Journal ArticleDOI
Chaos based crossover and mutation for securing DICOM image
Dhivya Ravichandran,Padmapriya Praveenkumar,John Bosco Balaguru Rayappan,Rengarajan Amirtharajan +3 more
TLDR
The experimental results prove the proposed DICOM cryptosystem has achieved a desirable amount of protection for real time medical image security applications.About:
This article is published in Computers in Biology and Medicine.The article was published on 2016-05-01. It has received 161 citations till now. The article focuses on the topics: Key space & Encryption.read more
Citations
More filters
Journal ArticleDOI
A new hybrid digital chaotic system with applications in image encryption
TL;DR: Security and performance analysis indicates that the proposed scheme is highly resistant to various cryptanalytic attacks, is statistically superior and more secure than previously proposed chaos-based image ciphers.
Journal ArticleDOI
Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption
Nestor Tsafack,Jacques Kengne,Bassem Abd-El-Atty,Abdullah M. Iliyasu,Abdullah M. Iliyasu,Abdullah M. Iliyasu,Kaoru Hirota,Ahmed A. Abd El-Latif,Ahmed A. Abd El-Latif,Ahmed A. Abd El-Latif +9 more
TL;DR: Since the network is characterised by smooth fourth-order exponential nonlinearity, a distinctive approach is employed to assess its different properties: the circuit stability near fixed points is examined and dynamic complexity is evaluated using the Lyaponov spectrum analysis, bifurcation analysis and phase space trajectories.
Journal ArticleDOI
An image compression and encryption algorithm based on chaotic system and compressive sensing
TL;DR: Simulation results verify the effectiveness and reliability of the proposed image compression and encryption algorithm with considerable compression and security performance.
Journal ArticleDOI
Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression
TL;DR: A solution for simultaneous image encryption and compression using compressed sensing using structurally random matrix (SRM), and permutation-diffusion type image encryption using 3-D cat map is presented.
Journal ArticleDOI
DNA Chaos Blend to Secure Medical Privacy
Dhivya Ravichandran,Padmapriya Praveenkumar,John Bosco Balaguru Rayappan,Rengarajan Amirtharajan +3 more
TL;DR: A hybrid encryption scheme based on deoxyribo nucleic acid and chaotic maps, which can be adaptable for both selective and full medical image encryption is proposed, which uses multiple chaotic maps in single process to generate the highly random keys for encrypting the color digital imaging and communications in medicine image.
References
More filters
Journal ArticleDOI
Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
TL;DR: Methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes to encrypt an N×N image.
Journal ArticleDOI
Some basic cryptographic requirements for chaos-based cryptosystems
Gonzalo Alvarez,Shujun Li +1 more
TL;DR: The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements.
Journal ArticleDOI
Image encryption using chaotic logistic map
TL;DR: The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.
Journal ArticleDOI
Cryptographic requirements for chaotic secure communications
Gonzalo Alvarez,Shujun Li +1 more
TL;DR: In this paper, the authors provide a set of guidelines that new cryptosystems would benefit from adhering to, such as correct key management and security analysis, and some practical aspects of communications such as channel noise, limited bandwith, and attenuation.
Journal ArticleDOI
Cryptography with chaos
TL;DR: It is possible to encrypt a message using the ergodic property of the simple low-dimensional and chaotic logistic equation, in order to transfer the trajectory from an initial condition towards an ϵ-interval inside the logistic chaotic attractor.