1. Internet of Medical Things Application in Encryption of Medical Images Based on Synchronization of Multi-state Chaotic Systems
- Author
-
Ali Akbar Kekha Javan and Assef Zare
- Subjects
General Medicine - Abstract
Introduction: Studies on the security and interoperability of Internet of medical things (IoMT)in health are still scarce. The most important effects of the IoMT on health care are the ability to exchange information and reduce hospitalization and health care costs. The main challenges of the IoMT in healthcare are security and protection of privacy, among which encryption of images is very important in the field of communication and security. The main purpose of this study was to design a secure channel for encrypting and sending medical data. Methods: This study presents a new method for encrypting medical images to preserve patient information by synchronizing two chaotic systems. The use of chaotic signals as carriers of medical images greatly enhances security and greatly reduces the possibility of detection. The idea of synchronization of chaotic systems was presented in multi states with fixed time delay. In this idea, with the help of Lyapunov’s theory of stability, a controller was designed to establish the stability of the closed-loop system. Then, according to the synchronization idea and its error, a chaotic masking method was proposed to encrypt patient images. The simulation and accuracy of the results of the presented method were investigated in MATLAB software version 2020.Results: The simulations were performed on medical color images and CT, MRI, and X-ray images. Encrypted and recovered images were obtained by the proposed system. To evaluate the performance of the proposed method, various criteria including image histogram, signal-to-noise rate, correlation, and entropy of information were evaluated. The results showed the excellent image encrypting efficiency of the proposed method.Conclusion: Using the proposed method, medical images were encrypted based on a secure protocol, and then with satisfactory quality, images were recovered after transmission.
- Published
- 2022