Deep Feature–Driven Chaotic Encryption for Secure Medical Image Transmission A Comparative CNN-Based Framework

Authors

  • Najway M. Yaqah Department of Computer Engineering, College of Electronic Technology, Bani Walid, Libya Author
  • Atigah E. Karnaf Department of Computer Engineering, College of Electronic Technology, Bani Walid, Libya Author

DOI:

https://doi.org/10.65419/albahit.v5i2.123

Keywords:

Capacitor Switching, Energization Transient, Overvoltage, Inrush Current, ATP/EMTP, Power System Transients, Sensitivity Analysis, Back-to-Back Switching

Abstract

Secure medical image transmission is a critical requirement in modern telemedicine. This paper proposes a robust hybrid encryption framework that integrates deep feature extraction with chaotic cryptography. Unlike conventional methods, encryption parameters are derived directly from high-level features extracted by pretrained CNNs (ResNet50, AlexNet, and MobileNetV2) to initialize a Logistic Map. This content-dependent key generation enhances resistance against brute-force and differential attacks. Experimental results across multiple modalities (X-ray, MRI, and Color images) demonstrate near-ideal security metrics: NPCR > 99.7% , UACI ≈ 33.3%, and Entropy ≈ 7.63. Robustness analysis confirms successful diagnostic recovery PSNR reached 22.92 dB under Salt-and-Pepper noise attacks, while occlusion recovery achieved 14.35 dB Comparative analysis reveals that while ResNet50 offers maximum sensitivity, MobileNetV2 achieves a 36.5% reduction in execution time, making it ideal for real-time clinical applications. The framework, implemented via MATLAB App Designer, provides secure and computationally efficient encryption with lossless decryption under ideal conditions for next-generation healthcare infrastructures.

References

1 K. M. Hosny, N. I. Ghali, and S. Ghoniemy, “Security of medical images for telemedicine: A systematic review,” Multimedia Tools and Applications, vol. 81, pp. 36959–37008, 2022.

2 G. Kaissis, M. R. Makowski, D. Rueckert, and R. Braren, “Secure, privacy-preserving and federated machine learning in medical imaging,” Nature Machine Intelligence, vol. 2, pp. 305–311, 2020.

3 W. N. Price and I. G. Cohen, “Privacy in the age of medical big data,” Nature Medicine, vol. 25, pp. 37–43, 2019.

4 H. Kolivand et al., “Image encryption framework based on multi-chaotic maps and equal pixel values quantization,” Multimedia Tools and Applications, 2024.

5 U. Zia et al., “Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains,” International Journal of Information Security, vol. 21, no. 2, pp. 247–286, 2022.

6 S. Ibrahim et al., “Framework for efficient medical image encryption using dynamic S-boxes and chaotic maps,” IEEE Access, vol. 8, pp. 192325–192339, 2020.

7 P. Kiran and P. Divakarachari, “Resource optimized selective image encryption of medical images using multiple chaotic systems,” Microprocessors and Microsystems, vol. 89, p. 103442, 2022.

8 B. Zhang and L. Liu, “Chaos-based image encryption: Review, application, and challenges,” Mathematics, vol. 11, no. 11, p. 2459, 2023.

9 A. Abba, N. Ahmed, and H. A. Sulaimon, “Experimental evaluation of various chaos-based image encryption schemes,” Journal of Computational and Theoretical Applications, 2025.

10 J. Chen, L. Chen, and Y. Zhou, “Cryptanalysis of image ciphers with permutation-substitution network and chaos,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 5, pp. 1261–1275, 2020.

11 M. Khan and N. Munir, “Cryptanalysis of image confidentiality scheme based on hybrid chaotic maps,” Journal of King Saud University – Computer and Information Sciences, 2025.

12 Z.-W. Liu, J. Li, and S. Nawaz, “A watermarking framework for encrypted medical images via HC chaotic system and deep learning,” Scientific Reports, 2025.

13 A. S. Nadhan and I. J. Jacob, “Enhancing healthcare security in the digital era: Safeguarding medical images with lightweight cryptographic techniques in IoT healthcare applications,” Biomedical Signal Processing and Control, 2024.

14 J. Oravec, Ľ. Ovseník, and J. Papaj, “An image encryption algorithm using logistic map with plaintext-related parameter values,” Entropy, 2021.

15 Y. Alghamdi and A. Munir, “A lightweight image encryption algorithm based on chaotic map and random substitution,” Entropy, 2022.

16 Y. Wu et al., “Content-adaptive image encryption with partial unwinding decomposition,” Signal Processing, vol. 180, p. 107861, 2021.

17 P. Sarosh, S. A. Parah, and G. M. Bhat, “An efficient image encryption scheme for healthcare applications,” Multimedia Tools and Applications, vol. 81, pp. 11971–12005, 2022.

18 B. Rezaei, M. Mobasseri, and R. Enayatifar, “A secure, efficient and super-fast chaos-based image encryption algorithm for real-time applications,” Journal of Real-Time Image Processing, vol. 20, pp. 315–332, 2023.

19 A. H. Mansour et al., “A new medical image encryption using modular integrated logistic exponential map and multi-level Q-sequence matrix,” Scientific Reports, 2025.

20 S. Prasad and A. K. Singh, “Survey on medical image encryption: From classical to deep learning-based approaches,” Computers & Electrical Engineering, vol. 118, p. 109420, 2024.

21 M. A. Islam et al., “Security and privacy considerations for AI-enabled healthcare systems: A survey,” IEEE Access, vol. 8, pp. 145205–145230, 2020.

22 X. Wang, L. Liu, and Y. Zhang, “A novel hybrid medical image encryption scheme based on chaos and DNA encoding,” Optics and Lasers in Engineering, vol. 137, p. 106383, 2021.

23 H. Liu and X. Wang, “Color image encryption using spatial bit-level permutation and high-dimensional chaotic system,” Optics Communications, vol. 284, no. 16–17, pp. 3895–3903, 2011.

24 R. Enayatifar et al., “Chaotic based image encryption using a hybrid genetic algorithm and a DNA sequence,” Optics and Lasers in Engineering, vol. 51, no. 6, pp. 774–782, 2013.

25 C. Sabet et al., “Cybersecurity in the age of digital pandemics: Protecting patient data in low-income and middle-income countries,” Lancet Global Health, vol. 12, 2024.

26 J. Utzerath and R. Dennis, “Numbers and statistics: Data and cyber breaches under the General Data Protection Regulation,” International Cybersecurity Law Review, vol. 2, pp. 197–209, 2021.

27 W. Moore and S. A. Frye, “Review of HIPAA, Part 2: Limitations, rights, violations, and role for the imaging technologist,” Journal of Nuclear Medicine Technology, vol. 48, no. 1, pp. 4–10, 2020.

28 M. Hasan et al., “Lightweight encryption technique to enhance medical image security on Internet of Medical Things applications,” IEEE Access, vol. 8, pp. 1–15, 2020.

29 X. Zhang et al., “Entropy-based block scrambling image encryption using DES structure and chaotic systems,” International Journal of Optics, vol. 2019, Art. no. 1315426, 2019.

30 A. T. Hashim, A. K. Jabbar, and Q. F. Hassan, “Medical image encryption based on hybrid AES with chaotic map,” Journal of Physics: Conference Series, vol. 1973, Art. no. 012130, 2021.

31 Z. Guitouni, M. A. Ghaieb, and M. Machhout, “Security analysis of medical image encryption using AES modes for IoMT systems,” International Journal of Computer Applications, 2023.

32 M. W. Malik et al., “Development of medical image encryption system using byte-level Base-64 encoding and AES encryption method,” in Proc. 6th Int. Conf. on Communication and Information Processing, 2020.

33 K. Lata, C. Gupta, and L. R. Cenkeramaddi, “A cryptographic framework for secure medical imaging in smart healthcare environments,” Results in Engineering, 2025.

34 W. Feng et al., “Integrating fractional-order Hopfield neural network with differentiated encryption: Achieving high-performance privacy protection for medical images,” Fractal and Fractional, 2025.

35 X.-Y. Wang and X.-L. Du, “Pixel-level and bit-level image encryption method based on logistic-Chebyshev dynamic coupled map lattices,” Chaos, Solitons & Fractals, 2021.

36 H. R. Shakir et al., “A new four-dimensional hyper-chaotic system for image encryption,” International Journal of Electrical and Computer Engineering, 2023.

37 M. Thomas, V. Krishna, and M. Varghese, “Image encryption algorithm with block scrambling based on logistic map,” Indian Journal of Science and Technology, vol. 16, no. 14, 2023.

38 U. Erkan et al., “An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN,” Multimedia Tools and Applications, 2020.

39 K. Raghuvanshi et al., “Image encryption algorithm based on DNA encoding and CNN,” Expert Systems with Applications, 2024.

40 S. Subathra and V. Thanikaiselvan, “Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation,” Scientific Reports, 2025.

41 W. Alexan et al., “A secure and efficient image encryption scheme based on chaotic systems and nonlinear transformations,” Scientific Reports, 2025.

42 Y. Abdul et al., “A dynamic image encryption scheme through 2-D cellular automata and chaotic logistic map,” 2025.

43 A. N. Latifa et al., “Multi-level secure image cryptosystem using logistic map chaos: Entropy, correlation, and 3D histogram validation,” Jurnal Masyarakat Informatika, 2025.

44 E. Güvenoğlu, “An image encryption algorithm based on multi-layered chaotic maps and its security analysis,” Connection Science, 2024.

45 N. Iqbal et al., “An efficient hybrid encryption model based on deep convolutional neural networks, DNA computing and chaotic system,” Multimedia Tools and Applications, 2022.

46 S. Minocha et al., “Adaptive image encryption approach using an enhanced swarm intelligence algorithm,” Scientific Reports, 2025.

47 K. Revathi et al., “An efficient image encryption algorithm using a discrete memory-based logistic map with deep neural network,” Journal of Engineering and Applied Science, 2024.

48 K. He, X. Zhang, S. Ren, and J. Sun, “Identity mappings in deep residual networks,” in Proc. ECCV, 2016.

49 Z. Liu et al., “A two-branch ResNet-BiLSTM deep learning framework for extracting multimodal features,” Sensors, 2025.

50 National Institutes of Health, “ChestX-ray14: Hospital-scale chest X-ray database and benchmarks,” Kaggle.

51 A. Jolfaei and A. Mirghadri, “Image encryption using chaotic maps and hash functions,” Multimedia Tools and Applications, 2019.

52 L. Teng et al., “A novel chaotic image encryption algorithm based on bit-level permutation,” IEEE Access, 2021.

53 S. Behnia et al., “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons & Fractals, 2008.

54 X. Chai et al., “A novel color image encryption algorithm based on DNA sequence and chaotic system,” Optik, 2017.

55 Abuali, T. M., & Algamaty, R. K. (2025). Analyzing AI Applications in Improving Patient Experience: From Diagnosis to Recovery. The Open European Journal for Research in Medical and Basic Sciences (OEJRMBS), 36-47.‏

Downloads

Published

2026-04-05

Issue

Section

Articles

How to Cite

Deep Feature–Driven Chaotic Encryption for Secure Medical Image Transmission A Comparative CNN-Based Framework. (2026). Albahit Journal of Applied Sciences, 5(2), 01-30. https://doi.org/10.65419/albahit.v5i2.123