Volume 10 , Issue 1 , PP: 55-68, 2022 | Cite this article as | XML | Html | PDF | Full Length Article
Marwa M. Eid 1 * , Shaimaa A. Hussien 2
Doi: https://doi.org/10.54216/JCIM.100104
Medical data has attracted much interest; a quick, lossless, and secure cryptosystem is required for saving and transferring images over open networks while maintaining the image's details. This paper shows how to protect medical images with an encryption method based on hybrid chaotic maps. The proposed hybrid method is constructed to deal with problems like confusion and diffusion with a large key space. The technique uses a mix of different chaos maps for a specific set of control settings. There is a complete explanation of how encryption and decryption operations work. The security analysis results showed that the suggested cryptosystem is safe from statistical, brute force, and differential attacks. Compared to already known methods, the estimated times for encryption and decryption make it likely that the proposed scheme can be applied in real-time applications.
Chaos Cryptography , Medical Encryption , Bogdanov map , Lorenz Map.
[1] Tatsuya Chuman, Warit Sirichotedumrong, and Hitoshi Kiya, Encryption-then-Compression Systems using Grayscale-based Image Encryption for JPEG Images. IEEE Transactions on Information Forensics and Security, 14 (6), 2019.
[2] Dang Ninh Tran , Hans-Jürgen Zepernick , and Thi My Chinh Chu, LSB Data Hiding in Digital Media: A Survey. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 9, 2022.
[3] Gang Liu , Jingyuan Han , Yi Zhou , Tao Liu , and Jian Chen, QSLT: A Quantum-Based Lightweight Transmission Mechanism against Eavesdropping for IoT Networks. Wireless Communications and Mobile Computing, 2022.
[4] Chong Fu, Gao-yuan Zhang, Mai Zhu, Zhe Chen, and Wei-min Lei, A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Key stream Generation Strategy. Hindawi Security and Communication Networks, 2018.
[5] Agus Winarno and Riri Fitri Sari, A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher. Appl. Sci. 2022.
[6] Bin Zhang, Bahbibi Rahmatullah, Shir Li Wang , Zhaoyan Liu, “ A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map”, Multimedia Tools and Applications, 2022.
[7] J. Chen, L. Chen, L. Yu, and Z. Zhu, "Medical image cipher using hierarchical diffusion and non-sequential encryption," Nonlinear Dyn., 96 (1), 301–322, 2019.
[8] G. Ke, H. Wang, S. Zhou, and H. Zhang, Encryption of medical image with most significant bit and high capacity in piecewise linear chaos graphics. Measurement, 135, 385–391, 2019.
[9] A. Belazi, M. Talha, S. Kharbech, W. E. Xiang, and S. Member, Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding. IEEE Access, 7, 36667–36681, 2019.
[10] Z. Mishra and B. Acharya, High throughput and low area architectures of secure IoT algorithm for medical image encryption. J. Inf. Secure. Appl., 53, 102533, 2020.
[11] P. Suhasini and S. Kanchana, Enhanced Fractional Order Lorenz System for Medical Image Encryption in Cloud-Based Healthcare Administration. International Journal of Computer Networks and Applications (IJCNA) , 9, 2022.
[12] Z. Hua, S. Yi, and Y. Zhou, Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Processing, 144, 134–144, 2018.
[13] M. Chen, G. Ma, C. Tang, and Z. Lei, Generalized optical encryption framework based on Shearlets for medical image. Opt. Lasers Eng., 128, 2020.
[14] Jaishree Jain and Arpit Jain, Securing E-Healthcare Images Using an Efficient Image Encryption Model. Scientific Programming, Volume 2022.
[15] Musbah A, Ziad A, and Ammar A, RGB color image encryption decryption using image segmentation and matrix multiplication. Int J Eng Technol, 7, 104–107, 2018.
[16] Deniz E and Nursin C, An efficient image encryption algorithm for the period of Arnold’s CAT map. Int J Intell Syst Appl Eng., 6, 80–84, 2018.
[17] Reem H and Huda A, Cipher secret image using hybrid visual cryptography. ARPN J Eng. Appl Sci, 13, 1015–1021, 2018.
[18] Xingyuan W, Xiaoqiang Z and Yingqian Z, An image encryption algorithm based on josephus traversing and mixed chaotic map. IEEE Access, 6, 23733–23746, 2018.
[19] Reem H and Huda A, Cipher secret image using hybrid visual cryptography. ARPN J Eng. Appl Sci., 13, 1015–1021, 2018.
[20] Dena A and Salah A, Image encryption algorithm based on Rc4 and henon map. J Theor Appl Inf. Technology, 96, 7065–7076, 2018.
[21] Kavitha K and Vidhya P, Color image encryption: a new public key cryptosystem based on polynomial equation. Springer Nat Switz Proc Int Conf Ismac Comput Vis Bio-Eng 30, 69–78, 2019.
[22] Pranjali S, Shruti P, Surabhi S and Anita L, An image cryptography using henon map and arnold cat map”, Int Res J Eng Technology, 5, 1900–1904, 2018.
[23] Xiaoling H and Guodong Y, An image encryption algorithm based on time-delay and random insertion. Entropy, 20(974), 2018.
[24] Sneha S, Syam S and Ashok K, A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. J Ambient Intell Human Comput., 2019.
[25] Ankita B, Mohit D, Dua Shelza (2018), A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform. J Ambient Intell Human Comput. 10, 3519–3531,2018.
[26] Yonglin Xu, Shaofei Wu, Mingqing W, and Yuntao Z , Design and implementation of distributed RSA algorithm based on Hadoop. J Ambient Intell Human Comput., 2018.
[27] https://www.kaggle.com/datasets, last access on Jan.,2023.
[28] Shashidhara N and Usha, A Video steganography using zero order hold method for secured data transmission. Int J Comput Appl., 176, 44–48, 2017.
[29] Bao Z, Guo Y, Li X et al., A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J Ambient Intell Human Comput., 2020.
[30] Yung Y, Chih H, Sin Y, and Hsin L, Data hiding method for AMBTC compressed images. J Ambient Intell Human Comput, 2018.
[31] Nadeem Ahmed , Zhongliang Deng, Imran Memon , Fayaz Hassan , Khalid H. Mohammadani , and Rizwan Iqbal, A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks. Wireless Communications and Mobile Computing Volume 2022.
[32] Fuyan Sun, Shutang Liu, Zhongqin Li, Zongwang Lu, A novel image encryption scheme based on spatial chaos map, Chaos, Solitobs & Fractals, 38(3), 631-640, 2008.
[33] O. S. Faragallah et al., Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications. IEEE Acess, 42491- 42503, 2020.
[34] Wang et al., A novel Encryption Algorithm Based on DWT and Multichaos Maping.Embedded Systems for Mobile Sensors, Volume 2016.
[35] Subashini, V. J., and S. Poornachandra, Chaos based image encryption using Bogdanov map. Journal of Computational and Theoretical Nanoscience, 14 (9),4508-4514, 2017.
[36] Shannon, Claude Elwood., A mathematical theory of communication. The Bell system technical journal 27(3), 379-423, 1948.
[37] Zhang, Jian., An image encryption scheme based on cat map and hyperchaotic lorenz system. 2015 IEEE International Conference on Computational Intelligence & Communication Technology. IEEE, 2015.