Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2025 Jul 2;15(1):22628.
doi: 10.1038/s41598-025-04906-4.

Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation

Affiliations

Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation

S Subathra et al. Sci Rep. .

Abstract

Medical image encryption is important for maintaining the confidentiality of sensitive medical data and protecting patient privacy. Contemporary healthcare systems store significant patient data in text and graphic form. This research proposes a New 5D hyperchaotic system combined with a customised U-Net architecture. Chaotic maps have become an increasingly popular method for encryption because of their remarkable characteristics, including statistical randomness and sensitivity to initial conditions. The significant region is segmented from the medical images using the U-Net network, and its statistics are utilised as initial conditions to generate the new random sequence. Initially, zig-zag scrambling confuses the pixel position of a medical image and applies further permutation with a new 5D hyperchaotic sequence. Two stages of diffusion are used, such as dynamic DNA flip and dynamic DNA XOR, to enhance the encryption algorithm's security against various attacks. The randomness of the New 5D hyperchaotic system is verified using the NIST SP800-22 statistical test, calculating the Lyapunov exponent and plotting the attractor diagram of the chaotic sequence. The algorithm validates with statistical measures such as PSNR, MSE, NPCR, UACI, entropy, and Chi-square values. Evaluation is performed for test images yields average horizontal, vertical, and diagonal correlation coefficients of -0.0018, -0.0002, and 0.0007, respectively, Shannon entropy of 7.9971, Kolmogorov Entropy value of 2.9469, NPCR of 99.61%, UACI of 33.49%, Chi-square "PASS" at both the 5% (293.2478) and 1% (310.4574) significance levels, key space is 2500 and an average encryption time of approximately 2.93 s per 256 × 256 image on a standard desktop CPU. The performance comparisons use various encryption methods and demonstrate that the proposed method ensures secure reliability against various challenges.

Keywords: Critical region segmentation; Dynamic DNA encoding; Hyper-chaotic map; Image encryption; U-Net; Zig-zag scrambling.

PubMed Disclaimer

Conflict of interest statement

Declarations. Competing interests: The authors declare no competing interests. Ethics approval: All authors have read, understood, and have complied as applicable with the statement on “Ethical responsibilities of Authors” as found in the Instructions for Authors.

Figures

Fig. 1
Fig. 1
Attractor diagram for NEW 5D Hyper chaotic system.
Fig. 2
Fig. 2
2D-time series plot: (a) 2D-time series plot for chaotic sequence-X, (b) 2D-time series plot for chaotic sequence-Y (c) 2D-time series plot for chaotic sequence-Z.
Fig. 3
Fig. 3
(a) Bifurcation diagram of New 5D Hyperchaotic system, (b) Lyapunov exponent of 5D chaotic system concerning time (c) Lyapunov exponent of 5D chaotic system to the control parameter α.
Fig. 4
Fig. 4
(a) Kolmogorov entropy of new 5D Hyperchaotic system.
Fig. 5
Fig. 5
U-NET Architecture.
Fig. 6
Fig. 6
Proposed block diagram.
None
Algorithm 1: Key Generation
None
Algorithm 2: Function: encrypt_medical_image
Fig. 7
Fig. 7
Zig zag scrambling.
None
Algorithm 3: Zigzag_scramble (image, iterations)
None
Algorithm 4: Permute_pixels (image, sorted_indices)
None
Algorithm 5: Encode_image_to_dna (image, dna_rules).
None
Algorithm 6: Perform_dna_flip(dna_image, flip_positions)
Fig. 8
Fig. 8
(a) Training and validation accuracy of the U-NET network for the RITE dataset (b) Training and validation loss for the RITE dataset.
None
Algorithm7: dna_xor_diffusion(dna_image, chaotic_dna_sequence)
None
Algorithm 8: Function: decrypt_medical_image
Fig. 9
Fig. 9
Drive data set -Test image with predicted retinal Image from U-NET.
Fig. 10
Fig. 10
Rite data set -Test image with extracted retinal Image from U-NET.
Fig. 11
Fig. 11
(a)original image, (b) key image, (c) zig-zag scrambled image, (d)confused image, (e) encrypted image (f) decrypted image (g) original image histogram, (h) key image histogram, (i) zig-zag scrambled image histogram, (j) confused image histogram, (k) encrypted image histogram, and (l) decrypted image histogram.
Fig. 12
Fig. 12
(a) original eye image, (b) predicted retinal image, (c) zig-zag scrambled image, (d) confused image, (e) DNA swapped image (f) chaotic sequence ‘V’-DNA image, (g), DNA XOR image (Final cipher image) and (i) decrypted image.
Fig. 13
Fig. 13
(a) Horizontal correlation of original image and encrypted image, (b) vertical correlation of original image and encrypted image, and (c) Diagonal correlation of original image and encrypted image for Medical Drive test image_1.
Fig. 14
Fig. 14
Histogram analysis of medical images. (a), (b), (c), (d), (e) are the 5 test medical images and (f), (g), (h),(i),(j) the histogram of the input medical images, (k), (l), (m), (n), (o) are the histogram of encrypted medical images.
Fig. 15
Fig. 15
Cropping Images (a) and (b) 5% and 25% vertical cropping image, (c) and (d) 5% and 25% Horizontal cropping image, (e) and (f) 5% and 25% center cropping. (g) and (h) decrypted image of (a) and (b), (i) and (j) decrypted image of (c) and (d), and (k) and (l) decrypted image of (e) and (f).
Fig. 16
Fig. 16
Decrypted image of Salt and pepper noise at noise intensity of (a)1% (b) 3% (c) 10%; Decrypted image of speckle noise at noise intensity of (d)1%, (e) 3%, (f) 10%.
Fig. 17
Fig. 17
(a) &(b) Cipher image rotated by ± 10° (c) & (d) Translated cipher image by ± 10 in both axes (e)&(f) Cipher image scaled by 0.8x,0.9x (g) & (h) Decrypted image of (a&b), (i) &(h) Decrypted image of (c &d), (k)&(l) Decrypted image of (e &f).
Fig. 18
Fig. 18
(a) Original image (b) Decrypted image with change in key x, and (c) Decrypted image with a change in key y.

Similar articles

Cited by

References

    1. Rohhila, S. & Singh, A. K. Deep learning-based encryption for secure transmission digital images: A survey. Comput. Electr. Eng.116, 109236 (2024).
    1. Zia, U. et al. Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. Int. J. Inf. Secur.21, 917–935 (2022).
    1. Singh, A. K., Anand, A., Lv, Z., Ko, H. & Mohan, A. A survey on healthcare data: A security perspective. ACM Trans. Multimed. Comput. Commun. Appl.17, 1–26 (2021).
    1. Prasad, S. & Singh, A. K. Survey on medical image encryption: From classical to deep learning-based approaches. Comput. Electr. Eng.123, 110011 (2025).
    1. Khurana, N. & Dua, M. A novel one-dimensional Cosine within Sine chaotic map and novel permutation–diffusion based medical image encryption. Nonlinear Dyn.109, 1–21 (2024).