021 Elsevier Ltd. All rights reserved.
ttps://doi.org/10.1016/j.jisa.2021.102832
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
csqc
1
aefitqfuacasaai
spdceea
sEuscdpctgsTetrpafmhsmWmcfTd
author generated a key image K for performing XOR operation over theoriginal image. However, the scheme exhibits minimal UACI value thanthe proposed image encryption method.
To achieve high correlation on cipher images, many schemes areproposed for spatial permutation using high dimensional chaotic map[12β15]. Chen X. et al. [13] suggested an adaptive medical imageprocessing depending on multiple chaotic mappings like logistic sineand hyper chaos. Boriga R et al. [14] presented a unique hyper-chaotic map using parametric conditions of the serpentine curve. HLiu suggested a bit-level permutation for encrypting the image basedon PWLCM and Chen chaotic system [15]. Also, [16] presented animage encryption scheme by utilizing DNA complementary rule andchaotic map. The row and column permutation are carried out byusing PWLCM and the resultant permuted image is encoded basedon DNA complementary rule. Also, the initial conditions are basedon applying MD5 over the input image. Similarly, [17] introduced aperceptron model-based image encryption scheme. But these methodsresults in a minimum Number of Pixel change Rate say 99.58, 99.5376,76% [15β17] respectively also it has low key space when comparedto the proposed quantum-based medical image encryptionβs NPCR andkey space value. X Y Wang [18] suggested a DNA sequence operationbased image encryption scheme. The scheme also utilized coupled maplattice for generating pseudo-random sequence which is later XOR-edwith the plain image in a bit-wise manner. To enhance the securitylevel, the author utilized DNA matrix-based initial conditions for it-erating a chaotic map. Also to resist the chosen-plaintext attack, [19]introduced a parallel image encryption algorithm using DNA encoding.The pixel reformations are performed with the help of random sequencegenerates by spatiotemporal chaos system.
There are also some data hiding methods were introduced for pro-tecting the medical image sensitive data [20β22]. Parah, S. A et al. [20]recommended a high range reversible data hiding method for telehealthapplication. S. Das et al. [21] proposes a classical image watermarkingtechnique using an ROI-lossless fragile technique. If the image hastampered, at that point it is unfeasible to recover the input imageor sensitive data as there is no dedicated function for recovering theleaked data. Murali, P et al. [22] introduced copyright protectionscheme for images which are outsourced in the third party database.Author ensures the prevention of unauthorized distribution of theimages. Bouslimi, D et al. [23] suggested a hybrid encryption or water-marking scheme for preserving medical images. The time complexity ishuge as it involves encrypting the watermarked image. Elhoseny, M.,et al. [24] suggested a model for securing diagnostic data in the medicalimage by using steganography and hybrid encryption methods.
To optimize the efficiency of image encryption and to minimize thecomputational cost, X. Wang [25] recently presented a fast image en-cryption algorithm by combining cyclic shift and sorting operation forpixel permutation. The author introduced parallelism in the diffusionphase and achieved good randomness however the scheme exhibits lesskey space when compared to the proposed system which leads to thebrute force attack. Dridi, M. et al. [26] recommended an image encryp-tion method which depends on combined chaotic and neural networks.The complete image pixels are XORed with the chaotic keystream forshuffling and neural network model is applied for diffusion. Later,X. Wang [27] presented a study about the application of matrix Semi-Tensor Product for parallel updation of Boolean network encryption.Instead of using XOR operations during the diffusion phase, the authorutilized different size of plaintext matrix to perform diffusion operation.Similarly, [28] suggested the Boolean network-based compound secretkey generation for the image encryption process. The scheme achievesgood security metrics by using semi-tensor products in the Booleannetwork. Yet it possesses minimal NPCR and UACI rate.
By utilizing the parallelism and network model, the algorithm ex-hibits better security metrics, but it might be vulnerable to cryptan-alytic attack using high computation machines. With the agile im-
2
provement of calculations and the emergence of high computational i
workstations, the security of classical cryptography undergoes severechallenges like Shor factorizing algorithm which is the major threatfor classical cryptosystems. Also, the introduction of Grover quantumsearch algorithm proved the powerfulness of quantum computing byreducing the complexity to π(
β
π). This evident the possibility ofracking classical cryptography using quantum machines. Indeed, well-tructured security systems as listed in the literature might undergouantum attack hence it is necessary to introduce a quantum resistryptography technique to image security.
.2. Previous related works on quantum cryptography and image retrieval
Recently, researchers have begun exploring the quantum-based im-ge encryption methods for processing the sensitive data in a secure andfficient manner and as a result, efficient quantum chaos is introducedor image security [29β32]. To achieve high-security metrics on colormage, Liu X. et al. [33] proposed a qubit rotation basis for encryptinghe color images. The quantum converted image is randomly rotateduantum Fourier transform is applied for encrypting the image in therequency domain. Liu, H et al. [34] suggested color image encryptionsing quantum chaos. To improve the secrecy of color image, theuthor utilized a two-dimensional logistic map and nearest neighboringoupled map. Similarly, XH Song [35] proposed restricted geometricnd color transformations for scrambling the quantum image pixel po-itions. The encryption scheme depends on neighbor pixels, swappingnd rotation angles. Though the encryption is performed in both spatialnd frequency domains which gives a better security result, this schemes applicable only for adjacent level qubit permutation.
For better pixel shuffling in quantum image, Liu X. et al. [36]uggested quantum image security by considering inter and intra bitermutation using logistic map. For medical image applications, Hei-ari, S., [37] suggested selective encryption for medical images. Authoronsiders visually important area alone in the image and performsncryption on the same. Author claimed better time complexity as itncrypts the important region alone, it may lead to chosen ciphertextttack.
For establishing the non-linear dynamic behavior in secret key manychemes are proposed based on Quantum Walks [38β43]. AA Abdl-Latiff [38] presented a lightweight image encryption scheme bytilizing quantum walks as a random key generator. The suggestedcheme uses quantum walks to construct permutation boxes for pixelonfusion phase and PRNGs for the diffusion phase. However, theiffusion mechanism is invariant to plain text which may lead to chosenlaintext attack. AA Abd el-Latiff [39] introduced quantum walks andhaotic inducement-based substitution box (S-box) construction andhey also suggested a bit-level cascaded quantum walk protocol forenerating pseudo-random numbers. Similarly, B Abd-El-Atty [40] pre-ented a one-particle quantum walk-based quantum image encryption.he randomness of quantum walks on a circle is utilized for the key gen-ration process. Later the controlled not operation is introduced overhe quantum image. However, these scheme exhibits a pixel changeate of 99.6% and 99.58% respectively which is less compared to theroposed scheme. To achieve high resistance towards the differentialttack [41β43] utilized controlled alternate quantum walks (CAQW)or information security in the healthcare domain. The encryptionechanism in [43] depends on the controlled quantum walk whichas two sorts of key parameters: one for permutation and another forubstitution. Though it shows better computation speed, it possessesinimal NPCR and randomness when compared to proposed system.ith the popularity of quantum-based image processing and its securityeasures, there exists some video encryption by adopting quantum
ryptography. Song X.H et al. [44] proposed an encryption techniqueor videos by utilizing controlled XOR operations and logistic map.he system provides better results for each frame and the complexityepends on the frames. For hiding the sensitive data in quantum
mage, Abd EL-Latif et al. [45] introduced a quantum informationJournal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
HπpsaLk
2
a
wtfR
2
iaπisigi
|
wF
hiding technique such as quantum steganography in telehealth forconcealing the secret data over the cover image. However, these bit-based embedding causes some pixel value changes in the cover imagewhich may lead to guessing of the location of the watermark in theimage. In a telehealth environment, images are circulated over dis-tributed environment where user can upload and retrieve the images fordiagnosing or consultation. Though there are efficient image encryptionschemes which are listed in literature study, only few work has beencarried out for secure and efficient retrieval. In order to retrieve theimages efficiently from the cloud storage, the first searchable encryp-tion was found by D. X. Song et al. [46]. With this continuation,many research work states about the efficient image retrieval from thecloud without disturbing the confidentiality of the images. Notably,C. Chang et al. [47] recommended a similar index for retrieving theencrypted data by computing the hash value. The existing searchabletechniques are mostly centralized and suffers a single point of failureand additionally it consumes lot of time for searching the data.
By witnessing the above literature, the major problems in Telehealthenvironment and classical cryptography systems are: (i) Medical imageconfidentiality without loss of quality (ii) Preserving the trustworthi-ness of medical imageβs sensitive data i.e. Region of Interest data (iii)Efficient retrieval without decrypting the medical image in a distributedenvironment. (iv) Quantum resists cryptography scheme (v) differentialattacks (vi) Robustness of secret key
1.3. Motivations of the research
In a Telehealth environment, medical images can be transmitted toany medical laboratories, medical practitioner, or specialist for con-sultation or referral cases. Generally, in a Telemedicine environment,image uploading and retrieval are the two crucial tasks because themedical image which is used for online consultation is very sensitive innature and thus strict security measures should be taken for preservingthese images. Also, it should guarantee the efficient and secure retrievalof the medical image to the query user. From these observations, it isclear that there are three factors to be analyzed for any medical imagetransmission method. (i) Privacy-preserving medical image (ii) Integrityof Region of Interest (tumor, injured area, MRI impression) of a medicalimage and (iii) secure retrieval of image for diagnosing. Many researchworks had been carried out for securing the medical image undercloud-based transmission but unfortunately, these works are focusedon image confidentiality alone and not on the trustworthiness of ROIdata and secure retrieval. Also, few shortcomings are reported suchas computational overhead, resistance towards quantum cryptanalyticattacks, and adaptative behavior. So, this research work aims to de-velop a quantum resist secure medical image transmission scheme inwhich (i) medical images are encrypted using quantum cryptography(ii) the trustworthiness of the ROI data is preserved by introducinga dedicated ROI encryption phase (iii) Secure retrieval is achievedby incorporating InterPlanetary image Feature fie System where themedical image features are extracted and stored as a hashed values andlater it is compared with user query image features. In other words, themain objective of the proposed scheme is to incorporate two levels ofmedical image security by utilizing basic quantum gates. To achievethis, a novel quantum block-based image scrambling is suggested forwhole medical image and one-time pad encryption is proposed for ROIregional data. Thus, the principle contributions of the proposed paperare listed below:
1. The confidentiality of the medical image is preserved by intro-ducing efficient block-based quantum image encryption usingquantum spatial transformations.
2. Plain image based secret keys are employed for encrypting med-ical images to further enhance the security level.
3. The proposed system ensures the secrecy of ROI separately byencrypting the ROI boundary box value using quantum one-time
3
pad encryption. c
4. InterPlanetary Image Features file system is realized for efficientbilateral image transmission and retrieval under a distributedenvironment.
5. The proposed system guarantees both the secrecy and trustwor-thiness of the medical images in the telehealth environment.
The rest of this paper is organized as follows. Section 2 gives the prelim-inary work behind the proposed system. Section 3 discusses about theproposed encryption framework and the experimental analysis of theproposed system are carried out in Section 4. The comparison of theproposed methodology with state-of art methods are listed in Section 5and Section 6 concludes the paper.
2. Preliminaries
The preliminary knowledge of the proposed framework includesthe procedure involved in conventional system, quantum image rep-resentation and security threat model of the proposed system and thefundamental background of chaotic encryption scheme.
2.1. Hyper chaotic map
The proposed quantum encryption scheme utilizes chaotic mapsfor generating random sequences for permutation and diffusion. Ahyperchaotic system is a chaotic system with more than one posi-tive Lyapunov exponent which results high randomness on the space.Lorenzβs hyper chaotic system is defined as
β§
βͺ
βͺ
β¨
βͺ
βͺ
β©
πβ² = π(π0 βπ0) + πΏ0
π β² = π0(π βπ0) β π0πβ² = (π0 β π0) β (πΌ β π0)πΏβ² = β(π0 β π0) + (π β πΏ0)
(1)
ere πβ², π β², πβ², πΏβ² are the time derivatives of the state variable0, π0, π0, πΏ0 with π, π, πΌ as the system parameters and π is the controlarameter. Hyper Lorenz chaotic system is more complex and theequences are unpredictable, which results in strong resistance againstdaptive argument synchronization attack. Each iteration of the hyperorenz produces four stochastic sequences which will act as a randomey stream for permutation process.
.2. Arnold map
The generalized two-dimensional Arnold chaotic map is expresseds(
πβ²
πβ²
)
=(
1 ππ 1 + ππ
)(
ππ
)
mod π (2)
here, π is the size of the image, π and π are the control parame-ers. The Arnold chaotic map is used to create a quantum key imageor diffusion process by converting it into Novel Enhanced Quantumepresentation.
.3. Novel Enhanced Quantum Representation (NEQR)
NEQR is the quantum grayscale representation where the originalmage pixel values are converted into their respective binary numbersnd undergoes series of quantum operations. The first step is to prepare+ 2π qubits, where π is the image size and the quantum gates are
nitialized with all zeros and identity gate is applied over it. The nexttep is to introduce the Hadamard gate for all the pixel coordinates. Themage of size π Γπ is converted into π qubits where π is the range ofrayscale. For a grayscale image πΌ , the quantum representation NEQRs
πΌβ© = 12π
2πβ1β
π¦=0
2πβ1β
π₯=0|π (π¦, π₯)β©|π πβ© (3)
here |π (π¦, π₯)β© is the pixel value and |π πβ© is the pixel position value.or each pixel, π + 2π binary sequence is generated from the quantumircuit.
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
Fig. 1. Traditional system.
2.4. Conventional telehealth architecture
Fig. 1 shows the basic workflow of conventional Telehealth wherethe patients can remotely access the medicinal services like consulta-tion, diagnosis, etc., from the physician. Also, Telehealth allows thephysician to avail expertsβ opinions for their patients from differenthealthcare centers by sharing the medicinal reports. In conventionalsystems, patients or hospital jurisdiction can share the reports like datafiles or images of CT-scans, X-rays etc., to other parties by uploadingit to the distributed platform. In this circumstance, the physician coulddiagnose the diseases remotely but it is open to numerous security risks.The primary risk factor in the conventional system is data privacy.Even though the image owner outsource the encrypted data to thedistributed platform there is a gateway for intruders who can steal thesesensitive data. Also, at the time of retrieval, the traditional system mayexhibit single point searchable failure as the images are uploaded tothe third-party database.
2.5. Security threat model
The conventional system solely depends on a third party databaseand it is assumed to be a trusted party. The medical images areuploaded in encrypted form and all computations like searching similarimages, validating the integrity are done in the encrypted images whichwill increase the computational overload. Also, the medical images mayexhibit two parts: Region of Interest (ROI) and Non-Region of Interest(NROI). The ROI region contains the most sensitive information, so itis necessary to preserve the image and as well as there is a requirementof additional protective shield for ROI.
3. Proposed architecture
To address the privacy issues in the conventional method, theproposed paper utilizes quantum cryptography in the Telehealth plat-form. The proposed framework ensures the data privacy and effectiveretrieval of medical images by introducing quantum block-based imageencryption and distributed InterPlanetary Image Features File systemfor comparing the identical query image features. Fig. 2 depicts theproposed architecture for telehealth. As from Fig. 2, the proposedframework is divided into four stages: 1. Feature extraction 2. Quan-tum medical image encryption, 3. ROI regional data generation andencryption and 4. Medical image retrieval. For secure and efficientmedical image processing, the image features are extracted and storedin the IPFS system. Meanwhile, the plain medical image endures twophases of security: 1. The ROI is extracted from the medical imagewith the help of boundary and the respective regional data is generatedand encrypted using quantum one-time pad encryption technique. 2.The entire plain image is encrypted using a quantum block-basedcryptographic technique. At the time of retrieval, query features arecompared with the stored image features and the image integrity ischecked by validating the regional data.
4
Fig. 2. Proposed architecture.
Fig. 3. Feature extraction.
Table 1Feature bucket table.
S.No Medical image ID Cluster ID
1 π1 π1, π4 π23 π172 π2 π2, π3 π413 π5 π5, π6
3.1. Interplanetary image features file system
The patient or hospital jurisdiction uploads the image to the dis-tributed environment by extracting the plain image features and featuretable is built. The proposed paper utilizes a Histogram of Gradientfeature extractor and these extracted features are stored in a featuretable. The intermediary server computes the features of a similar imageand stores in a single bucket ie., clustered manner Table 1. shows thefeature bucket table. Here, πππ denotes the ππ of the uploaded medicalimage similarly πππ shows the feature of the respective medical image.The entries of the cluster id consist of similar image feature say π1, π4,π23, π17 features which are similar to the medical image π1. At thetime of retrieval, the query result depends on the feature comparisonso it is necessary to preserve the image features as well. The featuresare crucial entries for identifying a similar image and it is stored asplaintext in a cloud server hence it is open for intruders to access it.To overcome this, the proposed paper utilized Interplanetary ImageFeature File System for storing the image features. Fig. 3 shows theproposed workflow of medical image feature extraction. The featurebucket table entries are converted into csv files and these files aredistributed in an IPFS server. The proposed system exhibits a securefeature comparison in the third-party database by utilizing IPFS.
3.2. Block-based quantum medical image encryption
The suggested framework employs quantum cryptography in Tele-health. The image owner/hospital authorities upload the image tothe distributed environment for remote consultation or diagnosis. To
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
Fig. 4. Quantum block-based medical image encryption.
ensure the confidentiality of the outsourced data, the proposed paperintroduces quantum chaos-based image encryption. First, the plainimage based initial seeds are produced and utilized for random keysequence generation process in hyperchaotic Lorenz system. Then, interand intra block permutations are employed for shuffling the pixelpositions. Later, quantum-controlled image is constructed by iteratingthe Arnold chaotic map on original image. Next diffusion is performedby applying Controlled-NOT over quantum permuted and key image.Fig. 4 portrays the proposed quantum block image encryption. Theproposed quantum block image encryption technique undergoes severalsteps and its explicit structure is given in Algorithm 1: Quantum blockimage encryption algorithm.
Algorithm 1: Quantum block image encryptionInput : Original Image πΌ and Qubit key matrix πΎOutput: Encrypted Image πΌππΈππCall Initial_seed_generator ()
Return seed valuesCall Random_keystream_generator ()
Return Qubit keystream matrix πΎConstruct quantum block image πΌπ
|πΌπβ© β ππΈππ [πΌ]Modified input image.
Call Inter and Intra Pixel reformations ()Matrix formations
Return πΌπ π‘π : Perform Spatial transformations on πΌπCall Quantum block Diffusion ()
πΌπ΄π : obtain scrambled image.πΌπ : Obtain key image
Call CNOT.Return encrypted image, πΌππΈππ
3.2.1. Initial seed generationThe proposed framework introduced a dynamic seed (initial con-
dition) generation mechanism related to plain image for ensuring therandomness and sensitivity of proposed quantum cryptosystem. Thework flow of the seed generation is shown in Fig. 5 and Algorithm 2:Initial seed generator dictates the steps involved in it. The proposedInitial_seed_generator () mechanism produces unique seed values foreach image encryption as the procedure is highly related to plain image.
3.2.2. Random key stream generationThe spatial transformations or confusion phase is performed by
generating random sequence from the chaotic map. The proposed
5
Fig. 5. Initial seed generation.
Algorithm 2: Initial Seed GeneratorInput : Plain Image πΌOutput: π0, π0, π0, πΏ0Procure the Plain image πΌ of size π Γπcheck the size of image, dimif πππ = π Γπ then
Divide πΌ into πβ4 blocksfor (π, π)πππβ4 do
Read the pixel at πΌ in a matrix form and compute
π0 =
βπβ4π,π=1 πΌ(π, π)
π
endend
elseDivide πΌ into πβ2 and πβ2 blocks and compute
π0 =
βπβ2π=1
βπβ2π=1 πΌ(π, π)
πend Repeat step 2 and 3 for calculating π0, π0, πΏ0.
framework utilizes high dimensional hyperchaotic Lorenz map for gen-erating random keystream sequence. The high dimensional chaoticframework has more positive Lyapunov exponent which results a gooddynamic characteristic. The Algorithm 3: Random keystream generatorshows that random qubit keystream is generated by utilizing the seedvalues as from Section 3.2.1 and control parameters as π = 10, π =8β3, πΌ = 28 and π = 2. The chaotic characteristics of the adoptedhyperchaotic Lorenz system with chosen initial seeds are given inFig. 6. From the phase portraits given in Fig. 6, it is shown that,the hyperchaotic 4dimensional Lorenz system exhibits the property ofrandomness under the given initial values and it is chosen to design theproposed cryptosystem. Its higher degree of chaotic nature has madeit suitable tool for incorporating secure communication. The chaoticmap is fed with the initial seed values and iterates for π times, for eachiteration it results four chaotic sequence πβ², π β², πβ², πΏβ² and convert itinto integer sequence with the upper bound of 256. Next, the quantumkey streams are generated by converting the values into binary numberswhere qubit β 0, 1 and tensor product is applied to the resultant binaryvalue as
|π₯ β π¦β© = |πΎπ₯1β©, |πΎπ₯2β©...|πΎπ₯πβ©β |πΎπ¦1β©|πΎπ¦2β©|πΎπ¦πβ© (4)
The element π β π will be viewed as a vector in a new vector spacewhich carries the description of the quantum states of the system oftwo sequence. This β operation is called the tensor product. The tensor
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
Fig. 6. Hyperchaotic Lorenz -Chaotic attractor with proposed initial seed when πΌ =(24, 30] (a) projection on x-y-z plane (b) projection on Y-Z-L plane (c) projection onX-Z-L plane, (d) Projection on X-Y-L plane.
product of two sequence yields the key matrix as
ππ’πππ‘πππ¦πππ‘πππ₯ π =β
β
β
β
|πΎπ₯1β©, |πΎπ¦1β© |πΎπ₯1β©, |πΎπ¦2β© .. |πΎπ₯1β©, |πΎπ¦πβ©
.. .. ..|πΎπ₯1β©, |πΎπ¦1β© |πΎπ₯1β©, |πΎπ¦2β© .. |πΎπ₯1β©, |πΎπ¦πβ©
β
β
β
β
(5)
Algorithm 3: Random Keystream GeneratorInput : π0, π0, π0, πΏ0 and control parametersOutput: Qubit key matrix |πβ©1 Set initial seed and control parametersfor π = 0π‘ππ do
Calculate chaotic stream πβ² , π β² , π β² , πΏβ² as
πβ²= π(π0 βπ0) + πΏ0; π
β²= π0(π βπ0) β π0
πβ²= (π0 β π0) β (πΌ β π0); πΏ
β²= β(π0 β π0) + (π β πΏ0)
end2 Generate integer sequence π = (π0)πβ1
π=0 by applying πππ2563 Repeat 2 for remaining chaotic sequences4 Construct qubit key sequence |πΎβ©
Transform entries of integer sequence π, π ,π,πΏ into 8-bitbinary qubits
Apply Tensor product on π, π as in Eq.4Qubit keystream matrix πΎ
3.2.3. Quantum representationThe original image πΌ is converted into quantum Image for importing
the quantum operations on it. The quantum image is prepared usingNovel Enhanced Quantum Representation (NEQR) and it act as a inputimage for proposed quantum block based medical image encryption.The sample image block is shown in Fig. 7. For each pixel value,|πΌβ© = 1
2πβ2πβ1
π¦=0β2πβ1
π₯=0 |π (π¦, π₯)β©|π πβ© is computed and its representationsare shown in Fig. 8.
After this representation, blocks are identified from the quantumimage πΌπ. To achieve high randomness in encryption, the proposedsystem maps the random blocks to the space for performing block-levelspatial transformations.
3.2.4. Inter and intra pixel reformationThe spatial transformations or confusion phase is accompanied by
two steps: inter block scrambling and intra block scrambling. Scram-bling is used to shuffle the pixel values within and among the sub-sequent NEQR blocks. The Algorithm 4: depicts the steps involvedin proposed Inter and Intra pixel reformation phase. The scrambling
6
Fig. 7. Quantum grayscale image block with pixel values.
Fig. 8. Quantum circuit for representation.
operations for inter block permutations are pixel scrambling, qubitrotations, matrix transpose and rowβcolumn shuffling with rotationangle.
Algorithm 4: Inter and Intra pixel reformationsInput : Qubit key matrix |πβ© and Quantum image πΌπOutput: Image πΌπ π‘π// Pixel reformationsfor (π, π) in πΌπ do
Reform the pixel position using |πΎβ©
Obtain πΌππendforeach 2(πβ1) Γ 2(πβ1) sub-blocks in πΌππ do
Map πΌππ for spatial transformations(πΌ(2(πβ1)))ππ β (πΌ(2(πβ1)))β¦
foreach row in πΌππ doPerform πβ2 rotation
endforeach column in πΌππ do
Perform πβ2 rotationendperform (πΌ(2(πβ1)))π βΈ πΌ(2(πβ1))
endReturn πΌπ π‘π
The first step in confusion phase is to scramble the image pixelsaccording to the keystream matrix. The quantum block image is takenas an input and applied in the scrambling procedure. The proposedquantum encryption employs a scrambling procedure with the help of
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
Fig. 9. Swap gate for pixel reformations.
Fig. 10. Qubits rotations.
hyperchaotic sequence. The key sequences generated in Section 3.2.2undergoes quantum tensor product operation β and produce key ma-trix of size π Γ π. According to key matrix in Eq. (5), the quantumimage undergoes pixel reformations. Specifically, the entries (π, π) inπΎ represents the pixel positions of the image. The value in πΎ(π, π)replaced the value at the position (π, π) in the new image. The swapgate π(π,π) for the pixel reformations is shown in Fig. 9. For ensuringmore randomness, the proposed encryption scheme incorporates qubitrotation in the scrambled image matrix. The sample qubit rotations aregiven in Fig. 10 where the qubits are rotated in both row and columnmanner with the rotation of πβ2. Once the qubits are rotated, the pixelmatrix undergoes rowβcolumn shuffling process with the rotation angleof 180β¦ and finally permuted image πΌπ π‘π is obtained by taking transpose.
3.2.5. Quantum block diffusionFor diffusing the pixel values, the quantum key image is generated
by using Arnold chaotic map over the original image. Algorithm 5:Quantum block diffusion gives the steps involved in diffusion process.From NEQR representation, the size of the pixel value is π + 2π whichexhibits the number of key rounds k for Arnold map and thus the baseimage is generated. The obtained base image is converted into thequantum image as given in Section 3 for incorporating the quantumoperations on it. Once the images are converted, controlled β NOTquantum gate is utilized for producing the encrypted image by couplingthe scrambled block image obtained from Section 3.2.4 with a quantumbase image.
3.3. ROI regional data encryption and embedding
To authenticate the trustworthiness of outsourced medical image,the suggested system introduced ROI based regional data encryption.
7
Algorithm 5: Quantum block DiffusionInput : Image πΌπ π‘π and Initial ConditionsOutput: Encrypted Image πΌππΈππ// Key image for diffusionforeach pixel (π, π) in original image do
Iterate Arnold map π rounds obtain πΌπ΄π
Obtain Key image [πΌπ ] β ππΈππ [πΌπ΄π ]endforeach pixel in πΌπ π‘π and [πΌπ ] do
Apply quantum CNOTendπΌππΈππ βΈ reshape πΌππππ‘
Fig. 11. Regional data encryption and embedding.
In medical image processing, Region of Interest (ROI) is the areathat holds more sensitive content say boundaries of a tumor, injuredarea, etc. Thus, preserving the ROI contents is more important in thetelehealth domain. Fig. 11 shows the steps involved in regional dataencryption and embedding. While outsourcing the image, the proposedframework allows the image owner/hospital jurisdiction to mentionthe ROI boundaries for later extraction process. With the specifiedboundary value, the proposed system extracts the ROI and generatesthe stream of pixel difference value called regional data. The regionaldata is generated as
π π = ππ+1,π+1 β π ππ (6)
where, πππ is the pixel values within ROI boundary. In existing methods,regional data is simply embedded with the image for validation. Yetthis is open to intruders who can extract the data and gain knowledgeabout the ROI content from the image. Thus, it is important to encryptthe regional data too. To achieve this, the proposed system utilizesquantum one-time pad encryption for preserving the regional data. Theproposed algorithm for encrypting ROI regional data is given in ROIencryption algorithm. As the algorithm depicts, the regional data isgenerated from the pixel difference and it is converted into qubits.
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
These qubits are entangled and angles are measured and denoted as akey for encryption. After obtaining the key, the proposed paper utilizesquantum-controlled gates over key values and qubits. This yields theencrypted regional data and it is inserted to the RONI region of the en-crypted image. For embedding the encrypted regional data into a coverimage, the proposed paper utilizes reversible watermarking dependingon the standard Integer wavelet transform method (IWT). The imageis subdivided into four parts concerning to ROI i.e., left, right, top andbottom. For each subblock, the lower and higher frequency sub-bandsare identified with the help of IWT. Upon identifying the frequencyband, the regional data is embedded as a reversible watermarkingprotocol. Similarly, frequency bands for other subblocks are identifiedand the complete regional data is embedded in the RONI part.
Algorithm 6: ROI encryptionInput : ROI Regional data π Output: Embedded image with encrypted ROI π πΈππ .// Extract ROIfor ROI boundary values do
Read the pixel valuesif pixel value is not multiples of 3 then
Take pixel from nearby RONIend
end//Regional data generationforeach pixel (π, π) in ROI do
π π = π(π+1,π+1) β πππend//Regional data Encryption
π π ; convert π π into binary qubitsMeasure quantum entangles, ππ among qubits and record it.πΎ βΈ πππ πΈππ = π ππΆπππ‘πΎ
Embeds π πΈππ in lower sub bands
3.4. Medical image retrieval
Medical data uploading and retrieval are two common tasks in theTelemedicine environment. The proposed paper employs the quantumencryption technique as a data preserving strategy while outsourcingsensitive data to the third-party database. Similarly, at the other end ofthe proposed framework, a query user or physician or another healthcare center retrieves a similar image or data by uploading the query.Fig. 12 shows the steps involved in proposed medical image retrievalscheme. In the proposed system, the query user can submit the queryimage to the service provider who can extract the query features andsend them to the IPFS server. The server converts the query featureinto hashed value and compares it with the stored hash values. Uponmatching, the server returns the id of similar images to the serviceprovider which results in the set of similar encrypted images. Aftervalidating the query user, the service provider performs quantum imagedecryption as in Algorithm 7. Once the images are decrypted, theintegrity of medical images are validated by extracting the regionaldata from the image using its boundary value. The same procedureis carried out for generating the new ROI regional data which is inencrypted form. For decrypting the regional data, the server measuresthe qubit entanglement and obtains the key for decrypting the regionaldata. The same process is continued for each qubit i.e., for 8 rotations.After 8 rotations, the decryption process would be carried out wherequery user measures all the qubit encrypted value and record it forobtaining the final value. Hence, for verifying whether the ROI datahas tampered or not, authenticated query users will record each qubitmeasurements in the ROI data and verifies with the original data.
8
Algorithm 7: Medical Image RetrievalInput : Query image ππΌOutput: Original Image πΌPerform feature extraction on query imagecall Interplanetary image features file systemcall Quantum image decryption ()foreach pixels (π, π) in πΌπΈππ do
Iterate Arnold map π roundsGenerate base image , πΌπObtain scrambled imageπΌπ π‘π = πΌππΆπππ‘πΌπΈππ
endforeach 2(πβ1) Γ 2(πβ1) block in πΌπ π‘π do
Perform Inverse spatial transformationObtain normalized quantum image πΌπ
endResult set of similar plain imagesExtract Regional data π β²
πPerform quantum measurement πΌQuantum deciphered π β²
πCompare with actual regional data π π
if (π β²
π = π π ) thenReturn image to user
elseImage altered, notifies user and image owner
After comparison, if the regional data mismatches, then it indicatesthat the ROI has been tampered and notification is sent to the imageowner otherwise the trustworthiness of the image has been preservedand the respective plain image is transmitted to the user.
4. Results and performance discussion of the proposed scheme
On account of the present condition, that the physical quantummachines are not available, the proposed medical image and ROI en-cryption techniques are assessed by utilizing IBM Quantum Experienceand also simulated in a individual workstation with subsequent char-acteristics: MATLAB R 2019a, Windows 10 64-bit, Intel Core i7, withRAM of 16 GB memory. The time and complexity are the importantfactors considered for evaluating the suggested medical image andROI encryption. To examine the proposed method for security androbustness, the simulation is carried out on different medical imagesfrom The Cancer Imaging Archive (TCIA) dataset composing of CT-scanimages, Mammograms, MRI, and X-rays along with additional standardmedical images. Note that, the images are used for the experiment afterresizing it all to 512 Γ 512 pixel gray scale values.
4.1. Performance of medical image encryption
The proposed framework uses TCIA images for simulation. Thesample images are depicted in Fig. 13(a) along with their respectivequantum images in Fig. 13(b). At this stage, quantum image will actas an input for the proposed framework and inter and intra blockpermutations were carried out. The intermediate result of spatial trans-formations is given in Fig. 13(c). Meanwhile, the framework generatesa key image by using quantum chaotic map say Arnold map. The keyimage is utilized for encrypting the medical image and the respectiveencrypted image is presented in Fig. 13(d).
4.1.1. Key space analysisKey space is an important criterion for an efficient encryption
algorithm to resist against exhaustive attack. The brute force attack isdirectly related to the key space hence a desirable encryption scheme
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
Fig. 12. Medical image retrieval.
should possess large key space. The proposed system utilizes fourinitial seed values π0, π0, π0, πΏ0 for pixel reformations with controlparameters π, π, πΌ and π. Also, the proposed scheme exhibits π andπ as an initial condition for diffusion process with control parameter πand π. According to the IEEE floating point standard [26], 10β15 is thecomputational precision of the 64βbit double-precision. By consideringthe computational precision (7), the proposed scheme exhibits a keyspace of 10180 β 2600 which is sufficiently large enough to makeexhaustive attacks infeasible.
πππ¦ = 10(β15)(12) = 10180 β 2600 (7)
4.1.2. Key sensitivity analysisAn ideal encryption scheme is key-sensitive where a small change
in the key will cause a significant change in output [48]. Thus secrecyof the proposed system depends upon initial seeds of the chaotic mapwhich in turn relies on plain image pixel values. Hence the sensitivity ofthe proposed system is tested by changing any one of keystream valuesand maintain others unchanged. The following steps are carried out forperforming key sensitivity analysis.
1. The initial conditions π₯0, π¦0, π§0, π0 are fed into the chaotic systemand iterates up to π times which produce Qubit key matrix |πΎβ©.
2. The original image πΌ is encrypted using Qubit key matrix |πΎβ©
and the resultant image is πΌππΈππ .3. Then, a small deviation as incrementing and decrementing the
keys by 10β15 is given to the proposed encryption scheme andthe respective cipher image are πΌ+ππΈππ and πΌβππΈππ .
4. Also, key values of Arnold cat map a and b is increased by0.00000000010 and utilized for decryption.
5. Now the mathematical analysis for the key sensitivity is per-formed by calculating the difference rate between πΌππΈππ , πΌ+ππΈππ
ππππΌβππΈππ with the help of (8) and the values are tabulated inTable 2.
π·(πΎ) =
βπ₯β1π=0
βπ¦β1π=0 π₯(πΌππΈππ (π, π), πΌ+ππΈππ (π, π)) + π₯(πΌππΈππ (π, π), πΌβππΈππ (π, π))
2 Γ π₯ Γ π¦
Γ 100 (8)
where π₯ and π¦ are the sizes of the image and πΏ(π΄,π΅) be the differencerate of two cipher image π΄ and π΅ which can be determined by thefollowing conditions:
π₯(π΄,π΅) =
{
1; πππ΄(π, π) β π΅(π, π)0; πππ΄(π, π) = π΅(π, π)
(9)
9
Table 2Difference π·(πΎ) under various key values.
Keys Chaotic map Value Increment π·(πΎ)
π₯0 Hyper chaotic Lorenz 6.79925 Γ 10β11 10β15 99.7213π¦0 5.20135 Γ 10β11 10β15 99.7211π§0 2.28982 Γ 10β11 10β15 99.7156π0 0.28915 Γ 10β11 10β15 99.7089π Arnold 0.698315687 10β15 99.7402π 0.227649743 10β15 99.7398
From the table, it is clearly shown that there exists a strong sen-sitivity towards the initial conditions hence a small deviation in thekey values results huge difference rate between ciphered images. Theabove procedure is analyzed visually by taking the plain MRI image andencrypted using the Qubit key matrix using actual initial conditions andmodified initial conditions as shown in Fig. 14. Here, Fig. 14(a) showsthe original medical image and encrypted with the actual key whichresults Fig. 14(b). Fig. 14(c) shows the decrypted image with key valueas π₯0 = 6.79925 Γ 10β11 and Fig. 14(d) shows the decrypted image withkey value as π¦0 = 5.2898210Γβ11. From the figures, it is evident thatkeys with minor changes cannot decrypt the images properly.
4.1.3. Plaintext sensitivity analysisIn addition to key sensitivity, plaintext sensitivity also a significant
criterion to assess the effectiveness of a proposed image encryptionalgorithm. In other words, the encryption scheme should be verysensitive to the plain image in accordance with the one-bit change. Theproposed system uses plain image related keys for encryption i.e., ituses plain image related initial conditions for iterating the chaotic mapwhose resultant sequence is used for pixel confusion phase. Addition-ally, to enhance the security level, the proposed scheme introducesplaintext related key image |πΌπβ© to perform diffusion over a permutedimage. The |πΌπβ© is a quantum representation of input image where one-bit difference causes significant changes in the key image. The plaintextsensitivity is quantitatively evaluated by using NPCR, UACI metric andtheir analysis are given below:
A. Study of differential attack. A wise encryption scheme must resisttowards differential attacks i.e., the recommended scheme needs to beresponsive to the small changes in input image. Generally, two standardevaluation metrics are utilized for analyzing the effect of pixel shiftsin the input image under the encrypted image. By [49], the metricsare number of pixels change rate (NPCR) and unified average changeintensity (UACI) and it is formulated as
πππΆπ =
βπ(π₯=1)
βπ(π¦=1) π·(π₯, π¦)
Γ 100% (10)
(π Γ π)Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
Fig. 13. Proposed Quantum block based encryption(a) plain images, (b) Quantum input images (c) Quantum image spatial transformations and (d) Encrypted image.
where,
π·(π₯, π¦) =
{
0, πππ(π₯,π¦)1 = π(π₯,π¦)21; ππ‘βπππ€ππ π
(11)
here π1 and π2 are the cipher images whose original images are differedby one pixel and π Γ π is size of the image.
UACI is expressed by:
ππ΄πΆπΌ = 1(π Γ π)
β
π₯π¦|π1(π₯, π¦) β π2(π₯, π¦)|
255Γ 100% (12)
The standard CT scan image is considered for examining the perfor-mance of proposed scheme towards differential attacks. The result
10
analysis shows that, the single pixel value difference in plain image ex-hibit 99.78% NPCR and 33.47% UACI which implies that the suggestedscheme is more sensitive to original medical image. Table 3 dictatesNPCR and UACI esteems with different medical images. Also, the secretkey of the proposed quantum block-based encryption technique isrelated to the image itself. Hence the proposed scheme makes a betterperformance for data privacy in telehealth field.
B. Avalanche effect. A better encryption method should result a highlysensitive encrypted image to changes in plain image pixel values. Theproposed framework includes a dedicated module for plain image basedinitial seed generation which results different cipher whenever the
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
Fig. 14. Key sensitivity test. (a) original image, (b) encrypted with correct key (c) decrypted image (d) decrypted image with modified πΎ(π, π), (e) decrypted image with one bitchange in chaotic sequence (f) decrypted image with different π and π.
Table 3NPCR and UACI metrics for proposed encrypted images.
S.No Image NPCR UACI
1 Head CT 99.7852 33.47622 Left arm X-ray 99.7685 33.2013 Chest 99.7793 33.9894 Spine MRI 99.7684 33.3265 Brain MRI tumor 99.7987 33.40216 CT scan breast cancer 99.7889 33.45237 Mammography 1 99.7669 33.4988 Abdomen CT 99.6923 33.39219 Head CT 2 99.6972 33.437610 Brain MRI 2 99.8472 33.442111 Spine MRI - axial 98.8973 33.401212 Left arm X-ray 99.7683 33.39613 X-ray 2 99.7987 33.38714 Coronary calcium scan 1 99.6978 33.49815 Coronary calcium scan 2 99.7834 33.468Average 99.7172 33.4511
Table 4Avalanche effect on proposed quantum encryption scheme.
Plain image trial Modified seed values Difference(pixels altered randomly) (as per plain image) (original and new cipher)
π0 = 6.881371386718753π0 =5.886138916015625
Head CT π0= 6.292657407031252 99.7852πΏ0 = 5.965495489843741
π0 = 7.235677209123315π0 =6.984322096510364
Left arm X-ray π0= 6.6678902655147828 99.7685πΏ0 = 6.225689126729390
π0=8.992367891022001π0 = 8.776923650912674
CT scan breast cancer π0= 6.2378946901120843 99.7889πΏ0=8.001276234560823
plain image gets modified. Table 4 shows the different trials of plainimage with pixel modification and its difference rate.
11
Table 5Information entropy for proposed scheme.
S.No Image Entropy
1 Head CT 7.99682 Left arm X-ray 7.99023 Chest 7.99234 Spine MRI 7.98545 Brain MRI tumor 7.98136 CT scan breast cancer 7.89997 Mammography 1 7.96768 Abdomen CT 7.89759 Head CT 2 7.995810 Brain MRI 2 7.985011 Spine MRI - axial 7.996112 Left arm X-ray 7.996513 X-ray 2 7.996214 Coronary calcium scan 1 7.998315 Coronary calcium scan 2 7.9945Average 7.978227
4.1.4. Randomness test analysisThe proposed scheme is tested for randomness by utilizing infor-
mation entropy metrics. The entropy is the common tool to quantifythe strength of encryption algorithm in a randomness perspective. Theentropy π»(π ) is given by
π»(π) =β
π (ππ)πππ1
π(ππ)(13)
Table 5 shows that the average value of the proposed encryptionmethod and it is nearer to the standard value 8. The above formulaefor Information entropy depict the global randomness. The proposedquantum block-based encryption scheme utilizes inter and intra blockspatial transformation, so it is necessary to measure the randomnesswith respect to local blocks. The local Shannon entropy is given as
π»π,ππ΅ (π) =πβ
π=1
π»(ππ)π
(14)
where, (ππ) are the blocks and ππ΅ is the pixel. The experiment is carriedout with the same set of medical images. The quantum images are split
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
i
Tpiapdite
4
emeifidsno
4
t
Table 6Histogram variances with respect to a secret key of the proposed algorithm.
Test cipher image |πΎβ© |πΎ1β© π π πΌ π
Head CT 261.927 275.236 269.896 247.245 260.298 266.476Left arm 254.326 269.672 259.754 262.964 247.286 244.485
in to 16 blocks and these are examined for local randomness amongthe selected blocks. The average local entropy value for all the blocksin the ciphered head CT image is 7.9024 which is nearer to the standardvalue. This experimental outcome depicts that the proposed quantumblock image encryption method achieves high randomness and secureagainst cryptanalytic attack.
4.1.5. Histogram studyThe image histogram intuitively reflects the dissemination of
grayscale values. To resist the statistical attacks, the cipher imageshould possess uniformity in grayscale distribution. This can be eval-uated with the help of plotting the histograms for the cipher image.Fig. 15 presents the histogram of the input image and the respectiveencrypted image. From the figure, it is clear that the histograms ofthe proposed encrypted images are closely uniform and shows notablechanges from the input image histogram.
Besides, variance analysis is carried out as a quantitative measureof each key with respect to histogram property. The smaller variancevalue indicates the better uniformity of the encrypted image [50]. Thus,the variance of the histogram is analyzed with respect to the change inthe encryption key and it is expressed as
π ππ(π») = 1π2
πβ
π=1
πβ
π=1
(βπ β βπ)2
2(15)
where βπ and βπ represents the number of gray value pixels, m denotesthe total number of gray values and the outcome π» vector set ofhistograms. Table 6 exhibits the variances of the histograms of differentciphered images obtained by the proposed encryption scheme underdifferent secret keys and parameters. The first column represents thevariance values obtained by using the initial key matrix |πΎβ© while thosevariances in the following columns are obtained by changing any oneof the secret parameters. From Table 6, it is clearly shown that thevalues of the variance of cipher images fall under the range of 250β270, which indicates the average fluctuations of the number of pixels ineach gray value are about 14 pixels. However, the quantitative measureof variance for the histogram plain Head CT is 37425.00267 whichis far greater than the variance of cipher image. Hence, the proposedencryption mechanism can withstand any statistical attack.
4.1.6. Chi-square testThe histogram plots provide the visual representation of pixel value
distribution in cipher images whose uniformity demonstrates the effec-tiveness of the proposed encryption scheme towards the statistical at-tack. In addition to visual representation, the chi-square test is utilizedas a quantitative metric for analyzing the uniformity of histograms. Themathematical expression for the Chi-square test is given in (16).
π2 =255β
π=0
(π΄π β ππ)2
ππ(16)
Where, ππ is the predicted frequency of pixel rate on the histogramof a ciphered image which can be obtained by (πΓπ)
256 , where π Γ π
s the size of the test image and π΄π is the actual frequency of pixelvalue π. An encryption scheme is said to be effective if it possessesa less observed chi-square value when compared to the theoreticalvalue. Table 7 depicts the outcome of Chi-square analysis under thesignificance level of πΌ = 0.05 with the theoretical value 293 and theproposed system qualifies the chi-square test and indicates uniformdistribution of pixel value in cipher images.
12
e
Table 7Chi-square analysis.
Image Size π2 Result π2255.0.05
Head CT 256 Γ 256 261.268 PassMRI 256 Γ 256 254.326 PassCT-Breast 256 Γ 256 229.476 PassX-ray 256 Γ 256 285.385 PassMammography 1 256 Γ 256 234.541 PassAbdomen CT 256 Γ 256 287.430 PassHead CT 2 256 Γ 256 290.110 Pass
Table 8Correlation coefficients.
S.No Encrypted image Horizontal Vertical Diagonal
1 Head CT β0.0025 0.0039 β0.01892 Left arm X-ray 0.0211 0.0314 0.01963 Chest β0.0137 0.0225 0.03214 Spine MRI 0.0112 0.0245 0.04835 Brain MRI tumor β0.0019 β0.0102 0.01316 CT scan breast cancer 0.0167 0.0235 β0.00187 Mammography 1 0.0021 0.0256 0.02358 Abdomen CT 0.0103 β0.0034 0.00299 Head CT 2 β0.0051 0.0063 0.018910 Brain MRI 2 β0.0067 β0.0014 0.007511 Spine MRI - axial 0.0017 0.00187 0.001512 Left arm X-ray 0.0014 β0.0052 0.003913 X-ray 2 β0.0187 0.0165 0.002514 Coronary calcium scan 1 β0.08761 0.0073 β0.001815 Coronary calcium scan 2 0.0048 0.0084 0.0012Average β0.00446 0.0103 0.00106
4.1.7. Correlation studyAn appropriate encryption scheme ought to create an encrypted
image with less correlation among the adjacent pixels. The imagecorrelation between any two adjacency pixels can be measured as animportant metric for evaluating the encryption process. The followingequation is utilized to evaluate the correlations between adjacent pixelsof the proposed encrypted image.
ππ₯π¦ =πΈ((π₯ β πΈ(π₯))(π¦ β πΈ(π¦)))
β
(π (π₯)π (π¦))(17)
where πΈ(π₯) and π (π₯) are the Expectation and Variance respectively.he analysis is carried out by randomly selecting 1000 adjacent pixelairs from the plain and encrypted image and the values are tabulatedn Table 8. The outcomes show that the correlation among the pixelsre nearly zero in the encrypted image. Fig. 16. gives the correlationlots of adjacent pixels in cipher image in which Fig. 16(a), (b), (c)epict the horizontal, vertical and diagonal correlation of the encryptedmage respectively. It delineates that the arbitrarily chosen pixels onhe encrypted images are weakly correlated which demonstrates theffectiveness of proposed quantum block-based encryption scheme.
.1.8. Resistance to noise attackIn a cloud-based data sharing environment, the cipher image is
xposed to all sorts of noises. An ideal image encryption scheme shouldinimize the noise effect during transmission. Thus, to examine the
fficiency of the proposed system towards the noise resistance, a testmage of size 256 Γ 256 is taken and exposed to Gaussian noise with dif-erent variance values. Fig. 17(a-c) indicates the ciphered image whichs exposed to different variants of Gaussian attack and its correspondingecrypted images are shown in Fig. 17(d-f). From Fig. 17, it is clearlyhown that, even though the encrypted image is exposed to Gaussianoise, the decrypted image of the proposed scheme holds most of theriginal data. This guarantees the resistance towards noise attack.
.1.9. Time complexityThe time complexity of the proposed cryptosystem is evaluated in
erms of time consumed for performing quantum block based imagencryption and regional data encryption.
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
Fig. 15. Histogram analysis. (a) Plain Image, (b) histogram of plain image, (c) histogram of cipher image.
Fig. 16. Correlation analysis. (a) Horizontal correlation, (b) vertical correlation, (c) Diagonal correlation.
Table 9Time complexity of proposed encryption.
S.No Image size Encryption time (s) Decryption time (s)
1 64 Γ 64 0.023 0.01562 128 Γ 128 0.197 0.1453 256 Γ 256 1.42 1.214 512 Γ 512 1.76 1.54
A. Speed analysis of proposed quantum block based encryption. The im-portant factor for evaluating the performance of any encryption algo-rithm is said to be speed metrics. Table 9 shows the time complexityof the suggested quantum image encryption and decryption algorithmwith different sizes which that the suggested algorithm is fast enoughfor adopting it in practical applications.
B. Speed analysis of regional data extraction and watermarking. Theproposed regional data encryption for preserving the medical imageintegrity is carried out in sample medical images with different modal-ities and size. The images with different ROI regional data with timecomplexities are listed in Table 10. These outcomes demonstrate that
13
Table 10Time complexity of proposed regional data generation and embedding.
S.No Image size ROI size Regional Regional Embedding Extractiondata size data
generation(s)
time (s) time (s)
1 128 Γ 128 48 Γ 48 12 567 0.4135 0.4126 0.3912 256 Γ 256 90 Γ 90 27 382 0.7539 0.8934 0.99233 380 Γ 430 45 Γ 45 19 452 0.3945 0.5189 0.52894 512 Γ 460 120 Γ 120 42 107 1.2367 1.5621 1.754
the proposed techniques outperform efficiently in terms of speed andresistance towards the attacks.
4.1.10. Computational complexityThe computational complexity of the proposed quantum block-
based medical image encryption depends on the number of basic logicelements such as CNOT and NOT and Toffoli gates which is utilizedfor the encryption process. Specifically, the complexity of the proposedscheme depends on XOR, shift and swap operations. According to the
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
Fig. 17. Encrypted and decrypted images under different Gaussian noise levels with mean value = 0.
Fig. 18. Swap gate implementation using basic gate.
parallel characteristics of quantum computation, the grayscale infor-mation of each pixel in the quantum image is processed by the XORoperation, which is realized by 2π β πΆπππ gate. It is understood thatn-CNOT gate is equivalent to (2πβ1) Toffoli gates and one CNOT, whereone Toffoli gate can be simulated by using six controlled gates. Consideran image of size 2π Γ2π, the computational complexity of the proposedsystem is given below:
A. Proposed quantum medical image encryption. A medical image of size2π Γ 2π undergoes proposed quantum block-based image encryptionwhich is accompanied by the following operations. First, the quantumimage goes through the pixel confusion stage i.e., pixel processing,pixel scrambling, and qubit orthogonal rotations. The proposed systemutilizes a swap gate for pixel reformations with the key image asa controlled condition and this can be simulated with the help ofthree CNOT gates. Fig. 18 shows the implementation of the swap gatewhich can be simulated using three CNOT gate with the complexity ofπ(3π). Next, qubit orthogonal rotations of about angle 90β¦ is performedwith the complexity of π(π). Once pixel positions are reformed, thescrambled image is diffused by using CNOT over Arnold quantum keyimage and permuted image. The quantum XOR operation i.e., CNOTrequires 128β256 basic gates. Thus, the computational load for CNOTgate is π(π).
B. Proposed ROI regional data encryption. To authenticate the integrityof medical image sensitive data, the proposed system introduced ROI
14
Table 11Computational complexity of each operation in proposed system.
S.NO Operation Complexity
1 Quantum medical image encryptionPixel reformations π(3π)Orthogonal rotations π(π)Controlled XOR π(π)
2 ROI regional data encryptionRegional data generation π(π)Qubit conversion π(π)Controlled XOR π(π)Total π(8π)
regional data encryption. The regional data generation is composedof data generation with the complexity of π(π) followed by qubitconversion π(π) then controlled XOR operation applied over quantumkeys and regional data whose complexity is π(π). Table 11 showsthe overall complexity of the proposed quantum medial image encryp-tion. By analyzing the complexity of the proposed system in classicalcomputers, it requires two- 2 input multiplexers and one XOR gatefor implementing one controlled swap gate. The complexity of mul-tiplexers and XOR gate is π(22π + π + 22π ). Similarly, the complex-ity for performing orthogonal rotations in the classical computer isπ(22π ). Therefore, the proposed quantum-based medical image encryp-tion scheme take advantage over its conventional counterparts withrespect to computational complexity.
4.1.11. Ability to resist classical attacksWhen an attacker meets the cipher image in cyberspace, he mainly
targets to reveal the intermediate parameters rather than secret keyparameters. Refs. [51,52] listed several challenges for protecting theimage in cyberspace. By addressing these challenges, the proposed im-age encryption scheme focuses on the Telehealth application scenariowith two levels of security i.e., block-based quantum image encryption
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
i
πΌ
Bpt
s
tFipπΌp
TK
BmTblm
aiTqpnhwqi
ippmpfa
twaets1tat
4
woAapwqd
π
for medical image and ROI pixel value encryption for ensuring medicalimage sensitivity. In general, cryptanalyst uses the knowledge about theworkflow of cryptosystem and tries to perform decryption of differentcipher image by extracting their secret parameters.
An ideal and efficient cryptosystem should resist the cryptanalyticattacks through which an attacker can interrupt any sort of cryptosys-tem by utilizing different types of attacks: ciphertext only, knownplaintext, chosen ciphertext and chosen plaintext attack [53].
Ciphertext only attack: The attacker has no other supplementaryinformation except the intercepted ciphertext. They analyze the in-tercepted cipher image and extract its pattern or information stringto reveal the plain image or secret key. Yet extracting a pattern orinformation from ciphertext alone is a difficult task.
Known-plaintext attack: The intruder maintains information regard-ing plain image and its respective cipher image and tries to disseminatethe secret key.
Chosen ciphertext attack: The intruder may access the decryptioncryptosystem temporarily and choose a cipher image randomly toperform decryption operation and obtain its relevant plain image.
Chosen plaintext attack: The intruder may temporarily access theencryption cryptosystem and randomly choose some set of plain imagesto generate the corresponding cipher image and targets to reveal thekeys or original plain images. Many researchers have contemplatedthat some cryptosystem can be successfully cracked by known/chosen-plaintext attack [51β55].
Known/chosen plaintext attack. Among different types of classical at-tacks, the known/chosen-plaintext attack is most vulnerable since theattacker analysis the plaintext and their respective ciphertext and de-duce some intermediate parameter (or) pattern to recover the secretkeys. In the proposed system, the intermediate parameters can beobtained by choosing a random plain image with a different pixel valuedistribution pattern. Consider, the image in the proposed framework isrepresented as a matrix of size πΓπ , where π is the size of the image,the pixel reformation is represented as (18).
πΌπ π‘π = |πΎβ©|πΌπβ© (18)
Where, |πΎβ© is the secret qubit transformation matrix generated froma chaotic map. Later, the key image |πΌπβ© is XORed with the shuffledmage πΌπ π‘π by using a controlled CNOT gate as (19).
ππΈππ = |πΌπβ©πΆππππΌπ π‘π (19)
y investigating (18) and (19), the attacker will try to realize theermutation pattern through which a plain image can be easily re-rieved. In general, attacker chooses random images of size π Γπ with
equential pattern of pixel values i.e.,β
β
β
β
1 ... π β 2 π.. .. .. ..π .. π β 2 π
β
β
β
β
and access
he encryption machinery to obtain corresponding permuted image.or simplicity, attacker may choose following combination of inputmages to retrieve the secret intermediate parameter say permutationattern or diffusion keys. Let us consider, quantum input matrices as:ππ and tries different scrambling operations to obtain the intermediateermutation matrix πΌπ π‘ππ.
1. Sample image with identical row values
πΌπ1 =
β‘
β’
β’
β’
β’
β£
1 1 1 12 2 2 23 3 3 34 4 4 4
β€
β₯
β₯
β₯
β₯
β¦
; πΌπ π‘π1 =
β‘
β’
β’
β’
β’
β£
3 3 1 14 4 2 21 1 3 32 2 4 4
β€
β₯
β₯
β₯
β₯
β¦
; obtained pixel
pattern be π1.2. Sample image with identical column values
πΌπ2 =
β‘
β’
β’
β’
β’
1 2 3 41 2 3 41 2 3 4
β€
β₯
β₯
β₯
β₯
; πΌπ π‘π2 =
β‘
β’
β’
β’
β’
4 4 4 43 3 3 32 2 2 2
β€
β₯
β₯
β₯
β₯
; pixel pattern be π2
15
β£
1 2 3 4β¦ β£
1 1 1 1β¦
able 12nown/chosen plaintext attack - log.S.No Plain image Resultant permuted image Pixel reformation pattern
1 πΌπ1 πΌπ π‘π1
πΌπ1(π11 , π12 , π13 , π14)=πΌπ π‘π1(π31 , π32 , π13 , π14)
2 πΌπ2 πΌπ π‘π2
πΌπ2(π11 , π12 , π13 , π14)=πΌπ π‘π2(π41 , π42 , π43 , π44)
3 πΌπ1 πΌπ π‘π1 π3 β π1
3. Image Random pixel values
πΌπ3 =
β‘
β’
β’
β’
β’
β£
230 194 90 160185 70 120 99213 60 213 190156 28 0 80
β€
β₯
β₯
β₯
β₯
β¦
; πΌπ π‘π3 =
β‘
β’
β’
β’
β’
β£
213 60 213 190185 70 120 99230 194 90 160156 28 0 80
β€
β₯
β₯
β₯
β₯
β¦
;
π3
y analyzing the sample input matrix and its respective permutationatrix, attacker maintains a log for different input cases as shown inable 12 for obtaining plain image where ππ shows, the relationshipetween the sample input images and permuted images. Utilizing theseogs information, attacker may rearrange the original permutationatrix for accessing the original input image.
To overcome this, and to achieve a high resistance towards cryptan-lytic attack, the uncertainty principle of quantum mechanics is utilizedn the proposed system for designing quantum controlled basic gates.hese controlled gates are used for generating plain image relateduantum key matrixC, key image |πΌπβ© and quantum secret keys forerforming the adaptive permutation and diffusion process. The dy-amic qubit key matrix |πΎβ© is designed by employing high dimensionalyperchaotic Lorenz map where the initial conditions are associatedith the plain image. Later, the random sequences are converted intouantum vectors by using controlled basic gates and the tensor products applied over any two sequences of size (1 Γ π) and (1 Γ π) which
results in a key matrix |πΎβ© of size π Γ π . Moreover, the proposedmage pixel reformations depend on qubit key matrix in which the pixelositions in the quantum plain image is reformed by referring to theositions (π, π) in the key matrix. In other words, adaptive quantum keyatrix |πΎβ© produces different permutation matrix at each stage of theixel reformation process and dynamic controlled image |πΌπβ© is utilizedor diffusion. Thus, different input image will have different key imagend cipher image.
In general, an attacker in a classical cryptosystem can eavesdrop onhe communication medium for accessing the plain image secret keysithout modifying it. This allows the attacker to perform decryptiont any time. However, in the proposed quantum-based medical imagencryption scheme, given the initial conditions, attacker cannot be ableo derive the quantum key matrix |πΎβ© without knowing the quantumtate information. The probability of the quantum state of any qubits isβ2 and the proposed system has a qubit key matrix of size π Γ π thushe probability bound for obtaining a single key matrix for encryptingsingle plain image is 1β2π which is computationally infeasible. Thus,
he proposed system can resist the chosen/known plain text attack.
.1.12. Differential cryptanalysisIn general, differential cryptanalysis is a chosen plaintext attack
here the attacker utilizes the knowledge about high probabilitiesf occurrences of a particular plaintextβciphertext difference value.ssume, one-round encryption with πΌ1, πΌ2, πΌ3,β¦ , πΌπ as input imagesnd πΆ1, πΆ2, πΆ3,β¦ , πΆπ as corresponding cipher images obtained fromroposed encryption operation say pixel reformations and diffusionith a secret key. The proposed encryption operations are composed ofuantum block-based scrambling, qubit rotations, transformations andiffusion. The pixel reformations are defined as1π = ππ (|πΎβ©(|πΌπ1β©)), ππ 1
π = πππ (|πΎβ©(|πΌπ1β©)), π 1π = ππ (|πΎβ©(|πΌπ1β©)),
π = 1, 2, 3..π (20)
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
where, quantum scrambling π1 is a function for mapping qubit keyvalues and quantum image i.e.,
ππ (πΌ1ππ(π₯,π¦)) = π1π (π₯1, π¦1), π = 1, 2, 3..π (21)
similarly, other function πππ and ππ can be defined. Let us assume π₯πΌπbe the input image differences and πΏπΆπ be the cipher image differences.Differential cryptanalysis uses the high probability of π₯πΆπ that is in-fluenced by π₯πΌπ. The mathematical evaluation of differential attack isperformed by considering two input images πΌ1, πΌ2 which is convertedinto quantum representation |πΌπ1β© and |πΌπ2β© and in turn the respectivecipher images |πΌπΈππ1β© and |πΌπΈππ2β© are obtained by (22).
|πΌπΈππβ© = |πΌππ π‘β©πΆπππ‘|πΌπβ© (22)
where, |πΌππ π‘β© is the permuted image, |πΌπβ© is the key image obtained dur-ing the diffusion process. Generally, in classical cryptosystem,exclusive-or operation (XOR) is used as a substitution function and dif-ference computation. However, in the proposed quantum-based imageencryption, the controlled XOR is realized using CNOT quantum gates.The difference between |πΌπΈππ1β© and |πΌπΈππ2β© is represented as
π₯πΆπ = |πΌπΈππ1β©πΆπππ‘|πΌπΈππ2β© (23)
this can be rewritten as
π₯πΆπ = (|πΌππ π‘1β©πΆπππ‘|πΌπ1)πΆπππ‘(|πΌππ π‘2β©πΆπππ‘|πΌπ2) (24)
By expanding π₯πΆπ in terms of the quantum input image and qubit keymatrix |πΎβ© and key image |πΌπβ© (24) will become
π₯πΆπ = ((|πΌπ1β©πΆπππ‘|πΎ1β©)πΆπππ‘|πΌπ1β©)πΆπππ‘((|πΌπ2β©πΆπππ‘|πΎ2β©)πΆπππ‘|πΌπ2β©)
π₯πΆπ = ((|πΌπ1β©πΆπππ‘|πΌπ2β©)πΆπππ‘(|πΎ1β©πΆπππ‘|πΎ2β©)πΆπππ‘(|πΌπ1β©πΆπππ‘|πΌπ2β©)) (25)
From (25), it is clearly shown that, differential cipher image π₯πΆπdepends on |πΎβ© and |πΌπβ©. From these investigations, consider a scenariothat, the attacker access the encryption machinery and choose sampleblank images as one of the inputs and compute differential cipherimages as given in (26). Also, if key values used in encryption schemeis independent of plain image and fixed then there exists same keyvalues for different cipher image i.e., if |πΎ1β© = |πΎβ© and |πΌπ1β© = |πΌπ2β©then attacker can easily access the plain image as
π₯πΆπ = ((|πΌπ1β©)πΆπππ‘(|πΎβ©πΆπππ‘|πΎβ©)πΆπππ‘(|πΌπβ©πΆπππ‘|πΌπβ©)) (26)
π₯πΆπ = (|πΌπ1β©) (27)
However, the proposed system utilizes plain image related key matrixand diffusion key image which generates different keys for differentcipher image i.e., |πΎ1β© β |πΎβ© and |πΌπ1β© β |πΌπ2β© Hence, Eq. (25) becomes,
π₯πΆπ = |πΌπβ©ππππ‘|πΎ1β©πΆπππ‘|πΎ2β©πΆπππ‘|πΌπ1β©πΆπππ‘|πΌπ2β© (28)
This shows that even after substituting the blank images during dif-ferential computation, the attacker will get two different keys duringeach stage of encryption. This results in high correlation among plainimage, secret key and substitution key and guarantees the efficacy ofthe proposed cryptosystem towards differential cryptanalysis.
4.2. Perceptible quality of watermarked image
For guaranteeing the integrity of medical image, the ciphered re-gional data is embedded into encrypted cover medical image. Henceit is necessary to evaluate the proposed system with respect to visualquality of the watermarked image by using Peak Signal to Noise Ratio
16
Table 13Perceptible analysis of watermarked images.
S.No Encrypted image PSNR SSIM
1 Head CT 51.98 0.97132 Left arm X-ray 51.77 0.98563 Chest 51.38 0.98294 Spine MRI 51.28 0.98675 Brain MRI tumor 50.99 0.99296 CT scan breast cancer 51.29 0.99017 Mammography 1 51.43 0.98798 Abdomen CT 51.87 0.99329 Head CT 2 50.87 0.985310 Brain MRI 2 51.34 0.996711 Spine MRI - axial 51.43 0.990112 Left arm X-ray 50.98 0.987713 X-ray 2 49.98 0.982614 Coronary calcium scan 1 51.39 0.984515 Coronary calcium scan 2 51.41 0.9802Average 51.2967 0.9865
Fig. 19. (a) Query image of breast CT, (b)β(f) top query result of breast CT.
(PSNR) and Structural Similarity Measure Index (SSMI). The mathemat-ical equation for PSNR and SSMI are expressed in (29) & (31). Table 13shows the performance analysis of watermarked image.
ππππ = 10 log(255)2
πππΈππ (29)
where, MSE is Mean Square Error and it is defined as
πππΈ = 1πΏπΎ
πΏβ
(π=1)
πΎβ
(π=1)(πΈππ β πΈβ²
ππ )2 (30)
where πΏ, πΎ are the dimension of original and watermarked image andπΈππ and πΈβ²
ππ is the pixel value π, π in original and watermarked imagerespectively. Similarly, SSMI is defined as
πππΌπ =(2πππ + π 1)(2πππ + π 2)
(π2π + π2
π + π 1)(π2π + π2π + π 2)(31)
where π is the mean, π is the variance of πΏ,πΎ image pixels. Thetabulated PSNR and SSIM estimation of test images shows the viabil-ity of proposed framework with respect to embedded image qualityassessment.
4.3. Retrieval efficiency
The proposed system incorporates efficient identical image retrievalmodule by comparing the hashed image features with the help ofsuggested Interplanetary Image Features File System. The proposedframework also guarantees the privacy of medical image features bystoring it as hashed values which are utilized for later images retrievalprocess. Fig. 19 depicts the query image and its retrieval results. Fig. 19
Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
Table 14Correlation and entropy estimations of proposed and existing approaches.
Scheme Approach Correlation Entropy
Horizontal Vertical Diagonal
Ref. [3]
Classicalcryptography
0.5310 β β 7.95667Ref. [6] 0.0965 β0.0318 0.0362 7.9852Ref. [7] β0.0147 0.0034 0.0619 7.9905Ref. [8] β0.0049 0.0030 β0.0052 7.9965Ref. [9] 0.9911 β0.0080 0.0083 7.9995Ref. [12] β0.0015 β0.0032 β0.008 7.9972Ref. [15] β0.0574 β0.0035 0.0578 7.9791Ref. [16] 0.021 0.0004 β0.0038 7.9874Ref. [17] 0.0056 β0.0876 β βRef. [18] 0.0020 β0.0007 β0.0014 7.9972Ref. [19] 0.001906418 0.0038175986 β0.0019482802 7.99705Ref. [26] 0.00252 0.04741 β 7.9521
Ref. [31]
Quantumcryptography
0.0018 0.0040 β6.0096πβ04 7.976Ref. [33] 0.0213 0.0240 0.0143 7.786Ref. [34] 0.00045 0.002175 0.003801 7.997Ref. [35] β0.0026 β0.1457 β0.0069 7.884Ref. [37] 0.01918 0.01367 0.0158 7.9545Ref. [39] β0.00027 β0.0005 β0.0003 7.997Ref. [40] β0.00067 β0.000208 0.000268 7.996Proposed scheme β0.00446 0.00103 0.00106 7.9993
Table 15Proposed diffusion mechanism vs. existing scheme.
Scheme Parameters
PRNG(non-lineardynamics)
Quantum baseddiffusion
Plain imagebased keys
Adaptivediffusion
Ref. [3] Γ Γ Γ ΓRef. [11] Γ Γ Γ ΓRef. [26] Γ Γ Γ β
Ref. [31] β β Γ ΓRef. [33] Γ β Γ ΓRef. [35] Γ β Γ ΓRef. [38] β β Γ ΓProposedsystem
β β β β
Table 16NPCR and UACI comparisons.
Ref. Approach NPCR UACI
Ref. [3] Mathematical based S-box 99.6287 31.8345Ref. [6] Chaos based one time key 99.66 33.4289Ref. [7] One-time key 99.6013 33.4210Ref. [8] One-time key 99.6032 33.52Ref. [9] Multimode image ciphering 99.96 33.39Ref. [11] Logistic-Chebyshev 99.61 28.42Ref. [12] Bit-level permutation 99.612 33.46Ref. [15] Bit-level permutation 99.6231 33.4959Ref. [16] DNA sequence 99.60 28.1370Ref. [17] Chaos and Perceptron network 76 βRef. [18] DNA sequence operations &CML map 99.65 33.48Ref. [19] DNA & secure Arnold map 99.5864 33.253Ref. [26] Chaotic neural network 99.985 17.58
Ref. [31] Quantum hyper chaos 99.6086 33.45Ref. [33] Qubit rotation β βRef. [34] Quantum chaotic S-box 99.6119 33.40Ref. [35] Restricted geometric and color
transformationsβ β
Ref. [37] Selective encryption β βRef. [38] Quantum walk 99.61204 βRef. [39] Cascaded quantum walks with chaos
inducement99.60 β
Ref. [40] One particle quantum walk 99.58 30.584Proposedscheme
Quantum block spatial transformations 99.7172 33.457
clearly manifests that the proposed feature-based retrieval process re-sults top five similar images efficiently with the help of image featurebucket table under encrypted scenario.
17
Table 17Comparison of PSNR among proposed and various existing schemes.
Ref. Security (approach) PSNR SSMI
Ref. [1] 27.5395 0.00616Ref. [5] 38.10 0.4893Ref. [23] Classical cryptography 53.94 0.567
Ref. [20] 46.368 0.9827Ref. [31] 8.5387 βRef. [45] Quantum cryptography 48.041 βProposed scheme 51.2967 0.9865
Table 18Computational time of proposed vs. existing approach for image 512 Γ 512.
Ref. Approach Encryptiontime (s)
Decryptiontime (s)
Ref. [3] 2.9766 3.152Ref. [9] Classical cryptography 1.028 1.002Ref. [26] 21.04 25.7
Ref. [31] 3.546 2.987Ref. [33] 2.12 2.19Ref. [34] Quantum cryptography 1.6772 1.546Ref [43] 0.0069 βProposed scheme 1.76 1.54
5. Comparisons with existing approaches
The exploratory results of the suggested quantum encryption us-ing spatial transformations is assessed with the conventional imageencryption techniques e.g., mathematical based S-box [3], encryptionbased on one-time key [6β8], bit level permutation [12,15], DNA basedmodel [16,18,19], chaotic-neural network encryption [17,26],medicalciphering [9] and quantum encryption methods [31,33β35,37β40,43,45] respectively. The advantages of the proposed scheme over theconventional method are, the suggested Quantum block based medicalencryption method withstands the quantum cryptanalytic attacks asit utilizes quantum basic gates for generating keys and performingencryption function. To attain high sensitivity with respect to plainimage, the suggested scheme uses plain image related initial keys anddiffusion process. As a result, this shows a very good range of Numberof Pixel change rate and UACI values. Similarly, it exhibits the key
180
value of 10 which makes brute force attack to be ineffective.Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
Table 19Qualitative feature comparisons for medical image integrity.
Features Ref. [24] Ref. [20] Ref. [22] Ref. [45] Ref. [37] Proposed scheme
Plain image based key Γ Γ Γ Γ Γ β
Image encryption β β β β Selective β
ROI encryption Γ Γ Γ Γ β β
one-time pad (ROI) Γ Γ Γ Γ Γ β
Security (quantum) Γ Γ Γ Γ β β
Tamper detection Γ β Γ Γ Γ β
Block size 4 Γ 4 4 Γ 4 Key based β β 3 Γ 3Recovery procedure Γ β Γ Γ Γ β
Perception quality β β β β Γ β
5.1. Quantitative measures for validating image confidentiality
Table 14 shows the comparison and effectiveness of the proposedquantum cryptosystem system towards the randomness and hiding ofadjacent pixel correlation. Yet, Refs. [39,40] have less correlation asthey include quantum-inspired random walks for pixel scrambling anddiffusion, but it has less NPCR and UACI values.
The security of any image encryption scheme profoundly reliesupon the diffusion process as it changes the pixel values in additionto relocating it. The proposed diffusion phase utilizes Arnold cat mapfor producing NEQR key image |πΌπβ© later the Controlled NOT gate isapplied over the scrambled image πΌπ π‘π and |πΌπβ©. The randomness ofthe cipher image depends on the NEQR key image. Table 15 showsthe comparisons of parameter adopted in proposed diffusion methodwith state-of -art method. Also, the strength of the diffusion processcan be examined by analyzing the number of pixel change rate onceit is XOR-ed with the key image. From Table 16, it is evident thatthe proposed scheme exhibits NPCR value as 99.78% which shows thehigher diffusion performance and the proposed scheme outperformswell among the notable existing schemes including [11,38β40].
5.2. Quality of encrypted and watermarked images
The proposed framework ensures two levels of security for themedical image by incorporating quantum block-based image encryptionand ROI regional data encryption. The performance comparison of ROIregion data encryption embedded on watermarked image with variousschemes are shown in Table 17.
5.3. Time analysis
The execution speed is a significant standard for evaluating encryp-tion algorithms [43]. The execution time for encrypting the medicalimages with varying dimensions are listed out in Table 18. The com-parative study is carried out for understanding the efficiency of theproposed algorithm among different conventional schemes and theoutcomes are figured out in Table 18 which shows that the proposedsystem has better computational time than other available schemes.
5.4. Qualitative analysis for validating image integrity
The Qualitative analysis of the proposed scheme is performed bycomparing various features like encryption, block size, tamper detec-tion for preserving image integrity, security metrics, recovery met-rics, resistance against differential attack, perception quality of wa-termarked image of the proposed system with respect to differentconventional schemes and listed in Table 19. The proposed schemeutilized plain image based initial seed generation phase for encryptingthe medical image which increases the key and image sensitivity to-wards intruders. Additionally, it encrypts both the image and sensitiveregion of the image separately which provides the complete shieldfor medical image along ROI data while outsourcing it. Also, theproposed system consists of dedicated modules as tamper detection
18
for ensuring the image trustworthiness. The proposed system possess
very good perceptible quality of regional data embedded images. Thus,from the above discussions, it is indicated that the proposed imageand ROI encryption outperform the notable existing approaches and itmaintains the secrecy and trustworthiness of the medical images overthe outsourced environment.
6. Conclusion
A new quantum-based medical image encryption scheme has beenproposed with two levels of security: A novel quantum block-basedimage encryption using spatial transformation for preserving confiden-tiality and medical image ROI regional data encryption for ensuringtrustworthiness. The interplanetary feature file system is suggested forthe efficient retrieval of medical images in bilateral transmissions. Thesuggested qubit key matrix holds the uncertainty principles of quantummechanics and produces different shuffled vectors for different imagepermutation and diffusion. The numerical simulations are carried out inMATLAB and it results in better uniformity, minimal correlation amongencrypted pixels, and superior randomness rate in an encrypted image.With these experimental results, it is evident that the proposed systemhas high resistance towards statistical and differential attack. Addition-ally, as the medical images are encrypted using quantum cryptosystem,it is able to combat the quantum cryptanalytic attacks using quantummachines.
CRediT authorship contribution statement
T. Janani: Conceptualization, Methodology, Design of study, Soft-ware, Writing - original draft. M. Brindha: Supervision, Investigation,Validation.
Declaration of competing interest
The authors declare that they have no known competing finan-cial interests or personal relationships that could have appeared toinfluence the work reported in this paper.
References
[1] Laiphrakpam DS, Khumanthem MS. Medical image encryption based on improvedelgamal encryption technique. Optik 2017;147:88β102.
[2] Kanso A, Ghebleh M. An efficient and robust image encryption scheme formedical applications. Commun Nonlinear Sci Numer Simul 2015;24(1β3):98β116.
[3] ΓavuΕoΔlu Γ, KaΓ§ar S, Pehlivan I, Zengin A. Secure image encryption algorithmdesign using a novel chaos based s-box. Chaos Solitons Fractals 2017;95:92β101.
[4] Artiles JA, Chaves DP, Pimentel C. Image encryption using block cipher andchaotic sequences. Signal Process, Image Commun 2019;79:24β31.
[5] Xingyuan W, Junjian Z, Guanghui C. An image encryption algorithm basedon zigzag transform and LL compound chaotic system. Opt Laser Technol2019;119:105581.
[6] Liu H, Wang X. Color image encryption based on one-time keys and robustchaotic maps. Comput Math Appl 2010;59(10):3320β7.
[7] Dong C. Color image encryption using one-time keys and coupled chaoticsystems. Signal Process Image Commun 2014;29(5):628β40.
[8] Khedr WI. A new efficient and configurable image encryption structure for secure
transmission. Multimedia Tools Appl 2019;1β25.Journal of Information Security and Applications 59 (2021) 102832T. Janani and M. Brindha
[9] Boussif M, Aloui N, Cherif A. Smartphone application for medical images securedexchange based on encryption using the matrix product and the exclusiveaddition. IET Image Process 2017;11(11):1020β6.
[10] Hua Z, Yi S, Zhou Y. Medical image encryption using high-speed scrambling andpixel adaptive diffusion. Signal Process 2018;144:134β44.
[11] Abd-El-Atty B, Amin M, Abd-El-Latif A, Ugail H, Mehmood I. An efficientcryptosystem based on the logistic-Chebyshev map. In: 2019 13th internationalconference on software, knowledge, information management and applications(SKIMA). IEEE; 2019, p. 1β6.
[12] Li Y, Wang C, Chen H. A hyper-chaos-based image encryption algorithmusing pixel-level permutation and bit-level permutation. Opt Lasers Eng2017;90:238β46.
[13] Chen X, Hu C-J. Adaptive medical image encryption algorithm based on multiplechaotic mapping. Saudi J Biol Sci 2017;24(8):1821β7.
[14] Boriga R, DΔscΔlescu AC, Priescu I. A new hyperchaotic map and its ap-plication in an image encryption scheme. Signal Process, Image Commun2014;29(8):887β901.
[15] Liu H, Wang X. Color image encryption using spatial bit-level permutation andhigh-dimension chaotic system. Opt Commun 2011;284(16β17):3895β903.
[16] Liu H, Wang X, et al. Image encryption using dna complementary rule andchaotic maps. Appl Soft Comput 2012;12(5):1457β66.
[17] Wang X-Y, Yang L, Liu R, Kadir A. A chaotic image encryption algorithm basedon perceptron model. Nonlinear Dynam 2010;62(3):615β21.
[18] Wang X-Y, Zhang Y-Q, Bao X-M. A novel chaotic image encryption scheme usingdna sequence operations. Opt Lasers Eng 2015;73:53β61.
[19] Wang X, Liu L, Zhang Y. A novel chaotic block image encryption algorithm basedon dynamic random growth technique. Opt Lasers Eng 2015;66:10β8.
[20] Parah SA, Ahad F, Sheikh JA, Bhat GM. Hiding clinical information in medicalimages: a new high capacity and reversible data hiding technique. J BiomedInform 2017;66:214β30.
[21] Das S, Kundu MK. Effective management of medical information throughroi-lossless fragile image watermarking technique. Comput Methods ProgramsBiomed 2013;111(3):662β75.
[22] Murali P, Sankaradass V. An efficient roi based copyright protection schemefor digital images with svd and orthogonal polynomials transformation. Optik2018;170:242β64.
[23] Bouslimi D, Coatrieux G, Cozic M, Roux C. A joint encryption/watermarkingsystem for verifying the reliability of medical images. IEEE Trans Inf TechnolBiomed 2012;16(5):891β9.
[24] Elhoseny M, RamΓrez-GonzΓ‘lez G, Abu-Elnasr OM, Shawkat SA, Arunkumar N,Farouk A. Secure medical data transmission model for iot-based healthcaresystems. Ieee Access 2018;6:20596β608.
[25] Wang X, Feng L, Zhao H. Fast image encryption algorithm based on parallelcomputing system. Inform Sci 2019;486:340β58.
[26] Dridi M, Hajjaji MA, Bouallegue B, Mtibaa A. Cryptography of medical imagesbased on a combination between chaotic and neural network. IET Image Process2016;10(11):830β9.
[27] Wang X, Gao S. Image encryption algorithm for synchronously updatingboolean networks based on matrix semi-tensor product theory. Inform Sci2020;507:16β36.
[28] Wang X, Gao S. Image encryption algorithm based on the matrix semi-tensorproduct with a compound secret key produced by a boolean network. Inf Sci2020;539:195β214.
[29] Cho K, Miyano T. Chaotic cryptography using augmented lorenz equationsaided by quantum key distribution. IEEE Trans Circuits Syst I Regul Pap2014;62(2):478β87.
[30] Akhshani A, Akhavan A, Lim S-C, Hassan Z. An image encryption schemebased on quantum logistic map. Commun Nonlinear Sci Numer Simul2012;17(12):4653β61.
[31] Luo Y, Tang S, Liu J, Cao L, Qiu S. Image encryption scheme by combining thehyper-chaotic system with quantum coding. Opt Lasers Eng 2020;124:105836.
19
[32] Yan F, Iliyasu AM, Le PQ. Quantum image processing: a review of advances inits security technologies. Int J Quantum Inf 2017;15(03):1730001.
[33] Liu X, Xiao H, Li P, Zhao Y. Design and implementation of color image encryptionbased on qubit rotation about axis. Chin J Electron 2018;27(4):799β807.
[34] Liu H, Zhao B, Huang L. Quantum image encryption scheme using arnoldtransform and s-box scrambling. Entropy 2019;21(4):343.
[35] Song X-H, Wang S, Abd El-Latif AA, Niu X-M. Quantum image encryptionbased on restricted geometric and color transformations. Quantum Inf Process2014;13(8):1765β87.
[36] Liu X, Xiao D, Xiang Y. Quantum image encryption using intra and inter bitpermutation based on logistic map. IEEE Access 2018;7:6937β46.
[37] Heidari S, Naseri M, Nagata K. Quantum selective encryption for medical images.Internat J Theoret Phys 2019;58(11):3908β26.
[38] Abd El-Latif AA, Abd-El-Atty B, Venegas-Andraca SE, Elwahsh H, Piran MJ,Bashir AK, Song O-Y, Mazurczyk W. Providing end-to-end security using quantumwalks in iot networks. IEEE Access 2020.
[39] Abd el Latif AA, Abd-el Atty B, Amin M, Iliyasu AM. Quantum-inspired cascadeddiscrete-time quantum walks with induced chaotic dynamics and cryptographicapplications. Sci Rep 2020;10(1):1β16.
[40] Abd-El-Atty B, Abd El-Latif AA, Venegas-Andraca SE. An encryption protocolfor neqr images based on one-particle quantum walks on a circle. Quantum InfProcess 2019;18(9):272.
[41] Abd EL-Latif AA, Abd-El-Atty B, Abou-Nassar EM, Venegas-Andraca SE. Con-trolled alternate quantum walks based privacy preserving healthcare images ininternet of things. Opt Laser Technol 2020;124:105942.
[42] Abd EL-Latif AA, Abd-El-Atty B, Venegas-Andraca SE. Controlled alternatequantum walk-based pseudo-random number generator and its application toquantum color image encryption. Physica A 2019;123869.
[43] Abd El-Latif AA, Abd-El-Atty B, Mazurczyk W, Fung C, Venegas-Andraca SE.Secure data encryption based on quantum walks for 5g internet of thingsscenario. IEEE Trans Netw Serv Manag 2020;17(1):118β31.
[44] Song X-H, Wang H-Q, Venegas-Andraca SE, Abd El-Latif AA. Quantum videoencryption based on qubit-planes controlled-xor operations and improved logisticmap. Physica A 2020;537:122660.
[45] Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB.Efficient quantum information hiding for remote medical image sharing. IEEEAccess 2018;6:21075β83.
[46] Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypteddata. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000.IEEE; 2000, p. 44β55.
[47] Chang Y-C, Mitzenmacher M. Privacy preserving keyword searches on remote en-crypted data. In: International conference on applied cryptography and networksecurity. Springer; 2005, p. 442β55.
[48] Zhang Y-Q, Wang X-Y. A new image encryption algorithm based on non-adjacentcoupled map lattices. Appl Soft Comput 2015;26:10β20.
[49] Wu Y, Noonan JP, Agaian S, et al. Npcr and uaci randomness tests for imageencryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT)2011;1(2):31β8.
[50] Zhang Y-Q, Wang X-Y. A symmetric image encryption algorithm based on mixedlinearβnonlinear coupled map lattice. Inform Sci 2014;273:329β51.
[51] Li C, Zhang Y, Xie EY. When an attacker meets a cipher-image in 2018: A yearin review. J Inf Secur Appl 2019;48:102361.
[52] Ma Y, Li C, Ou B. Cryptanalysis of an image block encryption algorithm basedon chaotic maps. J Inf Secur Appl 2020;54:102566.
[53] Wang X, Teng L, Qin X. A novel colour image encryption algorithm based onchaos. Signal Process 2012;92(4):1101β8.
[54] Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S. Cryptanalysis of avideo encryption method based on mixing and permutation operations in thedct domain. Signal Image Video Process 2015;9(6):1281β6.
[55] Bechikh R, Hermassi H, Abd El-Latif AA, Rhouma R, Belghith S. Breaking animage encryption scheme based on a spatiotemporal chaotic system. SignalProcess, Image Commun 2015;39:151β8.