scholarly journals Embed Watermark Computing Using Logistic Map Chaotic System For Securing Medical Images

2019 ◽  
Vol 29 (08) ◽  
pp. 1950112 ◽  
Author(s):  
Erivelton G. Nepomuceno ◽  
Priscila F. S. Guedes ◽  
Alípio M. Barbosa ◽  
Matjaž Perc ◽  
Robert Repnik

Soft computing strategies are drawing widespread interest in engineering and science fields, particularly so because of their capacity to reason and learn in a domain of inherent uncertainty, approximation, and unpredictability. However, soft computing research devoted to finite precision effects in chaotic system simulations is still in a nascent stage, and there are ample opportunities for new discoveries. In this paper, we consider the error that is due to finite precision in the simulation of chaotic systems. We present a generalized version of the lower bound error using an arbitrary number of natural interval extensions. The lower bound error has been used to simulate a chaotic system with lower and upper bounds. The width of this interval does not diverge, which is an advantage compared to other techniques. We illustrate our approach on three systems, namely the logistic map, the Singer map and the Chua circuit. Moreover, we validate the method by calculating the largest Lyapunov exponent.


Author(s):  
Sundararaman Rajagopalan ◽  
Siva Janakiraman ◽  
Amirtharajan Rengarajan

The healthcare industry has been facing a lot of challenges in securing electronic health records (EHR). Medical images have found a noteworthy position for diagnosis leading to therapeutic requirements. Millions of medical images of various modalities are generally safeguarded through software-based encryption. DICOM format is a widely used medical image type. In this chapter, DICOM image encryption implemented on cyclone FPGA and ARM microcontroller platforms is discussed. The methodology includes logistic map, DNA coding, and LFSR towards a balanced confusion – diffusion processes for encrypting 8-bit depth 256 × 256 resolution of DICOM images. For FPGA realization of this algorithm, the concurrency feature has been utilized by simultaneous processing of 128 × 128 pixel blocks which yielded a throughput of 79.4375 Mbps. Noticeably, the ARM controller which replicated this approach through sequential embedded “C” code took 1248 bytes in flash code memory and Cyclone IV FPGA consumed 21,870 logic elements for implementing the proposed encryption scheme with 50 MHz operating clock.


Fractals ◽  
2021 ◽  
Author(s):  
BAHAA-ALDEEN M. ABO-ALNAGA ◽  
LOBNA A. SAID ◽  
AHMED H. MADIAN ◽  
AHMED G. RADWAN

This paper studies the capability of digital architecture to mimic fractal behavior. As chaotic attractors realized digitally had opened many tracks, digital designs mimicking fractals may ultimately achieve the same. This study is based on a complex single-dimensional discrete chaotic system known as the generalized positive logistic map. The fractals realized from this system are linked to the results of the mathematical analysis to understand the fractal behavior with different variations. A digital hardware architecture manifesting the fractal behavior is achieved on FPGA, showing a fractal entity experimentally. With this digital realization, it is hoped that fractals can follow the example of chaotic attractors digital applications.


2014 ◽  
Vol 543-547 ◽  
pp. 1571-1574
Author(s):  
Ya Shuang Deng ◽  
Han Ping Hu

In this paper, the degradation problem of digital Logistic map is investigated. Chen chaotic system is applied to anti-control the digital Logistic map and a controller that combines an external state control along with a modular function is designed. Results of the experiments show that the external control can greatly improve the dynamical and statistical properties. Thus, it can be used in cryptography applications.


Significant research efforts have been invested in recent years to export new concepts for secure cryptographic methods. Many mathematicians are attracted by Chaos functions as it has sensitive nature toward its initial conditions and their colossal suitability to problems in daily life. Inspired by new researches, a new chaotic cryptography algorithm is proposed in this paper. The key feature of this approach is that instantaneous key is generated at host independently that is used to determine the type of operations on each pixel. The information available in images is 24 bit RGB these value are modified mathematically using eight reversible operations. Also during encryption, the control parameter of the chaotic system is updated timely.


Author(s):  
Sundararaman Rajagopalan ◽  
Siva Janakiraman ◽  
Amirtharajan Rengarajan

The healthcare industry has been facing a lot of challenges in securing electronic health records (EHR). Medical images have found a noteworthy position for diagnosis leading to therapeutic requirements. Millions of medical images of various modalities are generally safeguarded through software-based encryption. DICOM format is a widely used medical image type. In this chapter, DICOM image encryption implemented on cyclone FPGA and ARM microcontroller platforms is discussed. The methodology includes logistic map, DNA coding, and LFSR towards a balanced confusion – diffusion processes for encrypting 8-bit depth 256 × 256 resolution of DICOM images. For FPGA realization of this algorithm, the concurrency feature has been utilized by simultaneous processing of 128 × 128 pixel blocks which yielded a throughput of 79.4375 Mbps. Noticeably, the ARM controller which replicated this approach through sequential embedded “C” code took 1248 bytes in flash code memory and Cyclone IV FPGA consumed 21,870 logic elements for implementing the proposed encryption scheme with 50 MHz operating clock.


2017 ◽  
Vol 88 (3) ◽  
pp. 1655-1675 ◽  
Author(s):  
Nabil Ben Slimane ◽  
Kais Bouallegue ◽  
Mohsen Machhout

2013 ◽  
Vol 5 (3) ◽  
pp. 898-904 ◽  
Author(s):  
Hua Xue ◽  
Shubin Wang ◽  
Xiandong Meng
Keyword(s):  

2008 ◽  
Vol 22 (07) ◽  
pp. 901-908 ◽  
Author(s):  
XINGYUAN WANG ◽  
CHAOFENG DUAN ◽  
NINI GU

This paper analyzes the encryption and weaknesses of E. Álvarez cryptography. On the basis of this, a new chaotic cryptography based on ergodicity is presented. The control parameter and the initial condition of the chaotic system are chosen as a secret key. A bit chain is generated by iterating the chaotic map, and the location where a plaintext grouping appears in the chain is found. We then write down the number of iterations of the chaotic map as the ciphertext grouping. Several weaknesses of the E. Álvarez cryptography are avoided in the new scheme, and the security of the new scheme is improved. In the end, the new cryptography is studied experimentally using the Logistic map, where the new cryptography's confusion and diffusion is validated, and its effectiveness is also illuminated.


Sign in / Sign up

Export Citation Format

Share Document