1. Introduction
Dachselt et al. [
1] presented their opinion on the connection between chaos and cryptography (CRY), and many investigations have been conducted on the application of chaotic behavior to encryption. A chaotic masking (MAS) encoder consists of a chaotic encryption module, whose output chaos-based signal is added to the information signal. This sum is transmitted over a secure communication (SEC) or data encryption (DE) channel. A chaos shift keying encoder comprises two or more chaotic encryption modules with different parameters. The initial values and control parameters are used to iterate the chaotic maps to generate a real-number time series for the encryption. One of these, whose output signal sum is transmitted over the SEC or DE channel, is selected according to the discrete information signal. A chaos-based encryption algorithm is characterized by sensitive dependence on initial and chaotic system parameters, pseudorandomness, unpredictability, and a lack of periodic behavior. Jakimoski et al. [
2] discussed the effects of chaotic encryption techniques on block ciphers (BCs) and presented several chaotic BCs. The highly unpredictable and random-looking trajectory of chaos-based signals is the most attractive characteristic of deterministic chaotic encryption technologies and may lead to novel CRY applications. A logistic map (LM) has been used for BCs to achieve DE and SEC. Exclusive or (XOR) operation has been integrated into LM-based BCs, and the key space (KSP) measures of these BCs have been analyzed. Medical information encryption protects information from undesirable attacks by converting it into an unrecognizable form [
3]. This rapidly advancing technology can be applied to medical image (MI) storage, transmission, telemedicine, telehealth, and healthcare. Medical data encryption mainly involves scrambling (SCR) of the content of clinical biomedical data, such as text, MIs, electrocardiography (ECG), electroencephalography (EEG), peripheral capillary oxygen saturation, blood pressure, body temperature, biomedical signals, audio, and video to make clinical biomedical data unreadable, invisible, or incomprehensible during SEC. The aim is to protect clinical biomedical data against attacks. The encryption procedure may use plaintext (original biomedical signals), an encryption process, or ciphertext (encrypted biomedical signals). The characteristics of chaotic systems include sensitive dependence on initial conditions and chaotic parameters, random-like behavior, and continuous broad-band power spectral bandwidth [
4]. Chaos theory has extensive applications in the field of CRY. Almost all chaos-based encryption mechanisms use dynamical and nonlinear functions that are defined on a set of real numbers, and the possible relationships between chaos and CRY have been explored. The iterations of a chaos-based map can spread from the initial region over the entire real-number time series (space), leading to the desired diffusion (DIFF) and confusion (CONF) of CRY features. Ou [
5] noted the relationships between chaotic theory and CRY, and derived BCs with 128-bit symmetric keys (SKs) from an LM using appropriate parameters and initial values. Chaos-based encryption mechanisms are highly unpredictable and are suitable candidates for pseudorandom number generators (PRNGs) and massive MIs CRY.
The permutation (PER), XOR, substitution (SUB), transform (TRAN), global and local information entropy (GLIE), and neural network (NN) operations are commonly integrated into chaos-based image encryption (IE). Chaotic SKs, asymmetric keys (ASKs), BCs, and stream ciphers (SCs) have been discussed for IE [
6]. A chaotic system is represented by a pseudorandom real-number time series, and unpredictable complex behaviors are exhibited in deterministic dynamical and nonlinear algorithms owing to the sensitivity to the initial values and control parameters. The integration of chaotic CRY with LM, tent map (TM), Arnold cat map (ACM), piecewise linear map (PLM), and Henon map (HM) PNG has been demonstrated to generate cipher images using XOR, PER, TRAN, and NN operations. The security evaluation methods (SECEVAMs) for IE CRY include KSP, key sensitivity (KSS), histogram analysis (HA), pixel correlation (PC), GLIE, unified averaged changed intensity (UACI), and number of pixel change rate (NPCR). IE algorithms with high encryption and decryption efficiency are required because image signals are at serious risk of privacy leakage [
7]. When the amount of image information is very large, meeting the real-time (RT) encryption requirements becomes difficult. Therefore, chaotic algorithms offer significant advantages in terms of IE. The cosine map (CM), LM, TM, cosine-sine map (CSM), and logistic sinusoidal map (LSM) exhibit good chaotic dynamic performance and can be applied to IE. High-encryption strength analysis methods for the related chaotic IE have been developed to meet the requirements of high encryption security. The SECEVAMs for chaotic IE algorithms include NPCR, UACI, HA, PC, adjacent correlation coefficient (ACC), GLIE, KSP, KSS, and time complexity analysis (TCA). The optimal ACC index between plain and cipher images should be close to zero, and higher GLIE and KSP indices in cipher images are better. The optimal NPCR and UACI values are 0.9961 and 0.3347, respectively. Shorter IE runtimes in time complexity analyses are better. The Chebyshev polynomial map (CPM) can provide better protection when it is adopted for public-key CRYs, that is, the advanced encryption standard (AES), data encryption standard (DES), and Rivest-Shamir-Adleman (RSA) [
8]. Chaotic encryption has a better computational efficiency for RT image and video CRY. Image CRY is described as the process of converting significant information into an unrecognizable form. Chaotic IE architecture generally includes the CONF and DIFF phases. The TM, LM, LSM, and CPM have been used for IE. Security analysis is performed to quantify the performance of encryption technologies. Security analysis consists of the differential analysis of NPCR and UACI parameters, statistical analysis of HA and PC parameters, key analysis of KSP and KSS parameters, and analysis of GLIE parameters.
The problems and effectiveness of advanced sixth-generation mobile communication schemes, which are integrated into applications and the Internet of Medical Things (IoMT), for detecting, and mitigating the spread of COVID-19 and designing healthcare infrastructures for future pandemics have been introduced [
9]. Lin [
10] studied several mobile telemedicine technologies. Such technologies are expected to become ubiquitous for the delivery of biomedical signals in medicine. Time-frequency feature extractions of biomedical signals, such as EEG, ECG, and speech signals using Hilbert–Huang transformation-based analysis, have also been discussed [
11].
Lin et al. [
12] proposed a dimensional (1D) chaotic CRY for clinical EEG signals. The 1D chaotic LM-based SCR, discard, and PER technologies were used to achieve clinical EEG visual encryption. The security level of the chaos-based encryption mechanism was evaluated using visual analysis (VA), normalized correlation coefficient (NCC), and percent root-mean-square difference (PRD) values. A two-dimensional (2D) chaotic EEG CRY has also been developed and can be applied to mobile SEC [
13]. 2D chaotic LM-based SCR, discard, and PER operations have been used. The cryptanalysis schemes included VA, NCC, PRD, and bit error rate (BER). The chaotic EEG system of CRY was implemented using Microsoft Visual Studio Development Kit and C# programming language, as it can run on computers with the Microsoft Windows operating system [
14]. The operations included LM, discard, SCR, XOR, and PER. The PRD and TCA parameters of the original and cipher EEG signals were explored for differential attack evaluation. Lin [
15] proposed a chaos-based visual CRY method using an empirical mode decomposition (EMD) scheme for 1D clinical EEG signals. He used 2D LM-based encryption SCR, and a 2D block interleaver method to provide a robust and unpredictable intrinsic mode function (IMF)-based visual encryption algorithm. The security level of the chaos-based visual CRY mechanism was evaluated using VA, mean square error (MSE), and Pearson’s correlation coefficient (PCC) values.
Table 1 lists the technical notes of the chaos-based encryption concepts.
There are many literature reviews and concept articles demonstrating chaotic text, voice, data, image, and video signal encryption. However, reviews and concept articles on chaotic medical image encryption (MIE) are rare. Therefore, this study focuses on chaotic MIEs. Medical clinical images have a larger number of bits and share similarities with video media encryption. Chaos-based encryption algorithms are characterized by their sensitive dependence on initial and chaotic system parameters, pseudorandomness, unpredictability, and lack of periodic behavior, and are suitable for the encryption of a larger number of bits. Chaos-based encryption mechanisms are highly unpredictable and are suitable candidates for pseudorandom number generators (PRNGs) and massive MIs. RT and robust chaos-based medical image encryption (MIE) systems with a high security level, large key space, high unpredictability, better bifurcation behavior, low computational complexity, and good encryption outcomes could be achieved. Chaotic MIE has become an important research area in advanced MIE strategies. Chaotic MIE technology can be used in MI storage systems, cloud-based medical systems, healthcare systems, telemedicine, mHealth, picture archiving and communication systems, digital imaging and communication in medicine, and telehealth. By revealing the basic principles of chaos-based MIE, this study aims to inspire innovative design methods in this field to improve encryption speed, accuracy, and security robustness.
This part of this article has been published by the International Conference on Advanced Communications Technology (ICACT) 2025 [
16]. The remainder of this study is organized as follows.
Section 2 presents chaos-based MIE methods, demonstrating the technical notes on the design issues of MIE technologies resistance to various attacks. In
Section 3, discussions of the technical features and effectiveness, basic chaotic maps, and security evaluation analyses that are used for chaos-based MIE using region of interest (ROI), deoxyribonucleic acid (DNA), and artificial intelligence (AI) schemes are outlined. In
Section 4, illustrations of chaos-based MIE applied to medical cloud, IoMT, mHealth, healthcare, and telemedicine are demonstrated. Finally,
Section 5 and
Section 6 present the discussions, and conclusions of this study.
2. The Study of Chaos-Based MIE
Table 2 shows the technical notes of chaos-based MIE concepts. Novel encryption/decryption technologies with perturbation (PERT), PER, and SUB operations have been proposed to protect MIs [
17]. Two novel 2D chaotic map-based cipher approaches have been proposed to enhance the robustness and reduce the security breach risks for MIE. Statistical and security analysis of the MIE was performed using the NPCR (99.814%), UACI (33.694%), peak signal-to-noise ratio (PSNR) (7.723 dB), and GLIE (7.998). The mean square error (MSE), NCC, and TCA were also utilized. An improved chaotic cryptosystem with 2D LM, baker map (BM), and HM has also been developed for the rapid protection and encryption of MIs [
18]. The complex chaotic PNG, PER, XOR, SCR, and SUB operations were integrated to generate a high encryption mechanism that exhibits high random behavior, high complexity, a large KSP, unpredictability, high entropy, and high-level security. SECEVAMs were performed using PSNR, HA, NCC, GLIE, KSP, KSS, NPCR, and UACI. A chaotic CRY for digital imaging and communication in medicine (DICOM) images of 16-bits has been proposed using a new enhanced chaos-based economic map (ECEM) [
19]. The ECEM was designed according to an economic map, and it exhibited better bifurcation behavior, a large KSP, a better SCR operation, and positive Lyapunov exponent values. The pixel operations of PER, DIFF, SUB, MAS, SCR, and swapping (SWA) were considered to resist brute-force attacks to overcome the challenges of DICOM MIE. SECEVAMs using HA, KSS, KSP, NPCR, UACI, GLIE, and PC were analyzed. HA presented a graph of the pixel distribution of plain DICOM images, which had a meaningful regular distribution, and the HA of cipher DICOM images had a uniform distribution. The PC values of two adjacent pixels in an original image provided significant information. The PC values of the original image were high, and the original image was informative. In contrast, the PC values of the cipher image were low.
MIE technology based on a hyperbolic sine chaotic map (HSCM) with enhanced nonlinearity has been proposed [
20], in which the XOR, PNG, PER, SCR, and DIFF operations were used to provide a higher security level. The performance analysis of security using the KSP, KSS, variance of histograms (VARH), NCC, NPCR, and UACI parameters was outlined in detail. The protection of patient privacy and clinical MIs has attracted considerable interest [
21]. A large volume of MIs must be encrypted in RT. An MIE framework based on the BM and HM was proposed. The encryption framework included the PNG, DIFF, CONF, S-box, MAS, SUB, and XOR operations. A detailed SECEVAM was performed, including statistical analyses of the HA, PC, differential analyses of the UACI and NPCR, KSS and KSP analyses, and TCA. The MIE scheme achieved a higher security level and faster encryption speed. Multilevel chaos-based encryption with a SUB mechanism using three-dimensional (3D)-chaotic maps (SM, LM, and cubic maps (CUMs) have evolved as frameworks for enhancing the KSP, pixel DIFF, encryption speed, reliability, security, and robustness of MIs [
22]. The PER (CONF) encryption methodology has also been implemented using an ACM in MIE. The CONF-DIFF and PER-SUB architectures are commonly used for MIE. CONF is widely used in CRY and is defined as the property whereby the relationship between the encryption key and cipher MI is hidden. This indicates that even with a small change in the encryption KSS, there should be a large change in the encrypted MIs. DIFF is defined as a property whereby the relationship between a plain image and a cipher image is hidden. This indicates that a small change in the plain image significantly alters the cipher image. The BC, SC, SK, and ASK mechanisms have been demonstrated in MIE. Chaos-based MIE has received significant attention for achieving RT MIE. KSS, statistical, and performance analyses have been performed using the HA, GLIE, PC, KSS, KSP, PSNR, mean absolute error (MAE), MSE, root mean square error (RMSE), and universal image quality index (UIQI) parameters and chaos-based encryption schemes have a large KSP and KSS to resist brute-force attacks.
A chaotic encryption algorithm based on the high-speed PER process of the Secure Hash Algorithm (SHA)-256 hash function (HF), and the adaptive DIFF of the Chen-based hyperchaotic map (CHCM) has been developed to protect MIs against attacks [
23]. Security criteria were observed using HA, HA with the chi-square test (CSQT), PC, GLIE, KSS, KSP, PSNR, NPCR, and UACI. The chaos-based MIE mechanism exhibited excellent performance in terms of efficiency and reliability. A new MIE scheme has been presented, in which the linear feedback shift register (LFSR) was adopted as a PNG [
24]. The MIs were randomized using the logistic-tent map (LTM), and SCR using the ACM. A cipher MI can be generated using the XOR, PNG, randomized, and SCR operations. MIE commonly applies SCR to remove the correlation between neighboring pixels of MIs by shifting their positions. The ACM can be easily integrated and exhibits superior ergodic properties. Encryption and decryption performances have been estimated using TCA, VARH, PC, GLIE, NPCR, UACI. KSS, PSNR, and structural similarity index measurement (SSIM). Encryption architectures using PER and DIFF have also been introduced [
25]. The SK-based Latin square was used to randomize the pixels of the original image into different rows and columns, effectively decreasing the high correlations between adjacent pixels, and various images exhibited different PER effects. The four-dimensional memristive chaotic sequence (4D MCS) used in the PER and DIFF processes, and the SHA-256 HF were integrated into the MIE system. The security level of the proposed chaos-based encryption methods has been evaluated using HA, KSP, KSS, VARH, PC, GLIE, NPCR, and UACI. Chaos-based MIE has been demonstrated as highly secure and robust. An MIE scheme based on a chaotic PER-DIFF structure has been introduced [
26], and LSM and LTM were adopted to enhance the KSS and generation to improve the security of MIs. A zigzag TRAN scanning operation was used to increase the robustness and efficacy of encryption technology. The DES, AES, and RSA encryption algorithms are not suitable for MIs because of the larger number of bits of MIs, low security, and low efficiency. Chaotic maps have excellent characteristics, such as randomness, ergodicity, sensitivity to the initial parameters, and chaotic control parameters. Thus, chaos-based encryption is more suitable for medical applications. The KSS, KSP, HA, CSQT, PC, ACC, MSE, NPCR, UACI, and MAE evaluation schemes have been used to confirm satisfactory security level requirements for MIE.
Securing MIs and electronic patient reports (EPRs) through chaotic encryption schemes has become a primary concern in both research and commercial fields [
27]. CRY of DICOM images and EPRs has been performed using the LM, XOR, and nonlinear feedback shift register (NLFSR) operations. The HA, SSIM, PSNR, NCC, KSP, KSS, GLIE, RMSE, NPCR, and UACI analysis methodologies have been used to validate the chaotic cipher. Advanced lightweight MIE technology includes the LM, Brownian motion, XOR, PNG, and CHCM operations [
28]. MIE schemes can be implemented using the PER (CONF) and SUB (DIFF) approaches. The encryption performance of MIE technologies has been investigated using HA, ACC, NPCR, UACI, MSE, PSNR, GLIE, and TCA. The histogram of the cipher MI should have a uniform distribution and should not have peak values. An innovative and rapid MIE technology using chaotic LM and PNG has been developed [
29]. The PER and SUB of the pixels in the MI were calculated using chaotic LM and XOR operations. Cryptanalysis of the proposed algorithm, in which the KSP, TCA, HA, MSE, PSNR, NCC, KSS, NPCR, UACI, and GLIE were used, was performed to verify the effectiveness and robustness of the technology. The results indicated that the MIE technology exhibits excellent security. An efficient and encrypted MIE method in which the SUB, DNA, LM, PNG, TM, CONF, and XOR operations are adopted has been reported [
30]. Many cryptanalysis methods based on chaos theory have been used, including the KSP, KSS, HA, NPCR, UACI, PC, NCC, GLIE, and PSNR.
SC-based chaotic LM and CPM encryption schemes with SCR technology have been shown to achieve a higher encryption level in MIE and possess a better anti-attack ability [
31]. An analysis using the MIE visual effect, KSS, and NPCR demonstrated that MI information could be protected more effectively. The RT and robust CRY methodology of MIE was employed across two steps of CON by rearranging array indices adopting a TM and establishing an S-box algorithm generated from the 2D HM [
32]. The Lyapunov exponents and bifurcation diagrams of the chaotic dynamic behaviors for the S-box were demonstrated. The pseudorandom bit generator (PRBG) was constructed based on the DIFF approach. The SCR, XOR, and PER operations were utilized in the MIE. The SECEVAMs focused on information entropy (InE), HA, ACC, UACI, NPCR, KSP, KSS, and TCA. The MIE satisfied good encryption efficiency and exhibited resilience against differential and statistical attacks. Lightweight MIE requires a more secure and efficient encryption algorithm [
33]. A plaintext-related and ciphertext feedback mechanism (PRCFM) has been innovated using a 1D sine arcsin chaotic map (SACM) for the SCR-DIFF CRY approach to resist plaintext attack. The 1D SAM chaotic map had a larger chaotic range and enhanced dynamic complexity. PER and SHA-256 operations were integrated into the encryption framework. The SECEVAMs involved KSP, MSE, PSNR, HA, ACC, InE, NPCR, UACI, KSS, and TCA. The CRY system provided acceptable performance in both encryption time and robust security. The Tent-May chaotic map (TMCM) was designed to generate PRBG as BC encryption [
34]. The S-box and XOR operations were combined into the BC encryption, enhancing security and increasing the strengths of TMCM. The BC encryption involved block-wise SUB and PER. Security performance analysis included homogeneity analysis (HOA), energy, contrast, ACC, InE, MSE, RMSE, PSNR, average difference (AD), maximum difference (MD), structural content (STC), NCC, normalized absolute error (NAE), NPCR, UACI, and blocked average changing intensity (BACI). The MIE was able to combat statistical attacks and had better accuracy and security.
A new five-dimensional (5D) multi-band multi-wing chaotic map (MBMWCM) has been adopted in the MIE system, and a 5D MBMWCM with a relatively large Lyapunov exponent has been used to generate chaotic encryption sequences [
35]. Quick response (QR) decomposition, XOR, and bit-level SCR operations were integrated into the MIE system, and InE, KSP, HA, KSS, NPCR, UACI, and ACC of the security parameters were evaluated.
The KSP of the MIE was relatively large, the KSS was relatively strong, and it resisted statistical attacks better for medical images. The chaos-based JPEG2000 MIE has been developed, with JPEG2000 being a wavelet TRAN-based MI format [
36]. 2D chaotic LM phase SCR, chaotic PER, and single-layer chaos-based MI pixel SCAN operations were performed. The security evaluation methods of VA, NCC, and PSNR were adopted.
3. Chaos-Based MIE Using ROI, DNA, and AI Schemes
Table 3 shows the technical notes of chaos-based MIE using the ROI, DNA, and AI schemes. Traditional chaos-based maps with problems relating to small chaotic ranges suffer from blank and stable windows [
37]. An advanced MIE algorithm using an improved cosine fractional chaotic map (ICFCM) has been proposed, which has a wider and more uniform chaotic range, a more positive Lyapunov exponent, and non-blank and non-stable windows. This technology consists of four steps for encrypting an image. In the first step, three intermediate keys are produced. In the second step, three chaotic sequences are generated using the novel ICFCM, tangent over cosine map (ToCCM), and CPM. The third step integrates DNA encoding and DIFF using the DNA operation. Finally, in the fourth step, the three modules of the color cipher image are generated using the DNA addition operation between the DNA encoded image color modules, and distinct DNA encoded chaotic sequences for each module. DNA operations can improve the security of CRY algorithms. The features of DNA operations include huge storage, low power requirements, and extreme parallelism, and they can be integrated into chaos theory. The PC, ACC, KSP, bit correct ratio (BCR), MSE, PSNR, TCA, GLIE, NPCR, and UACI were used as the cryptanalysis parameters in the above study.
MIs can be divided into the ROI and the region of background (ROB) [
38]. The ROI is the part of an MI with diagnostic information, and the ROB is the part without visual or medical significance. Full and semi-full MIE modes using a variable-dimension chaotic map-based LM have been proposed. The 2D chaotic modified LM (MLM), SHA-256 HF, ROI, ROB, PER, and SUB operations were integrated into the semi-full CRY mode. The PER operation was used to encrypt the ROI, and the SUB operation was used to encrypt the entire image. The 3D/4D MLM, SHA-256 HF, PER, and SUB operations were integrated into the full CRY mode. CONF, which is used to change the pixel positions in medical images, has also been denoted as “PER”, “shuffle”, or “SCR”, in different articles, whereas DIFF, which is used to change the value of pixels in MIs, has also been defined as “SUB” or “MAS”. The GLIE, NCC, KSS, KSP, NPCR, UACI, and TCA parameters were analyzed to evaluate the effectiveness of the cipher image. The analysis results showed that the semi-full CRY mode exhibited good security performance and a lower time complexity, whereas the full CRY mode exhibited better security performance and a higher time complexity. Zhang et al. [
39] proposed an MIE method that focuses on the ROI within massive MIs. The ROI and ROB were segmented from the MIs. The ROIs of the massive MIs were encrypted using Lorenz hyperchaotic maps (LHM) and the HM, XOR, SCR and DIFF operations. HA, VARH, GLIE, PC, ACC, NPCR, UACI, SSIM, KSP, KSS, and TCA were employed for the evaluation of the massive MIs. The chaos-based massive MIE technology used 13 parameters in the encryption approach, and the calculation accuracy of the 64-bit double precision data was
. Therefore, the KSP value of the massive MIE was
thereby exhibiting higher security and encryption efficiency.
Chaotic CRY systems exhibit the encryption characteristics of unpredictability, pseudorandomness, and initial value sensitivity [
40]. 1D chaotic maps, such as the LM and sine map (SM), have small parameter ranges and limited chaotic behavior. Multidimensional chaotic maps have long generation times and are expensive. A bifurcation diagram and the Lyapunov exponent of the LSM showed that it has good CRY characteristics. The LSM has a shorter operation time complexity, a larger encryption parameter range, better randomness and better KSP. The clinical image had a high correlation between the image pixels and the centralized distribution of the clinical image information. The intra- and inter-block SCR schemes were adopted to encrypt the ROI and the entire image, respectively. The chaotic time sequences performed by the LSM were utilized for each pixel value after the nonlinear operation to achieve the SUB effect. The hash operation of the SHA-512 HF was integrated into the clinical IE system. The encryption effects related to the KSP, KSS, HA, PC, ACC, GLIE, NPCR, UACI, histogram uniformity (HU), and TCA parameters were compared. The analysis results demonstrated that the LSM-based MIE system has high encryption efficiency, can achieve good practicality, and is resistant to attack. MIE should be as efficient as possible [
41]. Low computational complexity technologies have been proposed to secure MIs, from which the BC-based ROI and ROB operations have been extracted. The significant ROI was encrypted using the PER operation with the ACM and angle value. Subsequently, the duffing map (DM) and XOR operations were used to achieve the DIFF function for the PER-based ROI, and the ROB was not encrypted. A performance evaluation of the chaotic MIE system was performed using the HA, GLIE, MSE, NPCR, UACI, SSIM, BER, NCC, PSNR, KSP, and TCA. Demirkol et al. [
42] integrated a new nonlinear memristor-based chaotic circuit (MCC), DNA coding scheme, XOR operation, and DIFF-CONF method to design an RT MIE system applied to the healthcare industry. Sufficient security was provided for the SEC. The randomness of the new nonlinear MCC-based chaotic time sequences was verified by their chaos-based dynamic behavior using the demonstration of the phase portraits, Lyapunov exponents, and the bifurcation diagrams. The main advantages related to the use of the DNA coding scheme were the large KSP, and low computational power. The evaluation metrics included TCA, HA, UACI, NPCR, and GLIE. It was suitable for MIE purposes, with resistance against various attacks, and high plaintext sensitivity was achieved.
Most MIE algorithms have demonstrated the encryption MIs in common formats; however, specific and MI formats are often not considered [
43]. DICOM MIs have a large volume and high computational complexity, and efficient and secure CRY methods are an important challenge for DICOM MIs. The 3D spatiotemporal coupled chaotic lattice map (SCCLM) has been adopted for DICOM MIE, providing the complexity of chaotic sequences and enhancing the robust function of MIE. Double-layer random DNA encoding DIFF process, fractal random PER process, and SHA-256 operation have been combined into the CRY system. Security performance evaluations of HA, MSE, PSNR, SSIM, ACC, InE, KSP, NPCR, UACI, and KSS have been discussed. The CRY algorithm has been shown to perform better in solving plaintext, statistical, and differential attacks, and it can be used in the field of MIE.
A selective region MIE approach based on the cosine-cubic cascaded map (CCCM) has been proposed [
44]. The CRY system consists of two stages: ROI CRY and full MIE. CCCM had better KSP, and fast computation and low complexity of low-dimensional chaotic characteristics were achieved. Edge detection was utilized on MIs to generate the ROI. The modified 2D Joseph traversal CONF mechanism was combined to SCR the positions of pixels in each sub-block, and further changed their pixel values with a round of DIFF. The block V-shape SCR scheme was used to SCR the entire image. SHA-512 HF was integrated into the CCCM-based MI CRY system. KSP, KSS, InE, local InE, HA, ACC, NPCR, and UACI were performed. An ROI-based selective lightweight MI cipher has been proposed using PLM [
45], limiting hackers’ practical use of smart devices. The characteristics of smart devices include limited memory, low power, and low computing capability. PER-DIFF, XOR, bit-level circular shifts, and pixel shuffling operations were integrated into the encryption approaches. The ACC, GLIE, KSP, NPCR, UACI, TCA, and PSNR related to security and protection were calculated. Multiple MIs of arbitrary quantities and sizes can be encrypted using the enhanced security chaos-based tent-logistic cross mixed coupled map lattice (TLCMCML) [
46]. The innovative TLCMCML has better chaotic features, high randomness, high unpredictability, ergodicity, and a larger chaotic range. The new MIE algorithm includes two approaches. The first approach, the odd-even interleaving PER scheme, is adopted to individually scramble the ROI in each MI; in the second approach, a synchronous scrambling, SHA-512, bit-level PER-DIFF method is used. Therefore, simultaneous SCR and DIFF operations are applied to each image. KSP, KSS, GLIE, ACC, NPCR, UACI, and TCA metrics have been evaluated, and security analysis showed that the innovative MIE algorithm has excellent CRY effectiveness and provides high-security MIE technologies.
Takagi–Sugeno–Kang Fuzzy Wavelet Brain Cereberal Controller (TSKFWBCC)-based decryption approaches have been demonstrated for MIs [
47]. 4D hyperchaotic map (HCM), and XOR operation were integrated into a highly robust and precise secure MIE algorithm. The proposed encryption method exhibited excellent HA, GLIE, and PSNR performance metrics. With the rapid advancement of artificial intelligence (AI) schemes, chaos-based AI MIE has become a significant research topic in MI privacy protection [
48]. High-dimensional features have been adaptively extracted from the original MIs using ResNet, and more flexible and secure CRY models have been achieved. The output of the ResNet model is encrypted using chaotic LM and XOR-SCR operations. Security evaluation methods involve ACC, InE, and HA, and the chaotic ResNet-LM MIE system can achieve higher security and RT encryption.
4. Chaos-Based MIE Applied to Medical Cloud, IoMT, mHealth, Healthcare, and Telemedicine
Table 4 shows the technical notes of chaos-based MIE applied to the medical cloud, IoMT, mHealth, healthcare, and telemedicine. MIs are widely used in modern clinical diagnosis and treatment. MIs containing confidential information relating to patients’ privacy are stored and transmitted using cloud-based networks [
49]. SCR is performed on the plain image, and a cipher image is generated. Chen et al. [
49] developed an adaptive MIE algorithm based on LSM chaotic mapping to increase the robustness of existing chaotic MIE technology. SECEVAMs using the HA, KSP, KSS, GLIE, NPCR, UACI, and NCC were employed, and the chaos-based MIE schemes were able to effectively protect against attacks, with better security and robustness. The PNG and linear congruential generator (LCG) were used with a 2D logistic coupled chaotic map (LCCM) to protect the patient confidentiality of DICOM images during storage and transmission on a cloud-based platform [
50]. The XOR, CONF, DIFF, pixel MAS, and SCR encryption operations were performed, and the KSS, HA, PC, GLIE, NPCR, and UACI SECEVAMs were presented in detail. A synchronization chaotic approach with a fast-reaching finite time has also been designed in the transceiver, as an encrypted key generator for a fourth-order Runge–Kutta chaotic system (FORKCS) [
51]. An XOR operation was performed to protect patients’ MIs. HA, VARH, PC, GLIE, NPCR, UACI, and TCA were applied to analyze the security and robustness of the chaos-based MIE.
The storage and transmission of digital MIs for detecting and treating diseases increased significantly in hospitals during the COVID-19 pandemic [
52]. A 1D LM is a basic method that is easy to implement. MLMs were developed to increase unpredictability and encryption robustness. This novel encryption approach comprises three main steps. In the first step, a variable-length gray-level code, and an XOR operation are integrated into the generation of the encrypted key to CONF the intruder and subsequently used as the initial parameters of both modified LM. In the second step, the one-stage image pixels undergo PER using the address code that is generated from the sorting TRAN of the first MLM. Finally, a complete DIFF procedure is applied to the entire image using the second MLM to overcome differential and statistical attacks. The encryption efficiency was determined using the PC, ACC, NPCR, UACI, KSS, and KSP parameters. The analysis results indicated that the chaos-based MIE exhibits high encryption performance and robust resistance to various attacks. One of the aims of digital innovation is the design and implementation of MIE with a highly efficient and resilient SEC for smart telehealth [
53]. Framework-based Hessenberg TRAN and chaotic encryption have been applied to protect security and decrease computational time while encrypting MIs. The IEFHAC algorithm comprises three operations: XOR, rotated (ROT), and PRBGs. The LM and SM were integrated into IEFHAC to achieve efficient CONF and the Hessenberg household transform was used to achieve DIFF efficiency. The chaotic LM and SM sequences made the MIE system strong in combating attacks. The IEFHAC scheme was evaluated in terms of HA using the CSOT, NPCR, UACI, KSP, KSS, SSIM, NCC, BER, and TCA. The analysis was performed on an Intel, Core i3-3120M, CPU @ 2.5 GHz with 4 GB of RAM using Windows 10. The security analysis demonstrated that the IEFHAC algorithm provides computationally efficient solutions for MIE.
The SEC of MIs is an important requirement in telemedicine and cloud-based healthcare systems [
54]. Adaptive frameworks for protecting the encryption and confidentiality of MIs are transmitted through the cloud-based medicine system. Three-dimensional chaotic PLMs are adopted to generate a PNG keystream, which is used to perform 8-bit (pixel) and 2-bit DNA and PERs operations on MIs. XOR and DIFF operations are integrated into the chaos-based MIE to enhance the security. The HA, VARH, NCC, PSNR, NPCR, UACI, and TCA are used to evaluate the encryption performance. Medical clinical images play an important role in disease diagnosis, and protecting medical clinical images is a significant design challenge in mHealth, e-healthcare and telemedicine with RT application [
55]. The novel dynamic circular bit shifting and bit-flipping methods in the CONF-DIFF phase of MIs provide better security and confidentiality. Three-dimensional chaos-based hyperbolic maps (HYM) are utilized to generate three chaotic sequences with XOR operation for MIE, and the encryption has the characteristics of robustness, higher randomness, high efficiency, higher complexity, unpredictable behavior, larger KSP, and KSS. SECEVAMs include the GLIE, ACC, MSE, NPCR, UACI, SSIM, feature-similarity (FSIM), NAE, PSNR, MD, and STC. The massive MIE plays a crucial role in the secure sharing, storing, and transmission of MIs [
56]. ROI and non-ROI of MI design aspects have been integrated into the proposed MIE algorithm. The random pixel indices of the non-ROI of MI were encrypted using a 1D TM. A 3D LHM was utilized in the CONF encryption process of ROI-MI with the widely used KSP. Assuming the encryption key parameters are 14-digit precision, the A 3D LHM has six encryption key parameters; therefore, the A 3D LHM had the widely used KSP of
. The DNA-encoding DIFF process and XOR operation were used in the ROI-MI encryption mechanism. Security performances were measured using KSP, HA, ACC, InE, MSE, PSNR, signal-to-noise ratio (SNR), maximum deviation (MDE), irregular deviation (ID), and NPCR. The robust MIE framework can be applied to the fields of EPR, DICOM, cloud-based mHealth, and telemedicine systems. Binary COVIDOA-based chaotic CM and LM have been utilized to generate optimal initial sequences related to the CONF and DIFF approaches of MIE [
57]. The MIE algorithm had high security and computational efficiency and could be used in IoMT-based healthcare systems. Security analyses of HA, InE, ACC, UACI, NPCR, MSE, and PSNR were performed.
In the era of mHealth and telemedicine, X-ray MIs have been encrypted using public-key CRY [
58]. Elliptic curve CRY (ECC) and Blum-Goldwasser CRY (BGC) were combined with the CRY mechanism to achieve superior encryption time performance. ECC had the mathematical features of elliptic curves, and it provided extensive CRY protection on small key lengths and fast encryption transactions. The BCG encryption methodology was designed through Blum Blum Shub (BBS) PRBG for the XOR-based MI stream cipher. The characteristics of the ECC and BCC were unpredictability and fortifying CRY issues. Pixel randomization of X-ary MIs was adopted through a JoanS-MuraliP’s chaotic map (JSMPCM), which was developed by combining the LM and a quadratic map (QM). The JSMP chaotic map had a large KSP. The security metric performance of the InE, ACC, NPCR, UACI, and TCA was demonstrated. MI exhibited sensitive patient information, and reliable and efficient MIE is required for telemedicine [
59]. The simultaneous PER and DIFF framework (SPDF) was developed using a 1D Chebyshev iterative chaotic map (CICM) with infinite collapse, and the modified Josephus traversing method. The CPM and CICM have been integrated into the 1D CICM with infinite collapse, resulting in higher unpredictability and ergodicity. The dynamic SCR scheme was adopted into the modified Josephus traversing method, enhancing PER operation. SECEVAMs of KSP, HA, ACC, NPCR, UACI, InE, PSNR, SSIM, and TCA were conducted. The MIE had high efficiency and could withstand the chosen plaintext and noise attacks. A dynamic ROT MIE based on an improved Lorenz chaotic map (ILOCM) is innovative for solving the security problems for the digital MIs in IoMT transmission [
60]. The ILOCM included new nonlinear adjustment terms and encryption parameters. The ILOCM had a wider range of chaotic parameters and better chaotic characteristics, and the ILOCM-based PRBG was more unpredictable. The ILOCM-based key generator applied the MIE scheme to achieve dynamic rotation PER and double SCR-DIFF. KSP, MSE, InE, HA, ACC, PSNR, SSIM, NPCR, UACI, and TCA were discussed. A new dynamic block cipher of MIE technology using a time-delay chaotic map (TDCM) was developed for the PACS in the hospital [
61]. XOR operations were adopted for the BC, and ACCs were analyzed to illustrate the effectiveness and feasibility of the TDCM-based cipher. Chaos-based symmetric MI ciphers were designed using a tent logistic tent map (TLTM) and HM for an e-healthcare platform [
62], and PER and DIFF operations were adopted to pixel SCR. Security features of KSP, KSS, ACC, HA, GLIE, NPCR, UACI, PSNR, MSE, and TCA were obtained. The analysis results showed that the TLTM-based MIE was efficient and robust. An MI watermarking and encryption security method has been revealed for smart healthcare systems [
63]. 4D HCM, 2D Henon–sine map (HSM), SCR, PER–DIFF, and XOR operations were used for the MI stream cipher. Security analysis of the proposed methods was verified using NPCR, UACI, PSNR, MSE, GLIE, and TCA. A 1D chaotic cosine–sine map (CSM) has been developed with better complex behavior, better randomness in nature and a larger chaotic range [
64], and it can be used in MIE systems in healthcare. MIs such as X-rays, magnetic resonance imaging (MRI) scans, computed tomography (CT) scans and ultrasound images (UIs) were protected by integrating PERT, DIFF, and XOR operations. Security analysis included NPCR, UACI, ACC, GLIE, KSS, BCR, MSE, and PSNR values.
Chaos-based encryption methods were used to maintain the security of MIs and ensure that only the AU user could access sensitive MIs. DICOM MIs have been widely used in the fields of medical diagnostics process, telemedicine, and healthcare, and online DICOM MIE methods are required [
65]. Effective DICOM MIE approaches using XOR operations with a secret process derived from an LHM were implemented, and high-security multi DICOM MI access was verified. Security analysis included MSE, SNR, PSNR, ACC, and Q value. Block chain–based chaotic deep generative adversarial network (BCDGE) encryption technology has been constructed to achieve advanced levels of security overcoming hackers for IoMT-based MIs [
66].
A blockchain scheme was adopted to enhance MI security, and a chaotic deep generative adversarial network-based CRY technology was applied to generate a private key with a larger KSP, excellent randomness, complexity, and high entropy. SHA-1 hash algorithm, XOR, and SCR–DIFF operations were utilized in the chaotic MIE system. Security analysis included KSP, InE, HA, UACI, NPCR, SSIM, MSE, ACC, and TCA parameters. The primary concern related to MI is the privacy and security approaches with cloud-based transactions and safe web [
67]. The distributed and immutable feature of block chain infrastructure was provided using the chaotic TM MI cipher–resistant brute–force attacks.
Three encryption key parameters were adopted in the chaotic TM; therefore, it had a larger KSP and KSS, high unpredictability, and high complexity. Chaotic SM, XOR, PER, SHA-256, and scattered operations were integrated into the chaos-based MIE. Security analysis of HA, SIE, NPCR, UACI, MSE, PSNR, KSP, KSS, ciphertext difference rate (CDR), and complexity of computation (CC) were explored. A block chain scheme has been adopted to decentralize the storage and transmission of encrypted MIs through the network [
68]. The block chain framework created accountability and control across all independent smart devices, and chaos-based MIE was utilized in secured management in the IoMT-edge system. MIs were decomposed into R, G, and B, in which these sub-images were SCR using multi-scroll maps (MSMs), HM, and ACM, respectively. The MSMs had more intricate dynamic behavior and generated highly unpredictable chaos-based time sequences. The evaluation metrics of security strength included NPCR, UACI, ACC, InE, and TCA.
5. Discussion
MIs include CT scans, MRI scans, positron emission tomography (PET) scans, UIs, X-rays, and so on.
Table 5 displays the important technical features and effectiveness of chaos-based MIE. There are many technical features and different levels of effectiveness concerning the operations commonly used in chaos-based MIE, such as AI, fuzzy, NN, ASK, AU, BC, block chain, cloud, CONF, CT, DICOM, DIFF, discard, DNA, EPR, healthcare, HF, IoMT, LCG, lightweight, LFSR, NLFSR, MAS, MRI, mobile, PACS, PER, PET, PERT, PNG, PRBG, ROB, ROI, ROT, RT, Sbox, SC, SCR, SEC, SK, storage, telemedicine, telehealth, transmission, SUB, SWA, TRAN, ultrasound, X-rays, XOR, and so on. The list of abbreviations is shown on the pages 25–29.
Table 6 shows the important chaotic maps of MIE. These chaotic maps are used in chaos-based MIE, such as 2D HM, 2D HSM, 2D LM, 2D LCCM, 2D MLM, 3D CM, 3D HYM, 3D LHM, 3D MLM, 3D PLM, 4D HCM, 4D MCS, 4D MLM, ACM, BCDGE, BM, CHCM, CICM, CM, CCCM, CPM, CSM, CUB, ECEM, FORKCS, HM, HCM, HSCM, ICFCM, ILOCM, JSMPCM, LM, LCCM, LHM, LSM, LTM, MCC, MDCM, MBMWCM, MLM, MSM, PLM, QM, SCCLM, SM, SAM, TDCM, TLCMCML, TLTM, TM, TMCM, TOCCM, and so on.
Table 7 lists the SECEVAMs for chaos-based MIE. The basic security evaluation methods include ACC, AD, BACI, BCR, BER, CC, CDR, CSQT, EDR, energy contrast, FSIM, GLIE, HA, HOA, HU, ID, InE, KSP, KSS, local InE, MAE, MD, MDE, MSE, NAE, NCC, NPCR, PC, PCC, PRD, PSNR, RMSE, STC, SIE, SSIM, SNR, STE, Q-value, TCA, UACI, UIQI, VA, VARH, and so on. In this study, we focused on chaos-based MIE, which is critical in clinical MIE operations. All of the aforementioned technologies have been significant in the advancement of chaos-based MIE. Relevant studies focusing on the following aspects were deemed significant: