{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T15:36:31Z","timestamp":1771342591195,"version":"3.50.1"},"reference-count":38,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T00:00:00Z","timestamp":1652400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSAN"],"abstract":"<jats:p>Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties. This right is typically protected by law through firm regulations set by healthcare authorities. However, sensitive-private data usually requires the application of further security and privacy mechanisms such as encipherment (encryption) techniques. \u2019Medical images\u2019 is one such example of highly demanding security and privacy standards. This is due to the quality and nature of the information carried among these images, which are usually sensitive-private information with few features and tonal variety. Hence, several state-of-the-art encryption mechanisms for medical images have been proposed and developed; however, only a few were efficient and promising. This paper presents a hybrid crypto-algorithm, MID-Crypt, to secure the medical image communicated between medical laboratories and doctors\u2019 accounts. MID-Crypt is designed to efficiently hide medical image features and provide high-security standards. Specifically, MID-Crypt uses a mix of Elliptic-curve Diffie\u2013Hellman (ECDH) for image masking and Advanced Encryption Standard (AES) with updatable keys for image encryption. Besides, a key management module is used to organize the public and private keys, the patient\u2019s digital signature provides authenticity, and integrity is guaranteed by using the Merkle tree. Also, we evaluated our proposed algorithm in terms of several performance indicators including, peak signal-to-noise ratio (PSNR) analysis, correlation analysis, entropy analysis, histogram analysis, and timing analysis. Consequently, our empirical results revealed the superiority of MID-Crypt scoring the best performance values for PSNR, correlation, entropy, and encryption overhead. Finally, we compared the security measures for the MID-Crypt algorithm with other studies, the comparison revealed the distinguishable security against several common attacks such as side-channel attacks (SCA), differential attacks, man-in-the-middle attacks (MITM), and algebraic attacks.<\/jats:p>","DOI":"10.3390\/jsan11020024","type":"journal-article","created":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T08:37:02Z","timestamp":1652431022000},"page":"24","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection"],"prefix":"10.3390","volume":"11","author":[{"given":"Ashraf","family":"Ahmad","sequence":"first","affiliation":[{"name":"Department of Computer Science\/Cybersecurity, Princess Sumaya University for Technology (PSUT), Amman 11941, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6509-2749","authenticated-orcid":false,"given":"Yousef","family":"AbuHour","sequence":"additional","affiliation":[{"name":"Jordan Design Development Bureau (JODDB), National Encryption Center, Amman 11180, Jordan"}]},{"given":"Remah","family":"Younisse","sequence":"additional","affiliation":[{"name":"Department of Computer Science\/Cybersecurity, Princess Sumaya University for Technology (PSUT), Amman 11941, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6905-3827","authenticated-orcid":false,"given":"Yasmeen","family":"Alslman","sequence":"additional","affiliation":[{"name":"Department of Computer Science\/Cybersecurity, Princess Sumaya University for Technology (PSUT), Amman 11941, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9287-6776","authenticated-orcid":false,"given":"Eman","family":"Alnagi","sequence":"additional","affiliation":[{"name":"Department of Computer Science\/Cybersecurity, Princess Sumaya University for Technology (PSUT), Amman 11941, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2422-0297","authenticated-orcid":false,"given":"Qasem","family":"Abu Al-Haija","sequence":"additional","affiliation":[{"name":"Department of Computer Science\/Cybersecurity, Princess Sumaya University for Technology (PSUT), Amman 11941, Jordan"}]}],"member":"1968","published-online":{"date-parts":[[2022,5,13]]},"reference":[{"key":"ref_1","unstructured":"(2022, February 12). Electronic Health Solutions. Available online: https:\/\/ehs.com.jo\/hakeem-program."},{"key":"ref_2","unstructured":"Anand, D., and Niranjan, U. (1998, January 1). Watermarking medical images with patient information. Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society Vol. 20 Biomedical Engineering Towards the Year 2000 and Beyond (Cat. No. 98CH36286), Hong Kong, China."},{"key":"ref_3","unstructured":"Wang, J.Z., and Wiederhold, G. (1998). System for efficient and secure distribution of medical images on the Internet. Proceedings of the AMIA Symposium, American Medical Informatics Association."},{"key":"ref_4","unstructured":"Aslan, P., Lee, B., Kuo, R., Babayan, R.K., Kavoussi, L.R., Pavlin, K.A., and Preminger, G.M. (1998). Secured medical imaging over the Internet. Medicine Meets Virtual Reality, IOS Press."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Pavithra, V., and Jeyamala, C. (2018, January 13\u201315). A Survey on the Techniques of Medical Image Encryption. Proceedings of the 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, India.","DOI":"10.1109\/ICCIC.2018.8782432"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Abu Al-Haija, Q., Krichen, M., and Abu Elhaija, W. (2022). Machine-Learning-Based Darknet Traffic Detection System for IoT Applications. Electronics, 11.","DOI":"10.3390\/electronics11040556"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1049\/iet-ifs.2014.0245","article-title":"Crypto-based algorithms for secured medical image transmission","volume":"9","author":"Abandah","year":"2015","journal-title":"IET Inf. Secur."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1821","DOI":"10.1016\/j.sjbs.2017.11.023","article-title":"Adaptive medical image encryption algorithm based on multiple chaotic mapping","volume":"24","author":"Chen","year":"2017","journal-title":"Saudi J. Biol. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.jare.2018.01.009","article-title":"Generalized double-humped logistic map-based medical image encryption","volume":"10","author":"Ismail","year":"2018","journal-title":"J. Adv. Res."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"22787","DOI":"10.1007\/s11042-017-5534-8","article-title":"A new simple chaotic system and its application in medical image encryption","volume":"77","author":"Liu","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2517","DOI":"10.1007\/s11517-019-02037-3","article-title":"Medical image encryption using fractional discrete cosine transform with chaotic function","volume":"57","author":"Kumar","year":"2019","journal-title":"Med. Biol. Eng. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","article-title":"Medical image encryption based on improved ElGamal encryption technique","volume":"147","author":"Laiphrakpam","year":"2017","journal-title":"Optik"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","article-title":"Medical image encryption using edge maps","volume":"132","author":"Cao","year":"2017","journal-title":"Signal Process."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","article-title":"Medical image encryption using high-speed scrambling and pixel adaptive diffusion","volume":"144","author":"Hua","year":"2018","journal-title":"Signal Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.optlaseng.2018.05.009","article-title":"Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices","volume":"110","author":"Nematzadeh","year":"2018","journal-title":"Opt. Lasers Eng."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Fofanah, A.J., and Gao, T. (2020, January 8\u201311). Dual Watermarking for Protection of Medical Images based on Watermarking of Frequency Domain and Genetic Programming. Proceedings of the 2020 the 4th International Conference on Innovation in Artificial Intelligence, Xiamen, China.","DOI":"10.1145\/3390557.3394308"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"19803","DOI":"10.1007\/s11042-020-10308-7","article-title":"Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR","volume":"80","author":"Deb","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_18","first-page":"105","article-title":"Implementing variable length Pseudo Random Number Generator (PRNG) with fixed high frequency (1.44 GHZ) via Vertix-7 FPGA family","volume":"1","author":"Jebril","year":"2015","journal-title":"Netw. Secur. Commun. Eng."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Adithya, N., Nalajala, H.K., Sivaraman, R., Sridevi, A., Rengarajan, A., and Rajagopalan, S. (2021). Chaos Blend LFSR\u2014Duo Approach on FPGA for Medical Image Security. Emerging Technologies in Data Mining and Information Security, Springer.","DOI":"10.1007\/978-981-15-9774-9_15"},{"key":"ref_20","first-page":"1","article-title":"A Double Stage Implementation for 1-K Pseudo RNG using LFSR and TRIVIUM","volume":"11","author":"Ibrahim","year":"2018","journal-title":"J. Comput. Sci. Control Syst."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Masood, F., Driss, M., Boulila, W., Ahmad, J., Rehman, S.U., Jan, S.U., Qayyum, A., and Buchanan, W.J. (2021). A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wireless Personal Communications, Springer.","DOI":"10.1007\/s11277-021-08584-z"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1925","DOI":"10.1007\/s11042-020-09672-1","article-title":"A new efficient medical image cipher based on hybrid chaotic map and DNA code","volume":"80","author":"Guesmi","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"10723","DOI":"10.1007\/s11042-020-09930-2","article-title":"A novel and efficient amino acid codon based medical image encryption scheme colligating multiple chaotic maps","volume":"80","author":"Barik","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Mishra, P., Bhaya, C., Pal, A.K., and Singh, A.K. (2021). A medical image cryptosystem using bit-level diffusion with DNA coding. J. Ambient. Intell. Humaniz. Comput., 1\u201322.","DOI":"10.1007\/s12652-021-03410-7"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.4218\/etrij.2020-0203","article-title":"Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution","volume":"43","author":"Parikibandla","year":"2021","journal-title":"ETRI J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","article-title":"A new image encryption algorithm for grey and color medical images","volume":"9","author":"Kamal","year":"2021","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Ma, J., Wang, Y., Niu, X., Jiang, S., and Liu, Z. (2022). A comparative study of mutual information-based input variable selection strategies for the displacement prediction of seepage-driven landslides using optimized support vector regression. Stoch. Env. Res. Risk. Assess., 1\u201321.","DOI":"10.1007\/s00477-022-02183-5"},{"key":"ref_28","unstructured":"(2022, March 03). Rotating Keys, Cloud kms Documentation, Google Cloud 2022. Available online: https:\/\/cloud.google.com\/kms\/docs\/key-rotation."},{"key":"ref_29","unstructured":"(2022, March 03). Rotating AWS KMS keys-AWS Key Management Service. Available online: https:\/\/docs.aws.amazon.com\/kms\/latest\/developerguide\/rotate-keys.html."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Canni\u00e8re, C.D., and Preneel, B. (2008). Trivium. New Stream Cipher Designs, Springer.","DOI":"10.1007\/978-3-540-68351-3_18"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Chen, S., Wang, R., Wang, X., and Zhang, K. (2010, January 16\u201319). Side-channel leaks in web applications: A reality today, a challenge tomorrow. Proceedings of the 2010 IEEE Symposium on Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/SP.2010.20"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Oswald, E., Mangard, S., Pramstaller, N., and Rijmen, V. (2005). A side-channel analysis resistant description of the AES S-box. International Workshop on Fast Software Encryption, Springer.","DOI":"10.1007\/11502760_28"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Renauld, M., Standaert, F.X., and Veyrat-Charvillon, N. (2009). Algebraic side-channel attacks on the AES: Why time also matters in DPA. International Workshop on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/978-3-642-04138-9_8"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Bogdanov, A. (2007). Improved side-channel collision attacks on AES. International Workshop on Selected Areas in Cryptography, Springer.","DOI":"10.1007\/978-3-540-77360-3_6"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Neve, M., Seifert, J.P., and Wang, Z. (2006, January 21\u201324). A refined look at Bernstein\u2019s AES side-channel analysis. Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, Taipei, Taiwan.","DOI":"10.1145\/1128817.1128887"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/TC.2004.13","article-title":"Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity","volume":"53","author":"Ciet","year":"2004","journal-title":"IEEE Trans. Comput."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Izu, T., and Takagi, T. (2002). A fast parallel Elliptic curve multiplication resistant against side channel attacks. International Workshop on Public Key Cryptography, Springer.","DOI":"10.1007\/3-540-45664-3_20"},{"key":"ref_38","unstructured":"Joye, M., and Yen, S.M. (2002). The Montgomery powering ladder. International Workshop on Cryptographic Hardware and Embedded Systems, Springer."}],"container-title":["Journal of Sensor and Actuator Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2224-2708\/11\/2\/24\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:10:19Z","timestamp":1760137819000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2224-2708\/11\/2\/24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,13]]},"references-count":38,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,6]]}},"alternative-id":["jsan11020024"],"URL":"https:\/\/doi.org\/10.3390\/jsan11020024","relation":{},"ISSN":["2224-2708"],"issn-type":[{"value":"2224-2708","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,13]]}}}