Secured Permutation and Substitution Based Image Encryption Algorithm for Medical Security Applications

被引:3
|
作者
Premkumar, R. [1 ]
Anand, S. [2 ]
机构
[1] Mt Zion Coll Engn & Technol, Dept Elect & Commun Engn, Thirumayam Tk 622507, Tamil Nadu, India
[2] Mepco Engn Coll, Mepco Schlenk Engn Coll, Dept Elect & Commun Engn, Sivakasi 626005, Tamil Nadu, India
关键词
Encryption; Diffusion; Confusion; Secret Key; IMPROVED HYPERCHAOTIC SEQUENCES; CHAOTIC STANDARD; SCHEME; BREAKING; MAP;
D O I
10.1166/jmihi.2016.1966
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Privacy is a vital issue in transmitting or getting the advanced pictures over people in general systems. Picture encryption is a superior answer for accomplish a high security. In recent years, quantities of strategies have been proposed in the writing for picture encryption. The restriction of conventional cipher methods is insecurity upon known plain image attack and their development of the picture is not delicate to changes in plain picture. We proposed an efficient Secured Asymmetric Image Cipher (SAIC) Algorithm in which a secret key of variable size is used. Initially, two different keys are generated by using KG algorithm. One key is utilized for encryption and another is utilized for unscrambling process. By using the encryption key, the original image is scrambled by mixing process. The partially encrypted picture is isolated into element squares and the pieces are further prepared by key dependent permutation and substitution process to get the resultant encrypted image. The decrypted picture is gotten by processing the encrypted image through inverse substitution, inverse permutation and inverse mixing process using the decryption key. Experimental result shows that original image is independent than the encrypted image (NPCR > 99.99%, UACI > 36.7%, DR > 97%). The proposed method is easy to execute, computationally secure and has high encryption rate. Reproduction results accept the secured elements and viability of the proposed framework.
引用
收藏
页码:2012 / 2018
页数:7
相关论文
共 50 条
  • [41] A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture
    Kordov, Krasimir
    ELECTRONICS, 2019, 8 (05)
  • [42] Color image encryption scheme based on fractional Hartley transform and chaotic substitution–permutation
    Gurpreet Kaur
    Rekha Agarwal
    Vinod Patidar
    The Visual Computer, 2022, 38 : 1027 - 1050
  • [43] Cryptanalysis of substitution-permutation network based image encryption schemes: a systematic review
    Dhall, Sakshi
    Yadav, Khushboo
    NONLINEAR DYNAMICS, 2024, 112 (17) : 14719 - 14744
  • [44] Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher
    H.T. Panduranga
    S.K. Naveen Kumar
    The European Physical Journal Special Topics, 2014, 223 : 1663 - 1677
  • [45] Development and Analysis of Symmetric Encryption Algorithm Qamal Based on a Substitution-permutation Network
    Biyashev, Rustem G.
    Kapalova, Nursulu A.
    Dyusenbayev, Dilmuhanbet S.
    Algazy, Kunbolat T.
    Wojcik, Waldemar
    Smolarz, Andrzej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (01) : 127 - 132
  • [46] Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher
    Panduranga, H. T.
    Kumar, S. K. Naveen
    Kiran
    EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2014, 223 (08): : 1663 - 1677
  • [47] Research on medical image encryption based on DES algorithm
    Wang, Rui
    Wang, Jinguo
    Wang, Na
    Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 253 - 256
  • [48] Medical Image Encryption Algorithm Based on Chaotic Function
    Zhang, Junjie
    Tan, Jun
    Cheng, Yun
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 446 - 450
  • [49] Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications
    Hasan, Mohammad Kamrul
    Islam, Shayla
    Sulaiman, Rossilawati
    Khan, Sheroz
    Hashim, Aisha-Hassan Abdalla
    Habib, Shabana
    Islam, Mohammad
    Alyahya, Saleh
    Ahmed, Musse Mohamed
    Kamil, Samar
    Hassan, Md Arif
    IEEE ACCESS, 2021, 9 : 47731 - 47742
  • [50] Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications
    Hasan, Mohammad Kamrul
    Islam, Shayla
    Sulaiman, Rossilawati
    Khan, Sheroz
    Hashim, Aisha-Hassan Abdalla
    Habib, Shabana
    Islam, Mohammad
    Alyahya, Saleh
    Ahmed, Musse Mohamed
    Kamil, Samar
    Hassan, Md Arif
    IEEE Access, 2021, 9 : 47731 - 47742