A one-round medical image encryption algorithm based on a combined chaotic key generator

被引:6
|
作者
Kumar, D. [1 ]
Sudha, V. K. [2 ]
Ranjithkumar, R. [1 ]
机构
[1] PA Coll Engn & Technol, Pollachi, Tamil Nadu, India
[2] Dr Mahalingam Coll Engn & Technol, Pollachi, Tamil Nadu, India
关键词
Chaotic key generator; Combined logistic-sine map; Combined logistic-tent map; Fractional order chaotic system; Permutation and diffusion; Lorenz system; SCHEME; PERMUTATION; CRYPTANALYSIS; STANDARD; IMPROVEMENT; EFFICIENT; SYSTEM;
D O I
10.1007/s11517-022-02703-z
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Medical images of patients must be securely transmitted and kept private in telemedicine. To secure such medical images, this paper proposes a single round chaotic image encryption scheme based on a permutation-diffusion structure. A combined chaotic key generator (CCKG) is proposed to enhance key sensitivity and generation in order to improve the security of medical images to be encrypted. CCKG is used to produce the initial seeds for the fractional order chaotic system (FOCS) and Lorenz system (LS) for the permutation and diffusion processes, respectively. CCKG together with proposed permutation and diffusion methods enhances cipher image security in single round. Using zigzag transform (ZT) scanning, the plain image is first permuted block by block. The type of scanning used on each block is heavily influenced by the ZT selection from FOCS and LS. Following block-wise permutation, the permutation order (PO) generated from LS performs overall permutation. Based on the pixel positions, the overall permuted image is divided into odd and even parts. Then these parts of the images are diffused separately by the random pixel matrices generated by LS and FOCS. The cipher image is formed by combining the odd and even parts after diffusion. Secret key analysis, statistical analysis, differential attack analysis, and simulations confirm that with a single round of image encryption, the proposed system is competent, robust and effective.
引用
收藏
页码:205 / 227
页数:23
相关论文
共 50 条
  • [1] A one-round medical image encryption algorithm based on a combined chaotic key generator
    Medical & Biological Engineering & Computing, 2023, 61 : 205 - 227
  • [2] Chaotic Image Encryption with Hash Keying as Key Generator
    Gopalakrishnan, T.
    Ramakrishnan, S.
    IETE JOURNAL OF RESEARCH, 2017, 63 (02) : 172 - 187
  • [3] A secure multi-stage one-round bit-plane permutation operation based chaotic image encryption
    Patro, K. Abhimanyu Kumar
    Acharya, Bibhudendra
    Nath, Vijay
    MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS, 2019, 25 (06): : 2331 - 2338
  • [4] Image encryption algorithm using chaotic Chebyshev generator
    Huang, Xiaoling
    NONLINEAR DYNAMICS, 2012, 67 (04) : 2411 - 2417
  • [5] A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process
    Norouzi, Benyamin
    Mirzakuchaki, Sattar
    Seyedzadeh, Seyed
    Mosavi, Mohammad Reza
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 71 (03) : 1469 - 1497
  • [6] A novel image encryption algorithm based on hybrid chaotic maps using a key image
    Benaissi, Sellami
    Chikouche, Noureddine
    Hamza, Rafik
    OPTIK, 2023, 272
  • [7] A Chaotic Image Encryption Algorithm Based on Information Entropy
    Ye, Guodong
    Pan, Chen
    Huang, Xiaoling
    Zhao, Zhenyu
    He, Jianqing
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 28 (01):
  • [8] A new chaos-based image encryption algorithm with dynamic key selection mechanisms
    Chai, Xiuli
    Yang, Kang
    Gan, Zhihua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) : 9907 - 9927
  • [9] Medical image encryption algorithm based on Latin square and memristive chaotic system
    Chai, Xiuli
    Zhang, Jitong
    Gan, Zhihua
    Zhang, Yushu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (24) : 35419 - 35453
  • [10] A Fast Image Encryption Algorithm Based on High-dimension Chaotic System
    Xu, Shujiang
    Wang, Lianhai
    Wang, Jizhi
    Li, Hengjian
    Guo, Yucui
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 829 - 835