Image Encryption Algorithm based on Circular Shift in Pixel Bit Value by Group Modulo Operation for Medical Images

Author(s):  
Vineet Kumar Singh ◽  
Piyush Kumar Singh ◽  
K.N. Rai
IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Sara T. Kamal ◽  
Khalid M. Hosny ◽  
Taha M. Elgindy ◽  
Mohamed M. Darwish ◽  
Mostafa M. Fouda

2019 ◽  
Vol 8 (3) ◽  
pp. 1716-1722 ◽  

An essential security requirement while transmitting and receiving medical images is to maintain confidentiality and authorization of these medical images. This paper contains a proposal of an enhanced lossless image encryption algorithm that provides security to Digital Imaging and Communications in Medicine (DICOM) images by producing a random key with using enhanced group modulo based bit circular shift (GMO-BCS) technique. Random key production is the backbone of this technique to provide robust security of medical images that transfer over a network. In the encryption process, we randomly generate a key for each and every pixel of the DICOM image. Group theory is used in this process to create circular shifting in 8-bit pixel values while the security enhancement employs the random key for encryption. This technique is more suitable for medical image encryption either by direct transmission or multimedia app-based transmission under telemedicine and others


2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


2019 ◽  
Vol 38 (3) ◽  
pp. 647-678 ◽  
Author(s):  
Ľuboš Ovseník ◽  
Ján Turán ◽  
Tomáš Huszaník ◽  
Jakub Oravec ◽  
Ondrej Kováč ◽  
...  

2009 ◽  
Vol 29 (8) ◽  
pp. 2210-2212
Author(s):  
Shi-yue LAI ◽  
Xiao-feng LIAO ◽  
Qing ZHOU

Sign in / Sign up

Export Citation Format

Share Document