A one-round medical image encryption algorithm based on a combined chaotic key generator

被引:6
|
作者
Kumar, D. [1 ]
Sudha, V. K. [2 ]
Ranjithkumar, R. [1 ]
机构
[1] PA Coll Engn & Technol, Pollachi, Tamil Nadu, India
[2] Dr Mahalingam Coll Engn & Technol, Pollachi, Tamil Nadu, India
关键词
Chaotic key generator; Combined logistic-sine map; Combined logistic-tent map; Fractional order chaotic system; Permutation and diffusion; Lorenz system; SCHEME; PERMUTATION; CRYPTANALYSIS; STANDARD; IMPROVEMENT; EFFICIENT; SYSTEM;
D O I
10.1007/s11517-022-02703-z
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Medical images of patients must be securely transmitted and kept private in telemedicine. To secure such medical images, this paper proposes a single round chaotic image encryption scheme based on a permutation-diffusion structure. A combined chaotic key generator (CCKG) is proposed to enhance key sensitivity and generation in order to improve the security of medical images to be encrypted. CCKG is used to produce the initial seeds for the fractional order chaotic system (FOCS) and Lorenz system (LS) for the permutation and diffusion processes, respectively. CCKG together with proposed permutation and diffusion methods enhances cipher image security in single round. Using zigzag transform (ZT) scanning, the plain image is first permuted block by block. The type of scanning used on each block is heavily influenced by the ZT selection from FOCS and LS. Following block-wise permutation, the permutation order (PO) generated from LS performs overall permutation. Based on the pixel positions, the overall permuted image is divided into odd and even parts. Then these parts of the images are diffused separately by the random pixel matrices generated by LS and FOCS. The cipher image is formed by combining the odd and even parts after diffusion. Secret key analysis, statistical analysis, differential attack analysis, and simulations confirm that with a single round of image encryption, the proposed system is competent, robust and effective.
引用
收藏
页码:205 / 227
页数:23
相关论文
共 50 条
  • [31] DNA key based visual chaotic image encryption
    Khan, Jan Sher
    Ahmad, Jawad
    Ahmed, Saygin Siddiq
    Siddiqa, Hafza Ayesha
    Abbasi, Saadullah Farooq
    Kayhan, Sema Koc
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (02) : 2549 - 2561
  • [32] An Image Scrambling Encryption Algorithm Combined Arnold and Chaotic Transform
    Huang Hui-fen
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 208 - 210
  • [33] Fast Chaotic Image Encryption Algorithm Combined with DNA Encoding
    Zhou H.-L.
    Liu H.-J.
    Zhou, Hong-Liang (lancechou@126.com), 1600, Northeast University (42): : 1391 - 1399
  • [34] Efficient one-round key exchange in the standard model
    Boyd, Colin
    Cliff, Yvonne
    Nieto, Juan Gonzalez
    Paterson, Kenneth C.
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 69 - +
  • [35] A novel image encryption algorithm based on improved key selection and digital chaotic map
    Xiang, Hongyue
    Liu, Lingfeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (14) : 22135 - 22162
  • [36] A novel image encryption algorithm based on improved key selection and digital chaotic map
    Hongyue Xiang
    Lingfeng Liu
    Multimedia Tools and Applications, 2021, 80 : 22135 - 22162
  • [37] Modified chaotic key-based algorithm for image encryption and its VLSI realization
    Rao, K. Deergha
    Gangadhar, Ch.
    PROCEEDINGS OF THE 2007 15TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING, 2007, : 439 - +
  • [38] Enhanced Chaotic Key-Based Algorithm for Low-Entropy Image Encryption
    Yavuz, Erdem
    Yazici, Rifat
    Kasapbasi, Mustafa Cem
    Yamac, Ezgi
    2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 385 - 388
  • [39] Breaking an image encryption technique based on neural chaotic generator
    Norouzi, Benyamin
    Mirzakuchaki, Sattar
    Norouzi, Peyman
    OPTIK, 2017, 140 : 946 - 952
  • [40] A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding
    Maddodi, Gururaj
    Awad, Abir
    Awad, Dounia
    Awad, Mirna
    Lee, Brian
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) : 24701 - 24725