New optimized chaotic encryption with BCOVIDOA for efficient security of medical images in IoMT systems

The Internet of Medical Things systems involve medical data transmissions between patients, medical experts, and medical centers over public networks. The sensitivity of the medical images' contents and the personal information in the medical images required high levels of security. Chaotic map...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Neural computing & applications 2024-05, Vol.36 (14), p.7705-7723
Hauptverfasser: Alsahafi, Yousef S., Khalid, Asmaa M., Hamza, Hanaa M., Hosny, Khalid M.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The Internet of Medical Things systems involve medical data transmissions between patients, medical experts, and medical centers over public networks. The sensitivity of the medical images' contents and the personal information in the medical images required high levels of security. Chaotic maps are successfully used in image encryption due to their high security and computational efficiency. Initial random sequences generate the keys for chaotic map confusion and diffusion processes. Selection of the initial parameters is the cornerstone of the success of chaotic maps in securing digital images. In this paper, the authors proposed utilizing the novel binary Coronavirus disease optimization algorithm to determine the optimal initial sequences for the chaotic maps that lead to the generation of the optimal secret keys. The proposed algorithm selects the optimal initial keys using a hybrid fitness function. The generated optimal secret keys are then used for medical image encryption/decryption. Several medical images from different modalities are utilized for testing, and the results are compared to the latest encryption techniques according to various criteria. The experimental results ensure the robustness of the proposed algorithm to various attacks and its superior performance to similar algorithms.
ISSN:0941-0643
1433-3058
DOI:10.1007/s00521-024-09508-1