scholarly journals A Novel Random Error Approximate Adder-Based Lightweight Medical Image Encryption Scheme for Secure Remote Monitoring of Health Data

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Nagarajan Manikandan ◽  
Rajappa Muthaiah ◽  
Yuvaraja Teekaraman ◽  
Ramya Kuppusamy ◽  
Arun Radhakrishnan

In the present global scenario, social distancing is an inevitable one. The need for social distancing and advancements of technology to facilitate the patients and doctors around the world mandated the telemedicine and remote monitoring of patience details as the pivotal way to diagnose the disease. In this, it is essential to transmit the patient’s information such as X-ray and scan images of them to the doctor in the remote location. Preventing the medical data from the technological adversaries is the need of the hour. Infinitesimal attacks in medical images may cost human lives. This work proposes a lightweight, secure medical image encryption scheme for the remote monitoring of health data. The proposed encryption scheme uses computationally less complex weighted shift approximate adder (WSAA)–based encryption logic. The scheme uses a 256-bit key for the encryption process that strengthens the encryption and robust against various attacks. The proposed encryption scheme deploys the WSAA for diffusing the pixel values. A unique way of key distribution for pixel-wise encryption within the image is proposed that avoids the need for separate logic for the pixel-wise confusion. The proposed Encryption scheme is evaluated for its entropy and horizontal, vertical, diagonal correlation, histogram, key space, and sensitivity. Experimental results affirm that the proposed scheme significantly good with less computational complexity. The peak signal-to-noise ratio (PSNR) value of the decrypted image is infinity, and this matches the ideal requirement of the medical encryption scheme.

Author(s):  
Sundararaman Rajagopalan ◽  
Siva Janakiraman ◽  
Amirtharajan Rengarajan

The healthcare industry has been facing a lot of challenges in securing electronic health records (EHR). Medical images have found a noteworthy position for diagnosis leading to therapeutic requirements. Millions of medical images of various modalities are generally safeguarded through software-based encryption. DICOM format is a widely used medical image type. In this chapter, DICOM image encryption implemented on cyclone FPGA and ARM microcontroller platforms is discussed. The methodology includes logistic map, DNA coding, and LFSR towards a balanced confusion – diffusion processes for encrypting 8-bit depth 256 × 256 resolution of DICOM images. For FPGA realization of this algorithm, the concurrency feature has been utilized by simultaneous processing of 128 × 128 pixel blocks which yielded a throughput of 79.4375 Mbps. Noticeably, the ARM controller which replicated this approach through sequential embedded “C” code took 1248 bytes in flash code memory and Cyclone IV FPGA consumed 21,870 logic elements for implementing the proposed encryption scheme with 50 MHz operating clock.


Author(s):  
Jan Sher Khan ◽  
Jawad Ahmad ◽  
Saadullah Farooq Abbasi ◽  
Arshad ◽  
Sema Koc Kayhan

Author(s):  
Kirtee Panwar ◽  
Ravindra Kumar Purwar ◽  
Garima Srivastava

This paper proposes an image encryption technique which is fast and secure. The encryption scheme is designed for secure transmission of video surveillance data (keyframes) over insecure network. The image encryption technique employs 1D Sine–Sine system with better chaotic properties than its seed map and faster than higher-dimensional chaotic systems. Further, design of encryption scheme is based on two permutation rounds, which employs pixel swapping operation and diffusion operation which is simple and provides required security against plaintext, differential and various other attacks. Three separate chaotic sequences are generated using 1D Sine–Sine system which enhances the key space of the encryption scheme. Secret keys are updated dynamically with SHA-256 hash value obtained from plain image. Hash values of plain image are efficiently used without loss of any hash value information. This makes the encryption scheme plaintext sensitive and secure against plaintext attacks. Performance and security aspects of encryption scheme is analyzed both quantitatively using predefined security metrics and qualitatively by scrutinizing the internal working of encryption scheme. Computational complexity of encrypting a plain image of size [Formula: see text] is [Formula: see text] and is suitable for encrypting keyframes of video for secure surveillance applications.


2015 ◽  
Vol 25 (09) ◽  
pp. 1550124 ◽  
Author(s):  
Lequan Min ◽  
Xiuping Yang ◽  
Guanrong Chen ◽  
Danling Wang

This study uses seven four-dimensional four-variable polynomial chaotic maps without equilibria in combination with generalized chaos synchronization (GCS) theorem to construct eight-dimensional bidirectional discrete generalized chaos synchronization (8DBDGCS) systems without equilibria. By combining the 8DBDGCS system with the GCS theorem, a 12-dimensional GCS system is designed. Numerical simulation verifies the chaotic dynamics of the 12-dimensional GCS system, which is used to design a 216-word chaotic pseudorandom number generator (CPRNG). The SP-8002 test suite is used to test the randomness of four 100-key streams consisting of 1 000 000 bits generated respectively by the CPRNG, a six-dimensional GCS-based CPRNG, the RC4 algorithm and the ZUC algorithm. The results show that the randomness performances of the two CPRNGs are promising, suggesting that there are no significant correlations between the key stream and the perturbed key streams generated via the 216-word CPRNG. In addition, theoretically the key space of the CPRNG is larger than 21195. The CPRNG is used with an avalanche-encryption scheme to encrypt an RGB balloon image, demonstrating that the CPRNG is able to generate the avalanche effects which are similar to those generated via ideal 216-word CPRNGs.


2013 ◽  
Vol 2013 ◽  
pp. 1-10 ◽  
Author(s):  
Adrian-Viorel Diaconu ◽  
Khaled Loukhaoukha

A recently proposed secure image encryption scheme has drawn attention to the limited security offered by chaos-based image encryption schemes (mainly due to their relatively small key space) proposing a highly robust approach, based on Rubik's cube principle. This paper aims to study a newly designed image cryptosystem that uses the Rubik's cube principle in conjunction with a digital chaotic cipher. Thus, the original image is shuffled on Rubik's cube principle (due to its proven confusion properties), and then XOR operator is applied to rows and columns of the scrambled image using a chaos-based cipher (due to its proven diffusion properties). Finally, the experimental results and security analysis show that the newly proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist any cryptanalytic attacks (e.g., exhaustive attack, differential attack, statistical attack, etc.).


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Li-Hua Gong ◽  
Jin Du ◽  
Jing Wan ◽  
Nan-Run Zhou

A new image encryption scheme is proposed with a combination of block scrambling, closed-loop diffusion, and DNA molecular mutation. The new chaotic block scrambling mechanism is put forward to replace the traditional swapping rule by combining the rectangular-ambulatory-plane cyclic shift with the bidirectional random disorganization. The closed-loop diffusion strategy is designed to form a feedback system, which improves the anti-interference capacity of the algorithm. To further destroy the blocks characteristics and eliminate the correlations among adjacent blocks, two efficient methods of DNA molecular mutation are adopted in the mutation stage. Moreover, the proposed algorithm possesses a large key space and the keys are highly related with the plaintext image. Experimental results demonstrate that the suggested image encryption strategy is practicable and has strong ability against a variety of common attacks.


Author(s):  
Ramireddy Navatejareddy ◽  
Muthukuru Jayabhaskar ◽  
Bachala Sathyanarayana

<p>Image <span>encryption enables users to safely transmit digital photographs via a wireless medium while maintaining enhanced anonymity and validity. Numerous studies are being conducted to strengthen picture encryption systems. Elliptical curve cryptography (ECC) is an effective tool for safely transferring images and recovering them at the receiver end in asymmetric cryptosystems. This method's key generation generates a public and private key pair that is used to encrypt and decrypt a picture. They use a public key to encrypt the picture before sending it to the intended user. When the receiver receives the image, they use their private key to decrypt it. This paper proposes an ECC-dependent image encryption scheme utilizing an enhancement strategy based on the gravitational search algorithm (GSA) algorithm. The private key generation step of the ECC system uses a GSA-based optimization process to boost the efficiency of picture encryption. The image's output is used as a health attribute in the optimization phase, such as the peak signal to noise ratio (PSNR) value, which demonstrates the efficacy of the proposed approach. As comparison to the ECC method, it has been discovered that the suggested encryption scheme offers better optimal PSNR </span>values.</p>


Sign in / Sign up

Export Citation Format

Share Document