An Enhanced Dynamic Scheme for Medical Image Encryption Using Elliptical Curve Cryptography

Authors

  • Sreekala M. Department of Computer Applications, Cochin University of Science & Technology & Assistant Professor, Department of Computer Science, Vimala College, Thrissur
  • Varghese Paul Department of Information Technology, Rajagiri School of Engineering and Technology, Kerala, India

Keywords:

Medical Image, Encryption, Elliptic Curve Cryptography, Dynamic Message Mapping

Abstract

In order to increase security when transferring medical photos, this research suggests a revolutionary dynamic encryption technique. The paper addresses the various types of image encryption methods currently in use. Additionally, some early techniques for medical image encryption are reviewed in this study. Different medical image types, including CT, MRI, Ultrasound, X-ray, and ECG images, are taken into consideration for encryption. There is also a performance analysis of the reviewed methods and the suggested method. This work adds greater security than standard elliptic curve encryption because it uses the dynamic message mapping mechanism in elliptic curves.

 

References

V. Pavithra and C. Jeyamala, “A Survey on the Techniques of Medical Image Encryption,” in 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, India, pp. 1–8, Dec. 2018.

D. Ravichandran, A. Banu S, B. K. Murthy, V. Balasubramanian, S. Fathima, and R. Amirtharajan, “An efficient medical image encryption using hybrid DNA computing and chaos in transform domain,” Med. Biol. Eng. Comput., vol. 59, no. 3, pp. 589–605, Mar. 2021.

S. Jeevitha and N. Amutha Prabha, “Novel medical image encryption using DWT block-based scrambling and edge maps,” J. Ambient Intell. Humaniz. Comput., vol. 12, no. 3, pp. 3373–3388, Mar. 2021.

A. Banu S and R. Amirtharajan, “A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach,” Med. Biol. Eng. Comput., vol. 58, no. 7, pp. 1445–1458, Jul. 2020.

P. T. Akkasaligar and S. Biradar, “Selective medical image encryption using DNA cryptography,” Inf. Secur. J. Glob. Perspect., vol. 29, no. 2, pp. 91–101, Mar. 2020.

S. Kumar, B. Panna, and R. K. Jha, “Medical image encryption using fractional discrete cosine transform with chaotic function,” Med. Biol. Eng. Comput., vol. 57, no. 11, pp. 2517–2533, Nov. 2019.

H. Nematzadeh, R. Enayatifar, H. Motameni, F. G. Guimarães, and V. N. Coelho, “Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices,” Opt. Lasers Eng., vol. 110, pp. 24–32, Nov. 2018.

C. Lakshmi, K. Thenmozhi, J. B. B. Rayappan, and R. Amirtharajan, “Encryption and watermark-treated medical image against hacking disease—An immune convention in spatial and frequency domains,” Comput. Methods Programs Biomed., vol. 159, pp. 11–21, Jun. 2018.

S. M. Ismail, L. A. Said, A. G. Radwan, A. H. Madian, and M. F. Abu-Elyazeed, “Generalized double-humped logistic map-based medical image encryption,” J. Adv. Res., vol. 10, pp. 85–98, Mar. 2018.

Z. Hua, S. Yi, and Y. Zhou, “Medical image encryption using high-speed scrambling and pixel adaptive diffusion,” Signal Process., vol. 144, pp. 134–144, Mar. 2018.

X. Chen and C.-J. Hu, “Adaptive medical image encryption algorithm based on multiple chaotic mapping,” Saudi J. Biol. Sci., vol. 24, no. 8, pp. 1821–1827, Dec. 2017.

D. S. Laiphrakpam and M. S. Khumanthem, “Medical image encryption based on improved ElGamal encryption technique,” Optik, vol. 147, pp. 88–102, Oct. 2017.

S. Haddad, G. Coatrieux, M. Cozic, and D. Bouslimi, “Joint Watermarking and Lossless JPEG-LS Compression for Medical Image Security,” IRBM, vol. 38, no. 4, pp. 198–206, Aug. 2017.

W. Cao, Y. Zhou, C. L. P. Chen, and L. Xia, “Medical image encryption using edge maps,” Signal Process., vol. 132, pp. 96–109, Mar. 2017.

D. Bouslimi and G. Coatrieux, “A crypto-watermarking system for ensuring reliability control and traceability of medical images,” Signal Process. Image Commun., vol. 47, pp. 160–169, Sep. 2016.

Y. Liu, X. Qu, and G. Xin, “A ROI-based reversible data hiding scheme in encrypted medical images,” J. Vis. Commun. Image Represent., vol. 39, pp. 51–57, Aug. 2016.

J. B. Lima, F. Madeiro, and F. J. R. Sales, “Encryption of medical images based on the cosine number transform,” Signal Process. Image Commun., vol. 35, pp. 1–8, Jul. 2015.

A. Kanso and M. Ghebleh, “An efficient and robust image encryption scheme for medical applications,” Commun. Nonlinear Sci. Numer. Simul., vol. 24, no. 1–3, pp. 98–116, Jul. 2015.

M. Ashtiyani, P. M. Birgani, and H. M. Hosseini, “Chaos-Based Medical Image Encryption Using Symmetric Cryptography,” in 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, Damascus, Syria, pp. 1–5, Apr. 2008.

J. B. Akan, E. A. Adedokun, G. Onuh, A. Umar, R. I. Nwosu, and Y. Ibrahim, “Medical Image Encryption Scheme Based On Hybrid Chaotic Permutation,” p. 8, 2020.

S. Sharma, Y. Verma, and A. Nadda, “Information Security: Cyber Security Challenges,” p. 6, 2019.

C. Chattopadhyay, B. Sarkar, and D. Mukherjee, “Encoding by DNA Relations and Randomization Through Chaotic Sequences for Image Encryption,” p. 16.

Downloads

Published

2022-10-31

How to Cite

[1]
S. M. and V. Paul, “An Enhanced Dynamic Scheme for Medical Image Encryption Using Elliptical Curve Cryptography”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 10, no. 5, pp. 1–9, Oct. 2022.

Issue

Section

Research Article

Similar Articles

<< < 3 4 5 6 7 8 9 10 11 12 > >> 

You may also start an advanced similarity search for this article.