Secured Permutation and Substitution Based Image Encryption Algorithm for Medical Security Applications

被引:3
|
作者
Premkumar, R. [1 ]
Anand, S. [2 ]
机构
[1] Mt Zion Coll Engn & Technol, Dept Elect & Commun Engn, Thirumayam Tk 622507, Tamil Nadu, India
[2] Mepco Engn Coll, Mepco Schlenk Engn Coll, Dept Elect & Commun Engn, Sivakasi 626005, Tamil Nadu, India
关键词
Encryption; Diffusion; Confusion; Secret Key; IMPROVED HYPERCHAOTIC SEQUENCES; CHAOTIC STANDARD; SCHEME; BREAKING; MAP;
D O I
10.1166/jmihi.2016.1966
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Privacy is a vital issue in transmitting or getting the advanced pictures over people in general systems. Picture encryption is a superior answer for accomplish a high security. In recent years, quantities of strategies have been proposed in the writing for picture encryption. The restriction of conventional cipher methods is insecurity upon known plain image attack and their development of the picture is not delicate to changes in plain picture. We proposed an efficient Secured Asymmetric Image Cipher (SAIC) Algorithm in which a secret key of variable size is used. Initially, two different keys are generated by using KG algorithm. One key is utilized for encryption and another is utilized for unscrambling process. By using the encryption key, the original image is scrambled by mixing process. The partially encrypted picture is isolated into element squares and the pieces are further prepared by key dependent permutation and substitution process to get the resultant encrypted image. The decrypted picture is gotten by processing the encrypted image through inverse substitution, inverse permutation and inverse mixing process using the decryption key. Experimental result shows that original image is independent than the encrypted image (NPCR > 99.99%, UACI > 36.7%, DR > 97%). The proposed method is easy to execute, computationally secure and has high encryption rate. Reproduction results accept the secured elements and viability of the proposed framework.
引用
收藏
页码:2012 / 2018
页数:7
相关论文
共 50 条
  • [21] Multiple-image encryption algorithm based on mixed image element and permutation
    Zhang, Xiaoqiang
    Wang, Xuesong
    OPTICS AND LASERS IN ENGINEERING, 2017, 92 : 6 - 16
  • [22] Towards provable security of substitution-permutation encryption networks
    Chen, ZG
    Tavares, SE
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 43 - 56
  • [23] A Novel Color Image Encryption Scheme Based on Permutation-substitution Architecture
    Ye, Rui-Song
    Ye, Ming
    Shi, Xiao-Yun
    Ye, Wen-Hao
    Li, Ya-Fang
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 212 - 218
  • [24] A Colour Image Encryption Scheme Using Permutation-Substitution Based on Chaos
    Wang, Xing-Yuan
    Zhang, Ying-Qian
    Bao, Xue-Mei
    ENTROPY, 2015, 17 (06): : 3877 - 3897
  • [25] A novel image encryption scheme based on substitution-permutation network and chaos
    Belazi, Akram
    Abd El-Latif, Ahmed A.
    Belghith, Safya
    SIGNAL PROCESSING, 2016, 128 : 155 - 170
  • [26] On the security of JPEG image encryption with RS pairs permutation
    Yuan, Yuan
    He, Hongjie
    Chen, Fan
    Qu, Lingfeng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 82
  • [27] A SECURITY TECHNIQUE BASED ON WATERMARKING AND ENCRYPTION FOR MEDICAL IMAGE
    Sarani, N.
    Amudha, K.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [28] On the Security of Permutation-Only Image Encryption Schemes
    Jolfaei, Alireza
    Wu, Xin-Wen
    Muthukkumarasamy, Vallipuram
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) : 235 - 246
  • [29] A chaotic permutation and diffusion based image encryption algorithm for secure communications
    Mondal, Bhaskar
    Kumar, Prabhakar
    Singh, Shrey
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (23) : 31177 - 31198
  • [30] Permutation Based Image Encryption Algorithm using Block Cipher Approach
    Rawat, Aditya
    Gupta, Ipshita
    Goel, Yash
    Sinha, Nishith
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1877 - 1882