scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A New Image Encryption Algorithm for Grey and Color Medical Images

02 Mar 2021-IEEE Access (Institute of Electrical and Electronics Engineers (IEEE))-Vol. 9, pp 37855-37865
TL;DR: In this paper, a new image splitting technique based on image blocks was introduced, and the image blocks were scrambled using a zigzag pattern, rotation, and random permutation, and a chaotic logistic map generated a key to diffuse the scrambled image.
Abstract: Recently, diagnosing diseases using medical images became crucial. As these images are transmitted through the network, they need a high level of protection. If the data in these images are liable for unauthorized usage, this may lead to severe problems. There are different methods for securing images. One of the most efficient techniques for securing medical images is encryption. Confusion and diffusion are the two main steps used in encryption algorithms. This paper presents a new encryption algorithm for encrypting both grey and color medical images. A new image splitting technique based on image blocks introduced. Then, the image blocks scrambled using a zigzag pattern, rotation, and random permutation. Then, a chaotic logistic map generates a key to diffuse the scrambled image. The efficiency of our proposed method in encrypting medical images is evaluated using security analysis and time complexity. The security is tested in entropy, histogram differential attacks, correlation coefficient, PSNR, keyspace, and sensitivity. The achieved results show a high-performance security level reached by successful encryption of both grey and color medical images. A comparison with various encryption methods is performed. The proposed encryption algorithm outperformed the recent existing encryption methods in encrypting medical images.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: A novel utilization of fractional-order chaotic systems in color image encryption using the 4D hyperchaotic Chen system of fractionAL-order combined with the Fibonacci Q-matrix is proposed.

26 citations

Journal ArticleDOI
TL;DR: Comparative analysis reveals that the proposed six-dimensional hyperchaotic map (SDHM) achieves remarkably good performance than the existing encryption models.
Abstract: With the advancements in e-healthcare services, it is possible to provide remote medical services to patients and swifter first aid. Medical images play an essential role in e-healthcare applications for providing quick and better remote diagnosis and treatment to patients. Medical images generally comprise secret details about the patients and are therefore prone to various security threats during their transmission over public networks. Thus, it is required to secure these images prior to their communication over public networks. But due to distinctive properties of medical images, like higher correlation and redundancy among the pixels, and larger size, it is required to design an efficient encryption model to resist against various security threats. In this paper, an efficient encryption model for medical images is proposed. To obtain the secret keys, six-dimensional hyperchaotic map (SDHM) is proposed. Firstly, plain medical image is divided into three channels such as red, green, and blue. Secret keys are used to diffuse these channels. Lastly, encrypted channels are concatenated and final encrypted medical image is obtained. Extensive experiments are drawn by considering the benchmark medical images. Also, comparisons are performed among the proposed SDHM and competitive techniques by considering various performance metrics. Comparative analysis reveals that the proposed SDHM achieves remarkably good performance than the existing encryption models.

24 citations

Journal ArticleDOI
TL;DR: In this article , the authors present a detailed discussion of different types of medical images and the attacks that may affect medical image transmission and present an in-depth overview of security techniques, such as cryptography, steganography, and watermarking.
Abstract: Recently, there has been a rapid growth in the utilization of medical images in telemedicine applications. The authors in this paper presented a detailed discussion of different types of medical images and the attacks that may affect medical image transmission. This survey paper summarizes existing medical data security approaches and the different challenges associated with them. An in-depth overview of security techniques, such as cryptography, steganography, and watermarking are introduced with a full survey of recent research. The objective of the paper is to summarize and assess the different algorithms of each approach based on different parameters such as PSNR, MSE, BER, and NC.

16 citations

Journal ArticleDOI
TL;DR: The experiments’ results and the security analysis show that the proposed technique has an extensive keyspace, high key sensitivity, and good encryption effect and can be judged robust against common security attacks.

14 citations

References
More filters
Journal ArticleDOI
Xiuli Chai1, Xiuli Chai2, Zhihua Gan2, Ke Yuan2, Yi Chen1, Xianxing Liu2 
TL;DR: Experimental results and security analyses demonstrate that the proposed scheme not only has good encryption effect, but also is secure enough to resist against the known attacks.
Abstract: In the paper, a novel image encryption algorithm based on DNA sequence operations and chaotic systems is proposed. The encryption architecture of permutation and diffusion is adopted. Firstly, 256-bit hash value of the plain image is gotten to calculate the initial values and system parameters of the 2D Logistic-adjusted-Sine map (2D-LASM) and a new 1D chaotic system; thus, the encryption scheme highly depends on the original image. Next, the chaotic sequences from 2D-LASM are used to produce the DNA encoding/decoding rule matrix, and the plain image is encoded into a DNA matrix according to it. Thirdly, DNA level row permutation and column permutation are performed on the DNA matrix of the original image, inter-DNA-plane permutation and intra-DNA-plane permutation can be attained simultaneously, and then, DNA XOR operation is performed on the permutated DNA matrix using a DNA key matrix, and the key matrix is produced by the combination of two 1D chaotic systems. Finally, after decoding the confused DNA matrix, the cipher image is obtained. Experimental results and security analyses demonstrate that the proposed scheme not only has good encryption effect, but also is secure enough to resist against the known attacks.

212 citations

Journal ArticleDOI
TL;DR: This scheme is based on a combination of chaos and DNA computing under the scenario of two encryption rounds, preceded by a key generation layer, and follows the permutation-substitution-diffusion structure.
Abstract: In this paper, we propose a new chaos-based encryption scheme for medical images. It is based on a combination of chaos and DNA computing under the scenario of two encryption rounds, preceded by a key generation layer, and follows the permutation-substitution-diffusion structure. The SHA-256 hash function alongside the initial secret keys is employed to produce the secret keys of the chaotic systems. Each round of the proposed algorithm involves six steps, i.e., block-based permutation, pixel-based substitution, DNA encoding, bit-level substitution (i.e., DNA complementing), DNA decoding, and bit-level diffusion. A thorough search of the relevant literature yielded only this time the pixel-based substitution and the bit-level substitution are used in cascade for image encryption. The key-streams in the bit-level substitution are based on the logistic-Chebyshev map, while the sine-Chebyshev map allows producing the key-streams in the bit-level diffusion. The final encrypted image is obtained by repeating once the previous steps using new secret keys. Security analyses and computer simulations both confirm that the proposed scheme is robust enough against all kinds of attacks. Its low complexity indicates its high potential for real-time and secure image applications.

146 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed scheme can cluster the inter-block embedding changes and perform better than the state-of-the-art steganographic method.

133 citations

Journal ArticleDOI
TL;DR: A lossless edge maps based image cryptosystem for medical image that has a strong resistance against various security attacks and outperforms other state-of-the-art methods.

128 citations

Journal ArticleDOI
01 Oct 2017-Optik
TL;DR: The algorithm in the improved version of ElGamal encryption scheme is designed to encrypt medical image where data expansion issue is resolved and execution speed is enhanced.

96 citations