A new efficient medical image cipher based on hybrid chaotic map and DNA code

Author(s):  
Ramzi Guesmi ◽  
M. A. Ben Farah
2021 ◽  
Vol 39 (5A) ◽  
pp. 711-722
Author(s):  
Amira K. Jabbar ◽  
Ashwaq T. Hashim ◽  
Qusay F. Al-Doori

Recently, online-medicine got increased global interest, particularly during COVID19 pandemic. Data protection is important in the medical field since when promoting telemedicine applications, it is necessary to protect the patient data and personal information. A secured process is needed to transmit medical images over the Internet. In this paper hash algorithm is employed to protect the data by using powerful features from the coupled frequency domains of the Slantlet Transformation (SLT) and the Discrete Cosine Transform (DCT). The Region of Interest (ROI) is localized from an MRI image then extraction of a feature set is performed for calculating the hash code. Then, hash code is enciphered to maintain security by employing a secure Chaotic Shift Keying (CSK). The suggested method of security is ensured by the strength of the CSK and the encryption key secrecy.  A detailed analysis was conducted using 1000 uncompressed images that were chosen randomly from a publicly available AANLIB database. The proposed methodology can be useful for JPEG compression. Also, this method could resist many attacks of image processing likes filtering, noise addition, and some geometric transforms.


Author(s):  
N. Mohananthini ◽  
M. Y. Mohamed Parvees ◽  
J. Abdul Samath

Nowadays, lightweight cryptography attracts academicians, scientists and researchers to concentrate on its requisite with the increasing usage of low resource devices. In this paper, a new lightweight image encryption scheme is proposed using the Lorenz 3D super chaotic map. This encryption scheme is an addition–rotation–XOR block cipher designed for its supremacy, efficacy and speed execution. In this addition–rotation–XOR cipher, the equation for Lorenz 3D chaotic map is iteratively solved to generate double valued signals in a speedy manner using the Runge–Kutta and Euler methods. The addition, rotation and diffusion sequences are generated from the double valued signals, and the source pixels of the 8-bit plain test images are manipulated with the addition, rotation and diffusion of the bytes. Finally, the cipher images are constructed from the manipulated pixels and evaluated with various statistical as well as randomness tests. The results from various tests prove that the proposed chaotic addition–rotation–XOR block image cipher is efficient in terms of randomness and speed.


2021 ◽  
Vol 38 (6) ◽  
pp. 1637-1646
Author(s):  
KVSV Trinadh Reddy ◽  
S. Narayana Reddy

In distributed m-health communication, it is a major challenge to develop an efficient blind watermarking method to protect the confidential medical data of patients. This paper proposes an efficient blind watermarking for medical images, which boasts a very high embedding capacity, a good robustness, and a strong imperceptibility. Three techniques, namely, discrete cosine transform (DCT), Weber’s descriptors (WDs), and Arnold chaotic map, were integrated to our method. Specifically, the Arnold chaotic map was used to scramble the watermark image. Then, the medical image was partitioned into non-over lapping blocks, and each block was subjected to DCT. After that, the scrambled watermark image data were embedded in the middle-band DCT coefficients of each block, such that two bits were embedded in each block. Simulation results show that the proposed watermarking method provides better imperceptibility, robustness, and computational complexity results with higher embedding capacity than the contrastive method.


2014 ◽  
Vol 6 (2) ◽  
pp. 1-22
Author(s):  
Lin Gao ◽  
Tiegang Gao

A novel medical image tamper detection and recovery scheme based on Least Significant Bit (LSB) embedding and Piecewise Linear Chaotic Map (PWLCM) is proposed in the paper. To meet the demand of medical usage, the proposed scheme not only improved the precision of detection compared with block-wise scheme of watermark embedding, but also guaranteed the security of the scheme by applying PWLCM. To evaluate the proposed scheme, a former scheme proposed by Xiao et al is used for comparison; the two scheme's visual quality, accuracy of detection, recovery quality and security are tested during the experiment. The experimental results suggest that the proposed scheme meets the demand of visual quality and security for using in medical image tamper detection and recovery.


2018 ◽  
Vol 150 ◽  
pp. 233-247 ◽  
Author(s):  
Ping Ping ◽  
Jinjie Wu ◽  
Yingchi Mao ◽  
Feng Xu ◽  
Jinyang Fan

Sign in / Sign up

Export Citation Format

Share Document