Full Paper View Go Back

Medical Image Encryption Scheme Based On Hybrid Chaotic Permutation

J.B. Akan1 , E.A. Adedokun2 , G. Onuh3 , A. Umar4 , R.I. Nwosu5 , Y. Ibrahim6

Section:Research Paper, Product Type: Journal-Paper
Vol.8 , Issue.4 , pp.97-104, Aug-2020


Online published on Aug 31, 2020


Copyright © J.B. Akan, E.A. Adedokun, G. Onuh, A. Umar, R.I. Nwosu, Y. Ibrahim . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J.B. Akan, E.A. Adedokun, G. Onuh, A. Umar, R.I. Nwosu, Y. Ibrahim, “Medical Image Encryption Scheme Based On Hybrid Chaotic Permutation,” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.4, pp.97-104, 2020.

MLA Style Citation: J.B. Akan, E.A. Adedokun, G. Onuh, A. Umar, R.I. Nwosu, Y. Ibrahim "Medical Image Encryption Scheme Based On Hybrid Chaotic Permutation." International Journal of Scientific Research in Computer Science and Engineering 8.4 (2020): 97-104.

APA Style Citation: J.B. Akan, E.A. Adedokun, G. Onuh, A. Umar, R.I. Nwosu, Y. Ibrahim, (2020). Medical Image Encryption Scheme Based On Hybrid Chaotic Permutation. International Journal of Scientific Research in Computer Science and Engineering, 8(4), 97-104.

BibTex Style Citation:
@article{Akan_2020,
author = {J.B. Akan, E.A. Adedokun, G. Onuh, A. Umar, R.I. Nwosu, Y. Ibrahim},
title = {Medical Image Encryption Scheme Based On Hybrid Chaotic Permutation},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {8 2020},
volume = {8},
Issue = {4},
month = {8},
year = {2020},
issn = {2347-2693},
pages = {97-104},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2012},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2012
TI - Medical Image Encryption Scheme Based On Hybrid Chaotic Permutation
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - J.B. Akan, E.A. Adedokun, G. Onuh, A. Umar, R.I. Nwosu, Y. Ibrahim
PY - 2020
DA - 2020/08/31
PB - IJCSE, Indore, INDIA
SP - 97-104
IS - 4
VL - 8
SN - 2347-2693
ER -

144 Views    164 Downloads    52 Downloads
  
  

Abstract :
Securing patient?s information in form digital image from unauthorized modification is a crucial concern in modern day information system. With respect to this, a variant of chaos-based image encryption algorithm is proposed for securing medical images, catering for the challenges observed in the chaos-based image encryption algorithm. In the proposed improved algorithm a hybrid permutation approach based on bit-level and block scrambling is used for shuffling pixel after which, chaotic random data with pixel format and inserted on the plain-image surrounding. The plain image is divide into 8 variable sub blocks, then a 3D logistic map is used for generation of scrambling sequence. A combination of bit-level and block level pixel scrambling process was performed using the generated scrambling sequence, before image pixel diffusion process is performed. Simulation results showed an improve performance with respect to information entropy distribution of image in the adjacent direction which greatly reduces pixel correlation and strong redundancy, NPCR and UACI respectively. Thus, the proposed algorithm shows high robustness, sensitivity and resistance to chosen plaintext, known plaintext and chosen cipher text attack

Key-Words / Index Term :
Medical Image Encryption, Chaotic Cryptography, Differential Attacks, Pseudorandom Key-stream, Pixel Scrambling

References :
[1] C. Fu, G.-Y. Zhang, , O. Bian, W.M. Lei,.and H.-F. Ma,.: "A novel medical image protection scheme using a 3-dimensional chaotic system", PloS one, Vol. 9, Issue 12, pp. 123-131, 2014.
[2] C. Cao, K. Sun, and W. Liu,: "A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map", Signal Processing, Vol. 143, Issue 1, pp. 122-133, 2018.
[3] C.T. Yucheng Chen, Y. Ruisong: ?Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion?, Signal Processing, Vol. 167, Issue 1, pp. 107-286, 2019.
[4] G. Mathur,: "A Survey on Medical Image Encryption", International Journal of Computer Sciences and Engineering, Vol, 7, Issue, 4, pp. 44-53, 2019.
[5] Z. Hua, F. Jin, B. Xu, and H. Huang,: "2D Logistic-Sine-coupling map for image encryption", Signal Processing, Vol. 149, Issue 1 pp. 148-161, 2018.
[6] N. Mekki, M. Hamdi, T. Aguili, and Kim, T.-h.: "A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system", In the proceeding 2018 International conference on Advance Communication Technologies and Networking (CommNet) pp. 1-10.
[7] M. Machkour, A. Saaidi, and M.L. Benmaati,: "A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher", 3D Research, Vol. 6, Issue 4 pp. 36-45 2015.
[8] E.A. Adedokun, J.B. Akan, H. Bello-Salau, I.J. Umoh, R.I. Nwosu, and Y. Ibrahim,: "A Secure Chaotic Framework for Medical Image Encryption using a 3D Logistic Map", Applications of Modelling and Simulation, Vol. 4, Issue 2, pp. 141-148, 2020.
[9] C. Fu, Y.-F. Shan, M.-Y. He, Z.-Y. Yu,.and H.-L. Wu,: "A new medical image encryption algorithm using multiple 1-D chaotic maps? In the Proceedings of 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2055-2060, 2018.
[10] K. Panwar, R.K.P.: "Design and Analysis of a Permutation Strategy using 3D Chaotic Map", International Journal of Computer Sciences and Engineering, vol.7 Issue 6, 2019.
[11] W., Zhang, H., Yu, Y.-l., Zhao, and Z.-l. Zhu,: "Image encryption based on three-dimensional bit matrix permutation", Signal Processing, Vol. 118, Issue 1 pp. 36-50, 2016.
[12] L., Xu, Z., Li, J., Li, and W. Hua,: "A novel bit-level image encryption algorithm based on chaotic maps", Optics and Lasers in Engineering, Vol. 78, Issue 1 pp. 17-25, 2016.
[13] M.B., Hossain, M.T., Rahman, A.S., Rahman, and S. Islam,: "A new approach of image encryption using 3D chaotic map to enhance security of multimedia component", In 2014 IEEE, International Conference on Informatics, Electronics & Vision (ICIEV) pp. 1-6.
[14] F., Elgendy, A.M., Sarhan, T.E., Eltobely, S.F., El-Zoghdy, H.S., El-Sayed, and O.S. Faragallah,: "Chaos-based model for encryption and decryption of digital images", Multimedia Tools and Applications, Vol. 75, Issue 18, pp. 11529-11553, 2016.
[15] L., Kocarev, and S. Lian,: "Chaos-based cryptography: Theory, algorithms and applications", Springer Science & Business Media, Vol. 354, pp. 23-36, 2011.
[16] M., Ahmad, M., Doja, and M.S. Beg,: "Security analysis and enhancements of an image cryptosystem based on hyperchaotic system", Journal of King Saud University-Computer and Information Sciences, Vol. Issue, 2018.
[17] F.E.A., El-Samie, H.E.H., Ahmed, I.F., Elashry, M.H., Shahieen, O.S., Faragallah, E.-S.M., El-Rabaie, and S.A Alshebeili,.:"Image encryption: a communication perspective" Vol. 1, (CRC Press, 2013.)
[18] J. Fridrich,: "Symmetric ciphers based on two-dimensional chaotic maps", International Journal of Bifurcation and chaos, Vol. 8, Issue 6, pp. 1259-1284, 1998.
[19] A.V., Diaconu, V., Ionescu, G., Iana, and J.M. Lopez-Guede,: "A new bit-level permutation image encryption algorithm", In 2016 IEEE International Conference on Communications (COMM) pp. 411-416..
[20] N.K. Pareek, V. Patidar, and K.K. Sud,: "Image encryption using chaotic logistic map", Image and vision computing, Vol. 24, Issue 9, pp. 926-934, 2006.
[21] J. Q. Cao, H. R. Xiao, and Z. L., Lan,: "Chaos encryption algorithm based on dual scrambling of pixel position and value", Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications), 2010, Vol. 46, Issue 28, pp. 192-195, 2010.
[22] W. Zhen, H., Xia, L., Yu-Xia, and S. Xiao-Na,: "A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system", Chinese Physics B, Vol. 22, Issue 1, pp. 010504, 2013.
[23] J.-x. Chen, Z.-l. Zhu, C. Fu, and H. Yu,: "An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism", Optics Express, Vol. 21, Issue 23, pp. 27873-27890, 2013.
[24] Y. Zhang, and D. Xiao,: "An image encryption scheme based on rotation matrix bit-level permutation and block diffusion", Communications in Nonlinear Science and Numerical Simulation, Vol. 19, Issue 1, pp. 74-82, 2014.
[25] Y. Li, C. Wang, and H. Chen,: "A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation", Optics and Lasers in Engineering, Vol. 90, Issue 1, pp. 238-246, 2017.
[26] K. Muhammad, R. Hamza, J. Ahmad, J. Lloret, H. Wang, and S.W. Baik,.: "Secure surveillance framework for IoT systems using probabilistic image encryption", IEEE Transactions on Industrial Informatics, Vol. 14, Issue 8, pp. 3679-3689, 2018.
[27] Z. Hua, and Y. Zhou,: "Image encryption using 2D Logistic-adjusted-Sine map", Information Sciences, Vol. 339, Issue 1, pp. 237-253, 2016.
[28] H. Li, Y. Wang, and Z. Zuo,: "Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms", Optics and Lasers in Engineering, Vol. 115, Issue 1 pp. 197-207, 2019.
[29] C.-J. Xiao and H. Chen ,.: "Adaptive medical image encryption algorithm based on multiple chaotic
mapping", Saudi Journal of Biological Sciences, Vol. 24, Issue 8, pp. 1821?1827, 2017.
[30] Z. Hua, S. Yi, and Y. Zhou,: "Medical image encryption using high-speed scrambling and pixel adaptive diffusion", Signal Processing, Vol. 144, Issue 1, pp. 134-144, 2018.
[31] M. Levoy,: "The stanford volume data archive", 2001?, URL: http://graphics. stanford. edu/data/voldata, 2009.
[32] L. Liu, S. Hao, J. Lin, Z. Wang, X. Hu, and S. Miao,: "Image block encryption algorithm based on chaotic maps", IET Signal Processing, Vol. 12, Issue 1, pp. 22-30, 2017.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation