Medical Image Encryption Scheme Based On Hybrid Chaotic Permutation

Authors

  • J.B. Akan Dept. of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria
  • E.A. Adedokun Dept. of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria
  • G. Onuh Dept. of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria
  • A. Umar Dept. of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria
  • R. I. Nwosu Dept. of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria
  • Y. Ibrahim Dept. of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria

Keywords:

Medical Image Encryption, Chaotic Cryptography, Differential Attacks, Pseudorandom Key-stream, Pixel Scrambling

Abstract

Securing patient?s information in form digital image from unauthorized modification is a crucial concern in modern day information system. With respect to this, a variant of chaos-based image encryption algorithm is proposed for securing medical images, catering for the challenges observed in the chaos-based image encryption algorithm. In the proposed improved algorithm a hybrid permutation approach based on bit-level and block scrambling is used for shuffling pixel after which, chaotic random data with pixel format and inserted on the plain-image surrounding. The plain image is divide into 8 variable sub blocks, then a 3D logistic map is used for generation of scrambling sequence. A combination of bit-level and block level pixel scrambling process was performed using the generated scrambling sequence, before image pixel diffusion process is performed. Simulation results showed an improve performance with respect to information entropy distribution of image in the adjacent direction which greatly reduces pixel correlation and strong redundancy, NPCR and UACI respectively. Thus, the proposed algorithm shows high robustness, sensitivity and resistance to chosen plaintext, known plaintext and chosen cipher text attack

 

References

C. Fu, G.-Y. Zhang, , O. Bian, W.M. Lei,.and H.-F. Ma,.: "A novel medical image protection scheme using a 3-dimensional chaotic system", PloS one, Vol. 9, Issue 12, pp. 123-131, 2014.

C. Cao, K. Sun, and W. Liu,: "A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map", Signal Processing, Vol. 143, Issue 1, pp. 122-133, 2018.

C.T. Yucheng Chen, Y. Ruisong: ?Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion?, Signal Processing, Vol. 167, Issue 1, pp. 107-286, 2019.

G. Mathur,: "A Survey on Medical Image Encryption", International Journal of Computer Sciences and Engineering, Vol, 7, Issue, 4, pp. 44-53, 2019.

Z. Hua, F. Jin, B. Xu, and H. Huang,: "2D Logistic-Sine-coupling map for image encryption", Signal Processing, Vol. 149, Issue 1 pp. 148-161, 2018.

N. Mekki, M. Hamdi, T. Aguili, and Kim, T.-h.: "A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system", In the proceeding 2018 International conference on Advance Communication Technologies and Networking (CommNet) pp. 1-10.

M. Machkour, A. Saaidi, and M.L. Benmaati,: "A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher", 3D Research, Vol. 6, Issue 4 pp. 36-45 2015.

E.A. Adedokun, J.B. Akan, H. Bello-Salau, I.J. Umoh, R.I. Nwosu, and Y. Ibrahim,: "A Secure Chaotic Framework for Medical Image Encryption using a 3D Logistic Map", Applications of Modelling and Simulation, Vol. 4, Issue 2, pp. 141-148, 2020.

C. Fu, Y.-F. Shan, M.-Y. He, Z.-Y. Yu,.and H.-L. Wu,: "A new medical image encryption algorithm using multiple 1-D chaotic maps? In the Proceedings of 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2055-2060, 2018.

K. Panwar, R.K.P.: "Design and Analysis of a Permutation Strategy using 3D Chaotic Map", International Journal of Computer Sciences and Engineering, vol.7 Issue 6, 2019.

W., Zhang, H., Yu, Y.-l., Zhao, and Z.-l. Zhu,: "Image encryption based on three-dimensional bit matrix permutation", Signal Processing, Vol. 118, Issue 1 pp. 36-50, 2016.

L., Xu, Z., Li, J., Li, and W. Hua,: "A novel bit-level image encryption algorithm based on chaotic maps", Optics and Lasers in Engineering, Vol. 78, Issue 1 pp. 17-25, 2016.

M.B., Hossain, M.T., Rahman, A.S., Rahman, and S. Islam,: "A new approach of image encryption using 3D chaotic map to enhance security of multimedia component", In 2014 IEEE, International Conference on Informatics, Electronics & Vision (ICIEV) pp. 1-6.

F., Elgendy, A.M., Sarhan, T.E., Eltobely, S.F., El-Zoghdy, H.S., El-Sayed, and O.S. Faragallah,: "Chaos-based model for encryption and decryption of digital images", Multimedia Tools and Applications, Vol. 75, Issue 18, pp. 11529-11553, 2016.

L., Kocarev, and S. Lian,: "Chaos-based cryptography: Theory, algorithms and applications", Springer Science & Business Media, Vol. 354, pp. 23-36, 2011.

M., Ahmad, M., Doja, and M.S. Beg,: "Security analysis and enhancements of an image cryptosystem based on hyperchaotic system", Journal of King Saud University-Computer and Information Sciences, Vol. Issue, 2018.

F.E.A., El-Samie, H.E.H., Ahmed, I.F., Elashry, M.H., Shahieen, O.S., Faragallah, E.-S.M., El-Rabaie, and S.A Alshebeili,.:"Image encryption: a communication perspective" Vol. 1, (CRC Press, 2013.)

J. Fridrich,: "Symmetric ciphers based on two-dimensional chaotic maps", International Journal of Bifurcation and chaos, Vol. 8, Issue 6, pp. 1259-1284, 1998.

A.V., Diaconu, V., Ionescu, G., Iana, and J.M. Lopez-Guede,: "A new bit-level permutation image encryption algorithm", In 2016 IEEE International Conference on Communications (COMM) pp. 411-416..

N.K. Pareek, V. Patidar, and K.K. Sud,: "Image encryption using chaotic logistic map", Image and vision computing, Vol. 24, Issue 9, pp. 926-934, 2006.

J. Q. Cao, H. R. Xiao, and Z. L., Lan,: "Chaos encryption algorithm based on dual scrambling of pixel position and value", Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications), 2010, Vol. 46, Issue 28, pp. 192-195, 2010.

W. Zhen, H., Xia, L., Yu-Xia, and S. Xiao-Na,: "A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system", Chinese Physics B, Vol. 22, Issue 1, pp. 010504, 2013.

J.-x. Chen, Z.-l. Zhu, C. Fu, and H. Yu,: "An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism", Optics Express, Vol. 21, Issue 23, pp. 27873-27890, 2013.

Y. Zhang, and D. Xiao,: "An image encryption scheme based on rotation matrix bit-level permutation and block diffusion", Communications in Nonlinear Science and Numerical Simulation, Vol. 19, Issue 1, pp. 74-82, 2014.

Y. Li, C. Wang, and H. Chen,: "A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation", Optics and Lasers in Engineering, Vol. 90, Issue 1, pp. 238-246, 2017.

K. Muhammad, R. Hamza, J. Ahmad, J. Lloret, H. Wang, and S.W. Baik,.: "Secure surveillance framework for IoT systems using probabilistic image encryption", IEEE Transactions on Industrial Informatics, Vol. 14, Issue 8, pp. 3679-3689, 2018.

Z. Hua, and Y. Zhou,: "Image encryption using 2D Logistic-adjusted-Sine map", Information Sciences, Vol. 339, Issue 1, pp. 237-253, 2016.

H. Li, Y. Wang, and Z. Zuo,: "Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms", Optics and Lasers in Engineering, Vol. 115, Issue 1 pp. 197-207, 2019.

C.-J. Xiao and H. Chen ,.: "Adaptive medical image encryption algorithm based on multiple chaotic

mapping", Saudi Journal of Biological Sciences, Vol. 24, Issue 8, pp. 1821?1827, 2017.

Z. Hua, S. Yi, and Y. Zhou,: "Medical image encryption using high-speed scrambling and pixel adaptive diffusion", Signal Processing, Vol. 144, Issue 1, pp. 134-144, 2018.

M. Levoy,: "The stanford volume data archive", 2001?, URL: http://graphics. stanford. edu/data/voldata, 2009.

L. Liu, S. Hao, J. Lin, Z. Wang, X. Hu, and S. Miao,: "Image block encryption algorithm based on chaotic maps", IET Signal Processing, Vol. 12, Issue 1, pp. 22-30, 2017.

Downloads

Published

2020-08-31

How to Cite

[1]
J. Akan, E. Adedokun, G. Onuh, A. Umar, R. I. Nwosu, and Y. Ibrahim, “Medical Image Encryption Scheme Based On Hybrid Chaotic Permutation”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 8, no. 4, pp. 97–104, Aug. 2020.

Issue

Section

Research Article

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.