187
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A multi-stage chaotic encryption technique for medical image

, &

References

  • Abdel-Basset, M., Fakhry, A. E., El-Henawy, I., Qiu, T., & Sangaiah, A. K. (2017). Feature and intensity based medical image registration using particle swarm optimization. Journal of Medical Systems, 41(12), 197. https://doi.org/10.1007/s10916-017-0846-9
  • Ahmad, J., & Hwang, S. O. (2016). A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications, 75(21), 13951–13976. https://doi.org/10.1007/s11042-015-2973-y
  • Ahmed, F., Anees, A., Abbas, V. U., & Siyal, M. Y. (2014). A noisy channel tolerant image encryption scheme. Wireless Personal Communications, 77(4), 2771–2791. https://doi.org/10.1007/s11277-014-1667-5
  • Begum, A. A. S., & Nirmala, S. (2018). Secure visual cryptography for medical image using modified cuckoo search. Multimedia Tools and Applications, 77(20), 27041–27060. https://doi.org/10.1007/s11042-018-5903-y
  • Biswas, M. R., Alam, K. M. R., Tamura, S., & Morimoto, Y. (2019). A technique for DNA cryptography based on dynamic mechanisms. Journal of Information Security and Applications48, 102363. https://doi.org/10.1016/j.jisa.2019.102363
  • Brain MRI Axial. Retrieved March 18, 2020, https://www.rock-cafe.info/suggest/brain-stem-anatomy-ct-scan-627261696e.html
  • Brain MRI Images. Retrieved March 11, 2020, http://cn.anke.com/ProductsView.asp?CasesID=3
  • Cao, F., Huang, H. K., & Zhou, X. Q. (2003). Medical image security in a HIPAA mandated PACS environment. Computerized Medical Imaging and Graphics, 27(2–3), 185–196. https://doi.org/10.1016/S0895-6111(02)00073-3
  • Chai, X., Fu, X., Gan, Z., Lu, Y., & Chen, Y. (2019a). A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Processing, 155, 44–62. https://doi.org/10.1016/j.sigpro.2018.09.029
  • Chai, X., Zhang, J., Gan, Z., & Zhang, Y. (2019b). Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimedia Tools and Applications, 78(24), 35419–35453. https://doi.org/10.1007/s11042-019-08168-x
  • Chatrati, S. P., Hossain, G., Goyal, A., Bhan, A., Bhattacharya, S., Gaurav, D., & Tiwari, S. M. (2020). Smart home health monitoring system for predicting type 2 diabetes and hypertension. Journal of King Saud University-Computer and Information Sciences.
  • Chen, X., & Hu, C. J. (2017). Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi Journal of Biological Sciences, 24(8), 1821–1827. https://doi.org/10.1016/j.sjbs.2017.11.023
  • Deng, S. J., Huang, G. C., Chen, Z. J., & Xiao, X. (2011). Self-adaptive image encryption algorithm based on chaotic map [J]. Journal of Computer Applications, 31 (6).
  • Deng, X. H., Liao, C. L., Zhu, C. X., & Chen, Z. G. (2014). Image encryption algorithms based on chaos through dual scrambling of pixel position and bit. J. Commun, 35(3), 216.
  • Enayatifar, R., Guimarães, F. G., & Siarry, P. (2019). Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Optics and Lasers in Engineering, 115, 131–140. https://doi.org/10.1016/j.optlaseng.2018.11.017
  • Fu, C., Meng, W. H., Zhan, Y. F., Zhu, Z. L., Lau, F. C., Chi, K. T., & Ma, H. F. (2013). An efficient and secure medical image protection scheme based on chaotic maps. Computers in Biology and Medicine, 43(8), 1000–1010. https://doi.org/10.1016/j.compbiomed.2013.05.005
  • Full-EMD. bioscientifica. Retrieved March 20, 2020, https://edm.bioscientifica.com/view/journals/edm/2015/1/EDM15-0079.xml
  • Gan, Z. H., Chai, X. L., Han, D. J., & Chen, Y. R. (2019). A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Computing and Applications, 31(11), 7111–7130. https://doi.org/10.1007/s00521-018-3541-y
  • Hua, Z., Xu, B., Jin, F., & Huang, H. (2019). Image encryption using josephus problem and filtering diffusion. IEEE Access, 7, 8660. https://doi.org/10.1109/ACCESS.2018.2890116
  • Hua, Z., Yi, S., & Zhou, Y. (2018). Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Processing, 144, 134–144. https://doi.org/10.1016/j.sigpro.2017.10.004
  • Kannammal, A., & Rani, S. S. (2012, November). DICOM image authentication and encryption based on RSA and AES algorithms. In International Conference on Intelligent Robotics, Automation, and Manufacturing (pp. 349–360). Springer, Berlin.
  • Kanso, A., & Ghebleh, M. (2012). A novel image encryption algorithm based on a 3D chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(7), 2943–2959. https://doi.org/10.1016/j.cnsns.2011.11.030
  • Li, C., Lin, D., & Lü, J. (2017). Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE MultiMedia, 24(3), 3. https://doi.org/10.1109/MMUL.2017.3051512
  • Li, C., Zhang, Y., & Xie, E. Y. (2019). When an attacker meets a cipher-image in 2018: A year in review. Journal of Information Security and Applications, 79(27/28), 102361. https://doi.org/10.1016/j.jisa.2019.102361
  • Li, H., Deng, L., & Gu, Z. (2020). An image encryption scheme based on precision limited chaotic system. In Multimedia Tools and Applications (pp. 1–24). Springer.
  • Lian, X. U., Li, J. B., Huang, M. X., & DUAN, Y. C. (2016). A robust watermarking algorithm for the encryption of medical big data. International Journal of Simulation--Systems, Science & Technology, 17, 46.https://ijssst.info/Vol-17/No-46/paper42.pdf
  • Liao, X., Lai, S., & Zhou, Q. (2010). A novel image encryption algorithm based on self-adaptive wave transmission. Signal Processing, 90(9), 2714–2722. https://doi.org/10.1016/j.sigpro.2010.03.022
  • Lima, J. B., Madeiro, F., & Sales, F. J. (2015). Encryption of medical images based on the cosine number transform. Signal Processing: Image Communication, 35, 1–8. https://doi.org/10.1016/j.image.2015.03.005
  • Lorenz, E. N. (1963). Deterministic nonperiodic flow. Journal of the Atmospheric Sciences, 20(2), 130–141. https://doi.org/10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2
  • Luo, Y., Yu, J., Lai, W., & Liu, L. (2019). A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimedia Tools and Applications, 78(15), 22023–22043. https://doi.org/10.1007/s11042-019-7453-3
  • May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261(5560), 459–467. https://doi.org/10.1038/261459a0
  • Pandey, S. R., Hicks, D., Goyal, A., Gaurav, D., & Tiwari, S. M. (2020). Mobile Notification System for Blood Pressure and Heartbeat Anomaly Detection. Journal of Web Engineering, 19(5-6), 735–761. https://doi.org/10.13052/jwe1540-9589.19568
  • Mondal, A., Alam, K. M., Ali, G. G., Chong, P., & Morimoto, Y. (2019). A multi-stage encryption technique to enhance the secrecy of image. KSII Transactions on Internet & Information Systems (TIIS), 13(5), 2698–2717. http://itiis.org/digital-library/22110
  • Mondal, B., Behera, P. K., & Gangopadhyay, S. (2020). A secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic (SC3) map. Journal of Real-Time Image Processing, (1–18).
  • MRI brain scan Retrieved March 17, 2020, https://www.rock-cafe.info/suggest/brain-stem-anatomy-ct-scan-627261696e.html
  • Pan, S. M., Wen, R. H., Zhou, Z. H., & Zhou, N. R. (2017). Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform. Multimedia Tools and Applications, 76(2), 2933–2953. https://doi.org/10.1007/s11042-015-3209-x
  • Pareek, N. K., & Patidar, V. (2016). Medical image protection using genetic algorithm operations. Soft Computing, 20(2), 763–772. https://doi.org/10.1007/s00500-014-1539-7
  • Parvees, M. M., Samath, J. A., & Bose, B. P. (2016). Secured medical images-a chaotic pixel scrambling approach. Journal of Medical Systems, 40(11), 232. https://doi.org/10.1007/s10916-016-0611-5
  • Pisarchik, A. N., Flores-Carmona, N. J., & Carpio-Valadez, M. (2006). Encryption and decryption of images with chaotic map lattices. Chaos: An Interdisciplinary Journal of Nonlinear Science, 16(3), 033118. https://doi.org/10.1063/1.2242052
  • Ravichandran, D., Murthy, B. K., Balasubramanian, V., Fathima, S., & Amirtharajan, R. (2021). An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Medical & Biological Engineering & Computing, 59(3), 589–605. https://doi.org/10.1007/s11517-021-02328-8
  • Ravichandran, D., Praveenkumar, P., Rayappan, J. B. B., & Amirtharajan, R. (2016). Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine, 72, 170–184. https://doi.org/10.1016/j.compbiomed.2016.03.020
  • Shah, T., Hussain, I., Gondal, M. A., & Mahmood, H. (2011). Statistical analysis of S-box in image encryption applications based on majority logic criterion. International Journal of Physical Sciences, 6(16), 4110–4127. https://doi.org/10.5897/IJPS11.531
  • Siyam, M. T. I., Alam, K. M. R., & Al Jami, T. (2013). An exploitation of visual cryptography to ensure enhanced security in several applications. International Journal of Computer Applications, 65(6), 6. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.303.2105&rep=rep1&type=pdf
  • Tanveer, M. S. R., Alam, K. M. R., Akash, M. A. M., & Morimoto, Y. (2019, December). A technique to reconstruct wavelet-based watermark immune against salt & pepper noise. In 2019 4th International Conference on Electrical Information and Communication Technology (EICT) (pp. 1–5). Khulna, Bangladesh: IEEE.
  • Tavoli, R., Kozegar, E., Shojafar, M., Soleimani, H., & Pooranian, Z. (2013), July. Weighted PCA for improving document image retrieval system based on keyword spotting accuracy. In 2013 36th international conference on telecommunications and signal processing (TSP) (pp. 773–777). Rome, Italy: IEEE.
  • Teng, L., & Wang, X. (2012). A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Optics Communications, 285(20), 4048–4054. https://doi.org/10.1016/j.optcom.2012.06.004
  • Usama, M., Khan, M. K., Alghathbar, K., & Lee, C. (2010). Chaos-based secure satellite imagery cryptosystem. Computers & Mathematics with Applications, 60(2), 326–337. https://doi.org/10.1016/j.camwa.2009.12.033
  • Wang, H., Ye, J. M., Liang, H. F., & Miao, Z. H. (2017). A medical image encryption algorithm based on synchronization of time-delay chaotic system. Advances in Manufacturing, 5(2), 158–164. https://doi.org/10.1007/s40436-017-0178-5
  • Xie, G. B., & Ding, Y. M. (2015). Image encryption algorithms with variable confusion parameters based on logistic mapping. Microelect Comput, 32(4), 111–115. http://www.journalmc.com/en/article/id/d2b8ba5b-47b7-4b75-90cd-33fc6cba1d44
  • Zhang, J., Hou, D., & Ren, H. (2016). Image encryption algorithm based on dynamic DNA coding and Chen’s hyperchaotic system. In Mathematical problems in engineering (pp. 2016). Hindawi.
  • Zhang, L. Y., Liu, Y., Pareschi, F., Zhang, Y., Wong, K. W., Rovatti, R., & Setti, G. (2017). On the security of a class of diffusion mechanisms for image encryption. IEEE Transactions on Cybernetics, 48(4), 1163–1175. https://doi.org/10.1109/TCYB.2017.2682561
  • Zhang, Y., Qiu, M., Tsai, C. W., Hassan, M. M., & Alamri, A. (2015). Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Systems Journal, 11(1), 88–95. https://doi.org/10.1109/JSYST.2015.2460747

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.