Secured Permutation and Substitution Based Image Encryption Algorithm for Medical Security Applications

被引:3
|
作者
Premkumar, R. [1 ]
Anand, S. [2 ]
机构
[1] Mt Zion Coll Engn & Technol, Dept Elect & Commun Engn, Thirumayam Tk 622507, Tamil Nadu, India
[2] Mepco Engn Coll, Mepco Schlenk Engn Coll, Dept Elect & Commun Engn, Sivakasi 626005, Tamil Nadu, India
关键词
Encryption; Diffusion; Confusion; Secret Key; IMPROVED HYPERCHAOTIC SEQUENCES; CHAOTIC STANDARD; SCHEME; BREAKING; MAP;
D O I
10.1166/jmihi.2016.1966
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Privacy is a vital issue in transmitting or getting the advanced pictures over people in general systems. Picture encryption is a superior answer for accomplish a high security. In recent years, quantities of strategies have been proposed in the writing for picture encryption. The restriction of conventional cipher methods is insecurity upon known plain image attack and their development of the picture is not delicate to changes in plain picture. We proposed an efficient Secured Asymmetric Image Cipher (SAIC) Algorithm in which a secret key of variable size is used. Initially, two different keys are generated by using KG algorithm. One key is utilized for encryption and another is utilized for unscrambling process. By using the encryption key, the original image is scrambled by mixing process. The partially encrypted picture is isolated into element squares and the pieces are further prepared by key dependent permutation and substitution process to get the resultant encrypted image. The decrypted picture is gotten by processing the encrypted image through inverse substitution, inverse permutation and inverse mixing process using the decryption key. Experimental result shows that original image is independent than the encrypted image (NPCR > 99.99%, UACI > 36.7%, DR > 97%). The proposed method is easy to execute, computationally secure and has high encryption rate. Reproduction results accept the secured elements and viability of the proposed framework.
引用
收藏
页码:2012 / 2018
页数:7
相关论文
共 50 条
  • [31] Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level Permutation
    Lu, Bin
    Liu, Fenlin
    Xu, Ping
    Ge, Xin
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 506 - 518
  • [32] A chaotic permutation and diffusion based image encryption algorithm for secure communications
    Bhaskar Mondal
    Prabhakar Kumar
    Shrey Singh
    Multimedia Tools and Applications, 2018, 77 : 31177 - 31198
  • [33] A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution
    Arif, Jameel
    Khan, Muazzam A.
    Ghaleb, Baraq
    Ahmad, Jawad
    Munir, Arslan
    Rashid, Umer
    Al-Dubai, Ahmed Y.
    IEEE ACCESS, 2022, 10 : 12966 - 12982
  • [34] Robust image encryption algorithm based on oscillated substitution and effective confusion module with novel chaining permutation and pixel mutation
    Al-Muhammed, Muhammed J.
    Al-Daraiseh, Ahmad
    Optik, 2024, 319
  • [35] Permutation-Substitution Architecture Based Image Encryption Algorithm Using Middle Square and RC4 PRNG
    Bhowmick, Anirban
    Sinha, Nishith
    Arjunan, R. Vijaya
    Kishore, B.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 433 - 438
  • [36] An Efficient Homomorphic Medical Image Encryption Algorithm For Cloud Storage Security
    Vengadapurvaja, A. M.
    Nisha, G.
    Aarthy, R.
    Sasikaladevi, N.
    7TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2017), 2017, 115 : 643 - 650
  • [37] Image Encryption and Compression for Medical Image Security
    Puech, W.
    2008 FIRST INTERNATIONAL WORKSHOPS ON IMAGE PROCESSING THEORY, TOOLS AND APPLICATIONS (IPTA), 2008, : 37 - 38
  • [38] An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution
    Alghamdi Y.
    Munir A.
    SN Computer Science, 4 (6)
  • [39] An image encryption algorithm based on substitution technique and chaos mixing
    Yannick Pascal Kamdeu Nkandeu
    Alain Tiedeu
    Multimedia Tools and Applications, 2019, 78 : 10013 - 10034
  • [40] An image encryption algorithm based on substitution technique and chaos mixing
    Nkandeu, Yannick Pascal Kamdeu
    Tiedeu, Alain
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) : 10013 - 10034