A one-round medical image encryption algorithm based on a combined chaotic key generator

被引:6
|
作者
Kumar, D. [1 ]
Sudha, V. K. [2 ]
Ranjithkumar, R. [1 ]
机构
[1] PA Coll Engn & Technol, Pollachi, Tamil Nadu, India
[2] Dr Mahalingam Coll Engn & Technol, Pollachi, Tamil Nadu, India
关键词
Chaotic key generator; Combined logistic-sine map; Combined logistic-tent map; Fractional order chaotic system; Permutation and diffusion; Lorenz system; SCHEME; PERMUTATION; CRYPTANALYSIS; STANDARD; IMPROVEMENT; EFFICIENT; SYSTEM;
D O I
10.1007/s11517-022-02703-z
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Medical images of patients must be securely transmitted and kept private in telemedicine. To secure such medical images, this paper proposes a single round chaotic image encryption scheme based on a permutation-diffusion structure. A combined chaotic key generator (CCKG) is proposed to enhance key sensitivity and generation in order to improve the security of medical images to be encrypted. CCKG is used to produce the initial seeds for the fractional order chaotic system (FOCS) and Lorenz system (LS) for the permutation and diffusion processes, respectively. CCKG together with proposed permutation and diffusion methods enhances cipher image security in single round. Using zigzag transform (ZT) scanning, the plain image is first permuted block by block. The type of scanning used on each block is heavily influenced by the ZT selection from FOCS and LS. Following block-wise permutation, the permutation order (PO) generated from LS performs overall permutation. Based on the pixel positions, the overall permuted image is divided into odd and even parts. Then these parts of the images are diffused separately by the random pixel matrices generated by LS and FOCS. The cipher image is formed by combining the odd and even parts after diffusion. Secret key analysis, statistical analysis, differential attack analysis, and simulations confirm that with a single round of image encryption, the proposed system is competent, robust and effective.
引用
收藏
页码:205 / 227
页数:23
相关论文
共 50 条
  • [21] Quantum Chaotic Image Encryption with One Time Running Key
    Cao Guanghui
    Zhou Jun
    Zhang Yizhi
    Jiang Yueling
    Zhang Xing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 77 - 88
  • [22] Medical image encryption algorithm based on Latin square and memristive chaotic system
    Xiuli Chai
    Jitong Zhang
    Zhihua Gan
    Yushu Zhang
    Multimedia Tools and Applications, 2019, 78 : 35419 - 35453
  • [23] Medical image encryption algorithm based on Latin square and memristive chaotic system
    Chai, Xiuli
    Zhang, Jitong
    Gan, Zhihua
    Zhang, Yushu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (24) : 35419 - 35453
  • [24] Chaotic Medical Image Encryption Algorithm Based on Bit-Plane Decomposition
    Dai, Yin
    Wang, Huanzhen
    Wang, Yuyi
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2016, 30 (04)
  • [25] Image Encryption Algorithm Based on Chaotic Sequence
    Chen, Xiaodi
    Wu, Hong
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL II: SIGNAL PROCESSING, 2020, 516 : 262 - 265
  • [26] Image encryption algorithm based on chaotic system
    Fan, Jiu-Lun
    Zhang, Xue-Feng
    7TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, 2006, : 767 - 771
  • [27] Image Encryption Algorithm Based on Chaotic Mapping
    Dong, Yupu
    Liu, Jiasheng
    Zhu, Canyan
    Wang, Yiming
    PROCEEDINGS 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, (ICCSIT 2010), VOL 1, 2010, : 289 - 291
  • [28] Image encryption algorithm based on chaotic sequence
    Zhang, Yong-Hong
    Kang, Bao-Sheng
    Zhang, Xue-Feng
    ICAT 2006: 16TH INTERNATIONAL CONFERENCE ON ARTIFICIAL REALITY AND TELEXISTENCE - WORSHOPS, PROCEEDINGS, 2006, : 221 - +
  • [29] A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process
    Norouzi, Benyamin
    Mirzakuchaki, Sattar
    Seyedzadeh, Seyed
    Mosavi, Mohammad Reza
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 71 (03) : 1469 - 1497
  • [30] A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process
    Benyamin Norouzi
    Sattar Mirzakuchaki
    Seyed Mohammad Seyedzadeh
    Mohammad Reza Mosavi
    Multimedia Tools and Applications, 2014, 71 : 1469 - 1497