Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Securing Medical Images by Image Encryption using Key Image

by Shrija Somaraj, Mohammed Ali Hussain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 3
Year of Publication: 2014
Authors: Shrija Somaraj, Mohammed Ali Hussain
10.5120/18184-9079

Shrija Somaraj, Mohammed Ali Hussain . Securing Medical Images by Image Encryption using Key Image. International Journal of Computer Applications. 104, 3 ( October 2014), 30-34. DOI=10.5120/18184-9079

@article{ 10.5120/18184-9079,
author = { Shrija Somaraj, Mohammed Ali Hussain },
title = { Securing Medical Images by Image Encryption using Key Image },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 3 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number3/18184-9079/ },
doi = { 10.5120/18184-9079 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:35:13.637763+05:30
%A Shrija Somaraj
%A Mohammed Ali Hussain
%T Securing Medical Images by Image Encryption using Key Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 3
%P 30-34
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents two methods for encryption and decryption of images using XOR operation. In the first method the original image is encrypted by the key image using XOR operation and decryption process also uses the same key image with XOR operation. In the second method one of the bit planes of the key image is used for encrypting the bit planes of the original image and shuffling is done for getting the encrypted image. This method also uses XOR operation. Both the methods use a binary image of the same size as key for encrypting the original image. Experiments have shown that both algorithms are suitable for 2D as well as 3D images. These algorithms are implemented in MATLAB environment and tested on various medical images which have shown good results. These methods can be used for encrypting other images also.

References
  1. Panigrahy, S. K. , Acharya, B. and Jen, D. , 2008. Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm. In 1st International Conference on Advances in Computing, Chikhli, India.
  2. Kamali, S. H. , Shakerian, R. , Hedayati, M. ,Rahmani, M. , 2010. A new modified version of Advance Encryption Standard based algorithm for image encryption. In International Conference on Electronics and Information Engineering (ICEIE),
  3. Younes,M. A. B and Jantan,A. , 2008. An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption. In International Journal of Computer Science and Network Security(IJCSNS), VOL. 8.
  4. Zeghid,M. , Machhout,M. , Khriji,L. , Baganne,A. , Tourki, R. ,2007. Modified AES Based Algorithm for Image Encryption. In World Academy of Science, Engineering and Technology.
  5. Singh,K. , Kaur,K. , 2011. Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it. In International Journal of Computer Applications, Volume 23– No. 6.
  6. Seyedzade,S. M. , Atani,R. E. and Mirzakuchaki,S. 2010. A Novel Image Encryption Algorithm Based on Hash Function. In 6th Iranian Conference on Machine Vision and Image Processing.
  7. Gupta,R. ,Bisht,J. 2013. Colour Image Encryption and Decryption by using Scan Approach. In International Journal of software & Hardware Research in Engineering, Volume 1 Issue 2.
  8. Younes,M. A. B and Jantan,A. , 2008. Image Encryption Using Block-Based Transformation Algorithm. In International Journal of Computer Science(IAENG),.
  9. Yun-peng,Z. , Wei,L. , Shui-ping,C. , Zheng-jun,Z. , Xuan ,N. ,Wei-di,D. , 2009. Digital image encryption algorithm based on chaos and improved DES. In IEEE International Conference on Systems, Man and Cybernetics.
  10. Seyedzade,S. M. , Atani,R. E. and Mirzakuchaki,S. , 2010. A Novel Image Encryption Algorithm Based on Hash Function. In 6th Iranian Conference on Machine Vision and Image Processing.
  11. Pareek ,N. K. , Patidar , V. , Sud, . K . K. 2006. Image encryption using chaotic logistic map. In Image and Vision Computing 24(2006)926–934, Elsevier.
  12. Nag, A. , Srabani Khan, Saswati Ghosh, Singh, J. P. , Biswas, S. , Sarkar,D. , Sarkar,P. P. 2011. Image Encryption Using Affine Transform and XOR Operation. In International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN).
  13. Reddy Jyoteeswara Prasad, S. and Sathyanarayana, R. V. S. 2013. Image encryption using color key images. In International Journal of Elec. & Electr. Eng. & Telecom.
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption Image Decryption Bit Plane XOR operation Key image.