CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Auto-Blocking based Image Encryption using ECG Signal

Published on July 2018 by Kiran, Parameshachari B. D., Sahana V. S., Apoorva C., Thanuja B. S.
National Conference on Electronics, Signals and Communication
Foundation of Computer Science USA
NCESC2017 - Number 3
July 2018
Authors: Kiran, Parameshachari B. D., Sahana V. S., Apoorva C., Thanuja B. S.
c68f7fe2-2ba4-4e6e-aafe-0c4cd3891fda

Kiran, Parameshachari B. D., Sahana V. S., Apoorva C., Thanuja B. S. . Auto-Blocking based Image Encryption using ECG Signal. National Conference on Electronics, Signals and Communication. NCESC2017, 3 (July 2018), 33-35.

@article{
author = { Kiran, Parameshachari B. D., Sahana V. S., Apoorva C., Thanuja B. S. },
title = { Auto-Blocking based Image Encryption using ECG Signal },
journal = { National Conference on Electronics, Signals and Communication },
issue_date = { July 2018 },
volume = { NCESC2017 },
number = { 3 },
month = { July },
year = { 2018 },
issn = 0975-8887,
pages = { 33-35 },
numpages = 3,
url = { /proceedings/ncesc2017/number3/29625-7095/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Electronics, Signals and Communication
%A Kiran
%A Parameshachari B. D.
%A Sahana V. S.
%A Apoorva C.
%A Thanuja B. S.
%T Auto-Blocking based Image Encryption using ECG Signal
%J National Conference on Electronics, Signals and Communication
%@ 0975-8887
%V NCESC2017
%N 3
%P 33-35
%D 2018
%I International Journal of Computer Applications
Abstract

A novel image encryption algorithm is designed based on autoblocking and a medical ECG signal. The chaotic logistic map and generalized Arnold map will be employed. ECG signal and wolf algorithm are used to generate initial conditions for the chaotic maps. Auto-blocking diffusion operation is performed only in the encryption process. The keystream is generated by a control parameter produced from the plain-image, which is proven to be secure against chosen-plaintext and known-plaintext attacks. Experimental results show that the proposed algorithm can achieve high security with good performance.

References
  1. W. Zhang et al. , An Image Encryption Scheme Using Reverse 2-Dimensional Chaotic Map and Dependent Diffusion, Comm. Nonlinear Science and Numerical Simulation, vol. 18, 2013, pp. 20662080.
  2. J. Fridrich, Symmetric Ciphers Based on Two Dimensional Chaotic Maps, Intl J. Bifurcation and Chaos, vol. 8, no. 6, 1998, pp. 12591284.
  3. A. Kumar and M. K. Ghose, Extended Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map, Comm. Nonlinear Science and Numerical Simulation, vol. 16, no. 1, 2011, pp. 372382.
  4. H. J. Liu and X. Y. Wang, Color Image Encryption Using Spatial Bit-Level Permutation and High- Dimension Chaotic System, Optics Comm. , vol. 284, 2011, pp. 38953903.
  5. Y. Tang, Z. D. Wang, and J. A. Fang, Image Encryption Using Chaotic Coupled Map Lattices with Time-Varying Delays, Comm. Nonlinear Science and Numerical Simulation, vol. 15, no. 9, 2010, pp. 24562468.
  6. Y. S. Zhang and D. Xiao, An Image Encryption Scheme Based on Rotation Matrix Bit-Level Permutation and Block Diffusion, Comm. Nonlinear Science and Numerical Simulation, vol. 19, no. 1, 2014, pp. 7482.
  7. YueWu, Joseph P. Noonan, Shannon Entropy based Randomness Measurement and Test for Image Encryption Information Sciences 00 (2011) 123
  8. Yue Wu, Joseph P. Noonan, and Sos Agaian, NPCR and UACI Randomness Tests for Image Encryption Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), April Edition, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Diffusion chatioc Maps