A Proposed Framework for Enhanced Advanced Encryption Standard for Medical Image in Cloud System Using Fast Fourier Transform

Oladimeji Adegbola Isaac, Yusuf Hussaini Amana, Njoku Christian Chimere Abolarinwa Michael Oluwagbenga


Medical image storage on a cloud network has many advantages, including limitless storage, data portability, and migration. This framework aims to provide a more secure system capable of protecting data privacy in the cloud. This should address the fundamental issues that prevent users from trusting cloud services. The techniques developed in this study will be useful for encrypting confidential or personal images and information in a variety of digital systems such as mobile phones, personal digital gadgets, and so on. It will eliminate flaws, attack vulnerabilities, and threats of intruding into digital content.  This proposal focuses on developing a cloud-based system for medical image authentication and encryption using the Enhanced Advanced Encryption Standard (EAES) and the Modified Discrete Wavelet Transform (MDWT). For encryption and decryption, the Fast Fourier Transform – Advanced Encryption Standard (FFT-AES) will be used, while the Discrete Wavelet Transform-Modified Particle Swarm Optimization (DWT-MPSO) will be used for watermarking patient information within the encrypted image.

Keywords: Fast Fourier Transform, Medical Images, Cloud Network

How to cite this article: Oladimeji Adegbola Isaac, Yusuf Hussaini Amana, Njoku Christian Chimere Abolarinwa Michael Oluwagbenga, A Proposed Framework for Enhanced Advanced Encryption Standard for Medical Image in Cloud System Using Fast Fourier Transform, Journal of Materials Engineering, Structures and Computation. 1(1) 2022 pp. 1-8


  1. M Mbarek, K. Ali , Hassan (2019). A Framework to Secure Medical Image    Storage in Cloud Computing Environment. Journal of Electronic Commerce in Organizations vol. 23.2.
  2. Sefer, A.J. Abdulrahman (2018). Cloud System for Encryption and Authentication Medical Images. IOSR Journal of Computer Engineering (IOSR-JCE) Volume 20, Issue 1, Ver. II , pp. 65-75.
  3. K. Qusay, Y. Robiah, S.M. Hamid, S. A. Sayed, R.S. Siti (2017). A Review Study on Cloud Computing Issues. IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018) 012006  .
  4. G. Shini, T.Tony, K.Chithraranjan (2012). Cloud Based Medical Image Exchange-Security Challenges. Procedia Engineering vol. 38, PP 3454 – 3461.
  5. Botta, W Donato, V. Persico, A. Pescapé (2016). Integration of cloud computing and internet of things: a survey. Futur. Gener. Comput. Syst., vol. 56, pp. 684–700.
  6. Mustafa (2011). “Medical image security and EPR hiding using Shamir’s secret sharing scheme,” The Journal of Systems and Software, pp.1-10.
  7. B. Nyeem, (2013). Review of medical image watermarking requirements for teleradiology. Journal of Digital Imaging, vol. 26, pp 326 – 343.
  8. Lakshmi, K. Thenmozhi, J. B. Rayappan, S. Rajagopalan, R. Amirtharajan, N. Chidambaram, (2020). Neural-assisted image-dependent
  9. Daemen , V. Rijmen (2002). The Design of Rijndael,” Springer-Verlag, 2002.
  10. N. J. Parmar, P. K Verm (2017). A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. Security and Communication Networks. 1-7.
  11. https://www.commonlounge.com/discussion/e32fdd267aaa4240a4464723bc74d0a5. Retrived 1/16/2021
  12. https://www.skillset.com/questions/what-is-the-primary-drawback-to-using-advanced-encryption-standard-aes-algorithm-with-a-256-bit-key-to-share-sensiti-4254-p 2016. Retrived 1/16/2021
  13. Bincy, T. Senthilnathan (2019). An Efficient E2C 2 Visual Cryptographic Technique to Secure Medical Images in Cloud Environment. International Journal of Innovative Technology and Exploring Engineering (IJITEE). Volume-9 Issue-2, 4709-4714.
  14. A. Ijaz, S. Muhammad, U. H. Muhammad, S. Qaisar, A. Rizwan, A. Ditta, (2020). Secure Framework Enhancing AES Algorithm in Cloud Computing. Hindawi Security and Communication Networks Volume 2020, Article ID 8863345.
  15. https://en.wikipedia.org/wiki/Fast_Fourier_transform. Retrived 19th, July 2022.
  16. N. Rockwave (2000). The FFT: an algorithm the whole family can use. Computing in Science & Engineering vol. 2(1).
  17. D. Alowolodu, G.K Adelaja, B.K. Alese, O.C. Olayemi, (2018). Medical image security using quantum cryptography. Issues in Informing Science and Information Technology, vol. 15, pp. 57-67.
  18. Smita, V. Bellamkonda, Rajasthan (2018). Selective medical image watermarking and encryption for image security International Journal of Pure and Applied Mathematics Volume 118 No. 14.
  19. S. Askar, A.A. Karawia, A. Al-Khedhairi, F. S. Al-Ammar (2019). An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps. Entropy, VOL. 21, 44.
  20. I.Khalil (2017). Medical Image Steganography: Study of Medical Image Quality Degradation when Embedding Data in the Frequency Domain. I. J. Computer Network and Information Security, vol. 2, pp. 22-28
  21. A Parah, J.A.Sheikh, F. Ahad, (2017). Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Applvol. 76, pp. 10599–1