An Implementation of SLICE Algorithm to Enforce Security for Medical Images using DNA Approach

被引:0
|
作者
Bharghavi, G. [1 ]
Kumar, Pabolu Sravan [1 ]
Geetha, K. [2 ]
Devi, Sasikala N. [2 ]
机构
[1] SASTRA Deemed Univ, Dept Comp Sci & Engn, Thanjavur 613401, India
[2] SASTRA Deemed Univ, Sch Comp, Thanjavur 613401, India
关键词
Scrambling; Logistic Chaotic Encryption and Decryption; DNA Encoding and Decoding; Medical Image; WATERMARKING; ROBUST;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In Today's world, medical diagnostics by tele-communication plays a major role in people life. There brings a need for securing medical data when transmitted over an insecure communication channel. To ensure the confidentiality, integrity and authenticity for the medical images when transmitted, we propose an algorithm named SLICE abbreviated from Scrambling LogIstic Chaotic Encoding to ensure security for the medical documents and images transaction. The input DICOM image is scrambled pixel by pixel and is distributed in an unexplored manner. A random pixel value is obtained from the image by performing splitting and shifting operation. The chaotic map is then applied. The image from chaotic map is then DNA encoded. The DNA encoding performs a masking operation on the pixel value to obtain a binary sequence. The binary sequence is added with the obtained random pixel value. All these phases are reversed to decrypt the encrypted image. Since the key has strong sensitiveness, decoding becomes very difficult- and hence ensures security of patient's medical document. This ensures the algorithm protects patient's medical images. Experimental results have shown that the proposed algorithm maintains a high level of integrity and robustness. The algorithm also provides a promising performance and computational efficiency for securing digital medical encryption using DICOM images.
引用
收藏
页码:984 / 988
页数:5
相关论文
共 50 条
  • [1] Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach
    Adeniyi, A. E.
    Abiodun, K. M.
    Awotunde, J. B.
    Olagunju, M.
    Ojo, O. S.
    Edet, N. P.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (13) : 20537 - 20551
  • [2] Implementation of security algorithm for wireless sensor networks over multimedia images
    Bisht, Neha
    Thomas, Joel
    Thanikaiselvan, V
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 452 - 457
  • [3] Towards texture accurate slice interpolation of medical images using PixelMiner
    Rogers, W.
    Keek, S. A.
    Beuque, M.
    Lavrova, E.
    Primakov, S.
    Wu, G.
    Yan, C.
    Sanduleanu, S.
    Gietema, H. A.
    Casale, R.
    Occhipinti, M.
    Woodruff, H. C.
    Jochems, A.
    Lambin, P.
    COMPUTERS IN BIOLOGY AND MEDICINE, 2023, 161
  • [4] Efficient Joint Encryption and Data Hiding Algorithm for Medical Images Security
    Abdel-Nabi, Hiba
    Al-Haj, Ali
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 147 - 152
  • [5] Segmentation of medical images using a genetic algorithm
    Ghosh, Payel
    Mitchell, Melanie
    GECCO 2006: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, 2006, : 1171 - +
  • [6] PEE Based Reversible Watermarking Algorithm for Authentication and Security of Medical Images
    Shivdeep
    Ghosh, Sudip
    Ghosal, Prasun
    Maity, Santi Prasad
    Rahaman, Hafizur
    2020 IEEE REGION 10 SYMPOSIUM (TENSYMP) - TECHNOLOGY FOR IMPACTFUL SUSTAINABLE DEVELOPMENT, 2020, : 1620 - 1623
  • [7] Hardware Design with Real-Time Implementation for Security of Medical Images and EPMR
    Ghosh, Sudip
    Bhateja, Yuvam
    Palathinkal, Joshua Roy
    Rahaman, Hafizur
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2022, 41 (02) : 867 - 891
  • [8] Hardware Design with Real-Time Implementation for Security of Medical Images and EPMR
    Sudip Ghosh
    Yuvam Bhateja
    Joshua Roy Palathinkal
    Hafizur Rahaman
    Circuits, Systems, and Signal Processing, 2022, 41 : 867 - 891
  • [9] Reconstruction of Thin-Slice Medical Images Using Generative Adversarial Network
    Li, Zeju
    Wang, Yuanyuan
    Yu, Jinhua
    MACHINE LEARNING IN MEDICAL IMAGING (MLMI 2017), 2017, 10541 : 325 - 333
  • [10] Security and Privacy for Medical Images Using Chaotic Visual Cryptography
    Abdul, Wadood
    Ali, Zulfiqar
    Ghouzali, Sanaa
    Alsulaiman, Mansour
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (06) : 1296 - 1301