scholarly journals An Efficient Image Encryption Scheme Based on S-Boxes and Fractional-Order Differential Logistic Map

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 54175-54188 ◽  
Author(s):  
Ying-Qian Zhang ◽  
Jun-Ling Hao ◽  
Xing-Yuan Wang
2021 ◽  
Vol 18 (5) ◽  
pp. 5427-5448
Author(s):  
Guodong Ye ◽  
◽  
Huishan Wu ◽  
Kaixin Jiao ◽  
Duan Mei

Author(s):  
Sundararaman Rajagopalan ◽  
Siva Janakiraman ◽  
Amirtharajan Rengarajan

The healthcare industry has been facing a lot of challenges in securing electronic health records (EHR). Medical images have found a noteworthy position for diagnosis leading to therapeutic requirements. Millions of medical images of various modalities are generally safeguarded through software-based encryption. DICOM format is a widely used medical image type. In this chapter, DICOM image encryption implemented on cyclone FPGA and ARM microcontroller platforms is discussed. The methodology includes logistic map, DNA coding, and LFSR towards a balanced confusion – diffusion processes for encrypting 8-bit depth 256 × 256 resolution of DICOM images. For FPGA realization of this algorithm, the concurrency feature has been utilized by simultaneous processing of 128 × 128 pixel blocks which yielded a throughput of 79.4375 Mbps. Noticeably, the ARM controller which replicated this approach through sequential embedded “C” code took 1248 bytes in flash code memory and Cyclone IV FPGA consumed 21,870 logic elements for implementing the proposed encryption scheme with 50 MHz operating clock.


Author(s):  
Djamel Herbadji ◽  
Nadir Derouiche ◽  
Aissa Belmeguenai ◽  
Toufik Bekkouche ◽  
Abdelhadi Labiad ◽  
...  

2014 ◽  
Vol 602-605 ◽  
pp. 3498-3502 ◽  
Author(s):  
Huai Xun Zhao ◽  
Peng Cheng ◽  
Jun Hao Han

This letter presents a new color image encryption scheme based on the coupled chaos maps. First, the algorithm uses the coupled logistic map to generate random strong key stream, and then designed a kind of initial simple diffusion-joint scrambling-combined diffusion method from the point of the relationships of components R, G, B. The simulation results indicate that this algorithm has stronger security compared with the independent encryption of each color component.


Sign in / Sign up

Export Citation Format

Share Document