Multi-Stage Medical Image Encryption System Combining RSA and Steganography

PDF (1213KB), PP.146-158

Views: 0 Downloads: 0

Author(s)

Jahin Ahmed 1 Faizul Hakim 1 Md. Asadur Rahman 1,*

1. Department of Biomedical Engineering, Military Institute of Science & Technology (MIST), Mirpur Cantonment, Dhaka-1216, Bangladesh

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2025.03.08

Received: 20 Jun. 2023 / Revised: 20 Aug. 2023 / Accepted: 12 Jan. 2025 / Published: 8 Jun. 2025

Index Terms

Encryption, Decryption, RSA Algorithm, Steganography, Lossless System

Abstract

Data security has become a major concern in the present era of the communication revolution, especially maintaining the confidentiality of medical images a prime concern in e-health establishments. As conventional techniques hold numerous drawbacks, this study aims to develop an image encryption algorithm by combining two renowned methods: the RSA algorithm and steganography. The proposed algorithm is modified with the help of the conventional RSA algorithm and steganography to provide an attainable solution to this alarming issue. RSA technique encrypts multiple medical images with distinct keys; further, these keys are embedded in two images to be transmitted secretly with the help of LSB steganography. The proposed system generates images of an unidentifiable pattern after encryption and decrypts those images without any loss. The claimed performances and robustness of the system are justified using different numerical and graphical measures such as PSNR, MSE, SSIM, NPCR, UACI, and histograms. This encryption method can be used for medical image transmission where image security is a vital concern.

Cite This Paper

Jahin Ahmed, Faizul Hakim, Md. Asadur Rahman, "Multi-Stage Medical Image Encryption System Combining RSA and Steganography", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.17, No.3, pp. 146-158, 2025. DOI:10.5815/ijigsp.2025.03.08

Reference

[1]C. Francesco, I. Donato and P. Giuseppe, "A Medical Image Encryption Scheme for Secure Fingerprint-Based Authenticated Transmission," Applied Sciences, vol. 13, no. 10, 2023. 
[2]J. Jaishree and J. and Arpit, "Securing E-Healthcare Images Using an Efficient Image Encryption Model," Scientific Programming," Scientific Programming, p. 11, 2022. 
[3]K. Sara, H. Khalid, E. Taha, D. Mohamed and F. Mostafa, "A New Image Encryption Algorithm for Grey and Color Medical Images," IEEE Access, vol. 9, pp. 37855-37865, 2021. 
[4]W. Siriboonpipattana, C. Soomlek and P. Seresangtakul, "Increasing the input data length of RSA cryptosystem by applying a hybrid lossless data compression algorithm," Journal of Physics: Conference Series, vol. 1502, no. 1, p. 012036, 2020. 
[5]R. Bharat, M. Gunasekaran and P. Alexender, "Cryptography," in Cybersecurity and Identity Access Management, Singapore, Springer, 2023. 
[6]Y. Hua, F. Yao, L. Chen and W. Chen, "Experimental quantum secure network with digital signatures and encryption," National Science Review, vol. 10, no. 4. 
[7]I. Omar, Y. Sura, H. Isam, A. Wisam and H. Ali, "Implementation of El-Gamal algorithm for speech signals encryption and decryption," Procedia Computer Science, no. 169, pp. 1028-1037, 2020. 
[8]H. Aljaafari and K. Basant, "A Review Paper on DES, AES, RSA Encryption Standards," in 9th International Conference System Modeling and Advancement in Research Trends (SMART), Moradabad, India, 2020. 
[9]O. Elharrouss, N. Almaadeed and S. Al-Maadeed, "An image steganography approach based on k-least significant bits (k-LSB)," in in IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), 2020. 
[10]M. Pascal and A. Tohari, "Information hiding scheme for digital images using difference expansion and modulus function," Journal of King Saud University - Computer and Information Sciences, vol. 31, no. 3, pp. 335-347, 2019. 
[11]S. Lingamallu and V. Vijayaraghavan, "Steganography using wavelet transform for secured data transmission," Journal of Ambient Intelligence and Humanized Computing, vol. 14, p. 9509–9527, 2023. 
[12]M. Khairullah, "A novel steganography method using transliteration of Bengali text," Journal of King Saud University Computer and Information Sciences, vol. 31, no. 3, pp. 348-366, 2019. 
[13]M. Dalal and M. Juneja, "Steganography and Steganalysis (in digital forensics): a Cybersecurity guide," Multimedia Tools and Applications, vol. 80, pp. 5723-5771, 2021. 
[14]A. Abdul, H. Mehdi, W. Ainuddin and I. Yamani, "High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution," Applied Sciences, vol. 8, no. 11, p. 2199, 2018. 
[15]D. Simin and Y. Guodong, "IWT and RSA based asymmetric image encryption algorithm," Alexandria Engineering Journal, no. 66, pp. 979-991, 2023. 
[16]K. Balasubramaniyan, K. Bharath and G. Manikandan, "A Combination of RSA Algorithm with Image Steganography to Ensure Enhanced Encryption," in Second International Conference on Electronics and Renewable Systems (ICEARS), Tuticorin, India, 2023. 
[17]S. T. Mustafa, S. Mohd, M. Mohammed and N. Hiyam, "High payload image steganography scheme with minimum distortion based on distinction grade value method," Multimedia Tools and Applications, vol. 81, no. 18, pp. 25913-25946., 2022. 
[18]N. Karthikeyan, K. Kousalya, N. Jayapandian and G. Mahalakshmi, "Assessment of composite materials on encrypted secret message in image steganography using RSA algorithm," Materials Today: Proceedings, vol. 81, no. 2, pp. 848-852, 2021. 
[19]Z. Hua and H. Liting, "A data hiding scheme based on multidirectional line encoding and integer wavelet transform," Signal Processing: Image Communication, vol. 78, no. 3, p. 331–344, 2019. 
[20]N. Jassim, N. Ahmed, N. Asama, P. Bagus, N. Emil, M. Mardhiah, H. Inge and P. Zico, "Hybrid cryptography and steganography method to embed encrypted text message within image," Journal of Physics: Conference Series, vol. 1339, no. 1, p. 012061, 2019. 
[21]P. Shabir, S. Javaid, A. Jahangir, L. Nazir and B. Ghulam, "Information hiding in edges: A high capacity information hiding technique using hybrid edge detection," Multimedia Tools and Applications, vol. 78, pp. 185-207, 2018. 
[22]A. Moumen and H. Sissaoui, "Images encryption method using steganographic LSB method, AES and RSA algorithm," Nonlinear Engineering, vol. 6, no. 1, pp. 53-59, 2017. 
[23]K. Roselin and T. S. Sharmila, "Performance analysis in secured image encryption and data hiding using LSB algorithm," in IEEE International Conference on Circuits and Systems (ICCS), India, 2017. 
[24]X. Y. Wang, Z. Ying-Qian and B. Xue-Mei, "A colour image encryption scheme using permutation-substitution based on chaos," Entropy, vol. 17, no. 6, pp. 3877-3897, 2015. 
[25]P. Irfan, P. Yudi and R. Imam, "Image encryption using combination of chaotic system and rivers shamir adleman (RSA)," International Journal of Computer Applications, vol. 123, no. 6, 2015. 
[26]Y. Bedir, F. Khalifa and A. Makram, "A novel image encryption/decryption scheme based on integrating multiple chaotic maps," AIP Advances, vol. 10, no. 7, 2020. 
[27]O. F. Abdel, A. I. Hussein and H. Hamed, "Hiding data in images using steganography techniques with compression algorithms," TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 3, pp. 1168-1175, 2019.