Novel Medical Image Encryption Scheme Based on Chaos a DNA Encoding

被引:158
作者
Belazi, Akram [1 ]
Talha, Muhammad [2 ]
Kharbech, Sofiane [3 ]
Xiang, Wei [4 ]
机构
[1] Tunis El Manar Univ, Natl Engn Sch Tunis, RISC Lab, Tunis 1002, Tunisia
[2] King Saud Univ, Deanship Sci Res, Riyadh 11543, Saudi Arabia
[3] Tunis El Manar Univ, Lab SysCom ENIT LR 99 ES21, Tunis 1002, Tunisia
[4] James Cook Univ, Coll Sci & Engn, Cairns, Qld 4878, Australia
关键词
Image encryption; medical images; permutation and diffusion; S-box; chaos; DNA encoding; SHA-256 hash function; S-BOXES; EFFICIENT; CRYPTOGRAPHY; SYSTEM; SECURE;
D O I
10.1109/ACCESS.2019.2906292
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new chaos-based encryption scheme for medical images. It is based on a combination of chaos and DNA computing under the scenario of two encryption rounds, preceded by a key generation layer, and follows the permutation-substitution-diffusion structure. The SHA-256 hash function alongside the initial secret keys is employed to produce the secret keys of the chaotic systems. Each round of the proposed algorithm involves six steps, i.e., block-based permutation, pixel-based substitution, DNA encoding, bit-level substitution (i.e., DNA complementing), DNA decoding, and bit-level diffusion. A thorough search of the relevant literature yielded only this time the pixel-based substitution and the bit-level substitution are used in cascade for image encryption. The key-streams in the bit-level substitution are based on the logistic-Chebyshev map, while the sine-Chebyshev map allows producing the key-streams in the bit-level diffusion. The final encrypted image is obtained by repeating once the previous steps using new secret keys. Security analyses and computer simulations both confirm that the proposed scheme is robust enough against all kinds of attacks. Its low complexity indicates its high potential for real-time and secure image applications.
引用
收藏
页码:36667 / 36681
页数:15
相关论文
共 43 条
  • [1] MOLECULAR COMPUTATION OF SOLUTIONS TO COMBINATORIAL PROBLEMS
    ADLEMAN, LM
    [J]. SCIENCE, 1994, 266 (5187) : 1021 - 1024
  • [2] Colour image steganography method based on sparse representation
    Ahani, Soodeh
    Ghaemmaghami, Shahrokh
    [J]. IET IMAGE PROCESSING, 2015, 9 (06) : 496 - 505
  • [3] Crypto-based algorithms for secured medical image transmission
    Al-Haj, Ali
    Abandah, Gheith
    Hussein, Noor
    [J]. IET INFORMATION SECURITY, 2015, 9 (06) : 365 - 373
  • [4] Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption
    Belazi, Akram
    Khan, Majid
    Abd El-Latif, Ahmed A.
    Belghith, Safya
    [J]. NONLINEAR DYNAMICS, 2017, 87 (01) : 337 - 361
  • [5] Belazi A, 2015, INT WIREL COMMUN, P611, DOI 10.1109/IWCMC.2015.7289153
  • [6] Medical image encryption using edge maps
    Cao, Weijia
    Zhou, Yicong
    Chen, C. L. Philip
    Xia, Liming
    [J]. SIGNAL PROCESSING, 2017, 132 : 96 - 109
  • [7] An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations
    Chai, Xiuli
    Gan, Zhihua
    Yang, Kang
    Chen, Yiran
    Liu, Xianxing
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 52 : 6 - 19
  • [8] An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach
    Chen, Jun-xin
    Zhu, Zhi-liang
    Fu, Chong
    Zhang, Li-bo
    Zhang, Yushu
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 23 (1-3) : 294 - 310
  • [9] Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption
    Chen, Junxin
    Zhu, Zhi-liang
    Zhang, Li-bo
    Zhang, Yushu
    Yang, Ben-Qiang
    [J]. SIGNAL PROCESSING, 2018, 142 : 340 - 353
  • [10] A rule of seven in Watson-Crick base-pairing of mismatched sequences
    Cisse, Ibrahim I.
    Kim, Hajin
    Ha, Taekjip
    [J]. NATURE STRUCTURAL & MOLECULAR BIOLOGY, 2012, 19 (06) : 623 - +