CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Self-Adaptive based Medical Image Encryption using Multiple Chaotic Systems

by Sudheesh K.V., Sushmitha B.C., Chethan R., Ganesh Kumar M.T., Kiran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 48
Year of Publication: 2022
Authors: Sudheesh K.V., Sushmitha B.C., Chethan R., Ganesh Kumar M.T., Kiran
10.5120/ijca2022921882

Sudheesh K.V., Sushmitha B.C., Chethan R., Ganesh Kumar M.T., Kiran . Self-Adaptive based Medical Image Encryption using Multiple Chaotic Systems. International Journal of Computer Applications. 183, 48 ( Jan 2022), 1-4. DOI=10.5120/ijca2022921882

@article{ 10.5120/ijca2022921882,
author = { Sudheesh K.V., Sushmitha B.C., Chethan R., Ganesh Kumar M.T., Kiran },
title = { Self-Adaptive based Medical Image Encryption using Multiple Chaotic Systems },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2022 },
volume = { 183 },
number = { 48 },
month = { Jan },
year = { 2022 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number48/32252-2022921882/ },
doi = { 10.5120/ijca2022921882 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:15:15.516879+05:30
%A Sudheesh K.V.
%A Sushmitha B.C.
%A Chethan R.
%A Ganesh Kumar M.T.
%A Kiran
%T Self-Adaptive based Medical Image Encryption using Multiple Chaotic Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 48
%P 1-4
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the advent of medical imaging tools and telemedicine technology, the transmission of patient data over the Internet has reduced distance barriers in healthcare delivery. To ensure patient privacy, data is encrypted while being transmitted over an insecure network.In order to overcome the problem of traditional techniques, a self-adaptive image encryption techniques based on multiple maps has been developed. Initially, plain image dependent multiple secret keys are generated for multiple maps. Input image is permuted by N umber of rounds using Arnold cat map. Value of N determined by the secret key. During diffusion process, a random image is generated with the help of 2D Logistic-Sine-Coupling Map (2DLSCM) with another secret key. Finally encrypted image obtained by performing bitwise XOR operation between permuted image and random image. Advantage of proposed multiple chaotic image encryption that incorporates two chaotic maps, Arnold's Cat Map and 2D Logistic Sine Coupling Map (2DLSCM), to improve the randomness and security of encrypted images. It also analyses the performance and security of the scheme and compares it to other known chaotic image encryption schemes.

References
  1. Laiphrakpam DS, Khumanthem MS. Medical image encryption based on improved elgamal encryption technique. Optik 2017;147:88–102.
  2. Kanso A, Ghebleh M. An efficient and robust image encryption scheme for medical applications. Commun Nonlinear SciNumer Simul 2015;24(1–3):98–116.
  3. Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A. Secure image encryption algorithm design using a novel chaos based s-box. Chaos Solitons Fractals 2017;95:92–101.
  4. Artiles JA, Chaves DP, Pimentel C. Image encryption using block cipher and chaotic sequences. Signal Process, Image Commun 2019;79:24–31.
  5. Abd-El-Atty B, Amin M, Abd-El-Latif A, Ugail H, Mehmood I. An efficient cryptosystem based on the logistic-Chebyshev map. In: 2019 13th international conference on software, knowledge, information management and applications (SKIMA). IEEE; 2019.
  6. Li Y, Wang C, Chen H. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 2017;90:238–46.
  7. Chen X, Hu C-J. Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J BiolSci 2017;24(8):1821–7.
  8. Boriga R, Dăscălescu AC, Priescu I. A new hyperchaotic map and its application in an image encryption scheme. Signal Process, Image Commun 2014;29(8):887–901.
  9. Liu H, Wang X. Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 2011;284(16–17):3895–903.
  10. Xingyuan W, Junjian Z, Guanghui C. An image encryption algorithm based on zigzag transform and LL compound chaotic system. Opt Laser Technol 2019;119:105581.
  11. Liu H, Wang X. Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 2010;59(10):3320–7.
  12. Dong C. Color image encryption using one-time keys and coupled chaotic systems. Signal Process Image Commun 2014;29(5):628–40.
  13. Khedr WI. A new efficient and configurable image encryption structure for secure transmission. Multimedia Tools Appl 2019;1–25.
  14. Boussif M, Aloui N, Cherif A. Smartphone application for medical images secured exchange based on encryption using the matrix product and the exclusive addition. IET Image Process 2017;11(11):1020–6.
  15. Hua Z, Yi S, Zhou Y. Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 2018;144:134–44.
  16. J. Ahmad and F. Ahmed, “Efficiency analysis and security evaluation of image encryption schemes,” International Journal of Video and Image Processing and Network Security, Vol. 12, 2012, pp. 18-31.
  17. Y. Wu, J. P. Noonan, and S. Agaian, “NPCR and UACI randomness tests for image encryption,” Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications, 2011, pp. 31-38.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Arnold’s Cat Map 2D Logistic-Sine-Coupling Map(2D-LSCM) Permutation Diffusion