Secured Permutation and Substitution Based Image Encryption Algorithm for Medical Security Applications

被引:3
|
作者
Premkumar, R. [1 ]
Anand, S. [2 ]
机构
[1] Mt Zion Coll Engn & Technol, Dept Elect & Commun Engn, Thirumayam Tk 622507, Tamil Nadu, India
[2] Mepco Engn Coll, Mepco Schlenk Engn Coll, Dept Elect & Commun Engn, Sivakasi 626005, Tamil Nadu, India
关键词
Encryption; Diffusion; Confusion; Secret Key; IMPROVED HYPERCHAOTIC SEQUENCES; CHAOTIC STANDARD; SCHEME; BREAKING; MAP;
D O I
10.1166/jmihi.2016.1966
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Privacy is a vital issue in transmitting or getting the advanced pictures over people in general systems. Picture encryption is a superior answer for accomplish a high security. In recent years, quantities of strategies have been proposed in the writing for picture encryption. The restriction of conventional cipher methods is insecurity upon known plain image attack and their development of the picture is not delicate to changes in plain picture. We proposed an efficient Secured Asymmetric Image Cipher (SAIC) Algorithm in which a secret key of variable size is used. Initially, two different keys are generated by using KG algorithm. One key is utilized for encryption and another is utilized for unscrambling process. By using the encryption key, the original image is scrambled by mixing process. The partially encrypted picture is isolated into element squares and the pieces are further prepared by key dependent permutation and substitution process to get the resultant encrypted image. The decrypted picture is gotten by processing the encrypted image through inverse substitution, inverse permutation and inverse mixing process using the decryption key. Experimental result shows that original image is independent than the encrypted image (NPCR > 99.99%, UACI > 36.7%, DR > 97%). The proposed method is easy to execute, computationally secure and has high encryption rate. Reproduction results accept the secured elements and viability of the proposed framework.
引用
收藏
页码:2012 / 2018
页数:7
相关论文
共 50 条
  • [1] An image encryption algorithm based on joint RNA-level permutation and substitution
    Duzhong Zhang
    Xiancheng Wen
    Chao Yan
    Taiyong Li
    Multimedia Tools and Applications, 2023, 82 : 23401 - 23426
  • [2] An image encryption algorithm based on joint RNA-level permutation and substitution
    Zhang, Duzhong
    Wen, Xiancheng
    Yan, Chao
    Li, Taiyong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (15) : 23401 - 23426
  • [3] Medical image encryption based on pixel arrangement and random permutation for transmission security
    Usman, Koredianto
    Juzoji, Hiroshi
    Nakajima, Isao
    Soegidjoko, Soegijardjo
    Ramdhani, Mohamad
    Hori, Toshihiro
    Igi, Seiji
    HEALTHCOM 2007: UBIQUITOUS HEALTHCARE IN AGING SOCIETIES, 2007, : 244 - +
  • [4] Colour Image Encryption Scheme Based on Permutation and Substitution Techniques
    Pareek, Narendra K.
    Patidar, Vinod
    Sud, Krishan K.
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PT I, 2011, 131 : 413 - +
  • [5] An image encryption algorithm based on 3-D DNA level permutation and substitution scheme
    Zhu, Changjiang
    Gan, Zhihua
    Lu, Yang
    Chai, Xiuli
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7227 - 7258
  • [6] Binary Key Based Permutation For Medical Image Encryption
    Bhopi, Sachin Kailas
    Dongre, Nilima M.
    Gulwani, Reshma R.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 343 - 347
  • [7] An image encryption algorithm based on 3-D DNA level permutation and substitution scheme
    Changjiang Zhu
    Zhihua Gan
    Yang Lu
    Xiuli Chai
    Multimedia Tools and Applications, 2020, 79 : 7227 - 7258
  • [8] A new chaos based color image encryption algorithm using permutation substitution and Boolean operation
    Ali, Tahir Sajjad
    Ali, Rashid
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (27-28) : 19853 - 19873
  • [9] A new chaos based color image encryption algorithm using permutation substitution and Boolean operation
    Tahir Sajjad Ali
    Rashid Ali
    Multimedia Tools and Applications, 2020, 79 : 19853 - 19873
  • [10] A Color Image Encryption Technique Based on a Substitution-Permutation Network
    Mastan, J. Mohamedmoideen Kader
    Sathishkumar, G. A.
    Bagan, K. Bhoopathy
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 524 - +