Enhancing Healthcare Image Security with DNA Cryptography in the IOT Environment


  • Animesh Kairi, Tapas Bhadra, Tufan Saha, Sayantan Saha


IoT Security; DNA Computing; DNA cryptography; Image encryption and Decryption


The integration of DNA cryptography into IoT-based healthcare image systems represents a groundbreaking approach to tackle the pressing issue of data security and patient privacy in the digital healthcare landscape. With the increasing reliance on the Internet of Things in healthcare, the need for robust security measures is paramount to protect sensitive medical information. This research explores the feasibility and efficacy of employing DNA cryptography to encode medical data, adding an additional layer of security to data transmitted over IoT networks while ensuring compatibility with existing healthcare infrastructure. By enhancing data integrity, particularly in the realm of E-healthcare, this innovative cryptosystem has the potential to facilitate secure patient data transfer between healthcare institutions, ultimately advancing patient care and preserving privacy. The promising integration of DNA cryptography underscores its potential as a secure and rapid technique, offering a hopeful solution to the security challenges faced by healthcare image systems within IoT environments.


Download data is not yet available.


Manjit Kaur, Ahmad Ali AlZubi, Dilbag Singh, Vijay Kumar, Heung-No Lee, "Lightweight Biomedical Image Encryption Approach", IEEE Access, vol.11, pp.74048-74057, 2023.

G. Manogaran, C. Thota, D. Lopez, and R. Sundarasekar, "Big data security intelligence for healthcare industry 4.0" in Cybersecurity for Industry 4.0, Cham, Switzerland: Springer, pp. 103-126, 2017.

Dhanda, Sumit Singh, Brahmjit Singh, and Poonam Jindal. "Lightweight cryptography: a solution to secure IoT." Wireless Personal Communications 112 (2020): 1947-1980.

Aghili, S. F., Mala, H., Kaliyar, P., & Conti, M. (2019). SecLAP: Secure and lightweight RFID authentication protocol for Medical IOT. Future Generation Computer Systems, 101, 621–634. Doi: https://doi.org/10.1016/j.future.2019.07.004.

Wang, K.-H., Chen, C.-M., Fang, W., & Tsu-Yang, W. (2018). On the security of a new ultra-lightweight authentication protocol in an IOT environment for RFID tags. Journal of Supercomputing, 74, 65–70. https://doi.org/10.1007/s11227-017-2105-8.

Domb, M. (2017). An adaptive lightweight security framework suited for IOT. In J. Sen (Ed.), Internet of Things: Technology, Applications and Standardization, IntechOpen. http://dx.doi.org/ 10.5772/intec hopen.73712.

Gope, P. (2019). LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. Computers & Security, 86, 223–237. https://doi.org/10.1016/j.cose.2019.06.003.

Mahalle, Parikshit N., Neeli Rashmi Prasad, and Ramjee Prasad. "Threshold cryptography-based group authentication (TCGA) scheme for the Internet of Things (IoT)." In 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), pp. 1-5. IEEE, 2014.

Lein Harn, “Group Authentication,” In IEEE Transactions on Computers, IEEE Computer Society Digital Library, IEEE Computer Society, 16 October 2012.

Lei Zhang, Qianhong Wu, Solanas A., and Domingo-Ferrer J., “A Scalable Robust Authentication Protocol for Secure Vehicular Communications,” In IEEE Transactions on Vehicular Technology, Volume: 59, no. 4, pp:1606-1617, May 2010.

Anmin Fu, Shaohua Lan, Bo Huang, Zhenchao Zhu, and Yuqing Zhang, “A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks,” In IEEE Communications Letters, Volume:16, no:11, pp:1744-1747, November 2012.

Morshed M.M., Atkins A., and Yu H., “Efficient Mutual Authentication Protocol for Radiofrequency Identification Systems,” Communications, IET, Volume: 6, no: 16, pp: 2715- 2724, November 6, 2012.

[13] Pfleeger Shari Lawrence, Rogers Marc, Bashir Masooda, Caine K., Caputo Deanna, Losavio Michael, and Stolfo Sal, “Does Profiling Make Us More Secure?” In IEEE Journal of security and privacy, Volume:10, Issue:4, 2012.

Squicciarini A.C., Paci F., Bertino E., Trombetta A., and Braghin S., “Group-Based Negotiations in P2P Systems,” In IEEE Transactions on Parallel, and Distributed Systems, Volume: 21, no:10, pp:1473-1486, October 2010.

L. A. Martucci, T. C. M. B. Carvalho and W. V. Ruggiero, “A Lightweight Distributed Group Authentication Mechanism,” In Proc. of 4th International Network Conference, Plymouth, UK.

Kairi A, Gagan S, Bera T and Chakraborty M. 2019 DNA Cryptography-Based Secured Weather Prediction Model in High-Performance Computing. Proceedings of International Ethical Hacking Conference 2018. Pages 103-114.

Elamir, M.M., Al-Albany, W.I. & Mabrouk, M.S. Hybrid image encryption scheme for secure E-health systems. Netw Model Anal Health Inform Bioinforma 10, 35 (2021). https://doi.org/10.1007/s13721-021-00306-6.

G. Mohamed, N. O. Korany, and S. E. El-Khamy, “New DNA coded fuzzy based (DNAFZ) S-boxes: application to robust image encryption using hyperchaotic maps,” IEEE Access, vol. 9, pp. 14284–14305, 2021.

E. Zarei Zefreh, “An image encryption scheme based on a hybrid model of DNA computing, chaotic systems, and hash functions,” Multimedia Tools and Applications, vol. 79, 2020.

X. Chai, Z. Gan, K. Yuan, Y. Chen, and X. Liu, “A novel image encryption scheme based on DNA sequence operations and chaotic systems,” Neural Computing & Applications, vol. 31,no. 1, pp. 219–237, 2019.

H. A. Al-Ahdal, G. A. Al-Rummana, and N. K. Deshmukh, “A robust lightweight algorithm for securing data in the Internet of things networks,” in Sustainable Communication Networks and Application, P. Karuppusamy, I. Perikos, F. Shi, and T. N. Nguyen, Eds., Springer, Singapore, 2021.

Kairi, T. Bhadra, “Decoding The Future Using A Novel DNA-Based Cryptosystem”, in Journal of European Chemical Bulletin, Volume -12, Special Issue-10: Page: 3597 –3609 2023.




How to Cite

Animesh Kairi. (2024). Enhancing Healthcare Image Security with DNA Cryptography in the IOT Environment. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1975–1986. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5768



Research Article