IEFHAC: Image encryption framework based on hessenberg transform and chaotic theory for smart health

被引:9
作者
Jan, Aiman [1 ]
Parah, Shabir A. [1 ]
Malik, Bilal A. [2 ]
机构
[1] Univ Kashmir, Dept Elect & Instrumentat Technol, Srinagar, India
[2] Univ Kashmir Zakoora, Inst Technol, Dept Elect & Commun Engn, Srinagar, India
关键词
Smart cities; Medical diagnosis; Security; Computational complexity; Image encryption; ALGORITHM; EFFICIENT; MAP; CITIES; DESIGN; SECURE; BIT;
D O I
10.1007/s11042-022-12653-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart cities aim to improve the quality of life by utilizing technological advancements. One of the main areas of innovation includes the design, implementation, and management of data-intensive medical systems also known as big-data Smart Healthcare systems. Smart health systems need to be supported by highly efficient and resilient security frameworks. One of the important aspects that smart health systems need to provide, is timely access to high-resolution medical images, that form about 80% of the medical data. These images contain sensitive information about the patient and as such need to be secured completely. To prevent unauthorized access to medical images, the process of image encryption has become an imperative task for researchers all over the world. Chaos-based encryption has paved the way for the protection of sensitive data from being altered, modified, or hacked. In this paper, we present an Image Encryption Framework based on Hessenberg transform and Chaotic encryption (IEFHAC), for improving security and reducing computational time while encrypting patient data. IEFHAC uses two 1D-chaotic maps: Logistic map and Sine map for the confusion of data, while diffusion has been achieved by applying the Hessenberg household transform. The Sin and Logistic maps are used to regeneratively affect each other's output, as such dynamically changing the key parameters. The experimental analysis demonstrates that IEFHAC shows better results like NPCR ranging from 99.66 to 100%, UACI of 37.39%, lesser computational time of 0.36 s, and is more robust to statistical attacks.
引用
收藏
页码:18829 / 18853
页数:25
相关论文
共 52 条
  • [1] Smart-city medium access for smart mobility applications in Internet of Things
    Al-Turjman, Fadi
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (08):
  • [2] [Anonymous], 2020, 2020 BREACH BAROMETE
  • [3] A pixel permutation based image encryption technique using chaotic map
    Anwar, Shamama
    Meghana, Solleti
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (19) : 27569 - 27590
  • [4] Efficient selective image encryption
    Ayoup, Ahmed M.
    Hussein, Amr H.
    Attia, Mahmoud A. A.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (24) : 17171 - 17186
  • [5] Smart sustainable cities of the future: An extensive interdisciplinary literature review
    Bibri, Simon Elias
    Krogstie, John
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2017, 31 : 183 - 212
  • [6] Sensor deployment strategy using cluster analysis of Fuzzy C-Means Algorithm: Towards online control of indoor environment's safety and health
    Cao, Shi-Jie
    Ding, Junwei
    Ren, Chen
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2020, 59
  • [7] Upper Hessenberg and Toeplitz Bohemians
    Chan, Eunice Y. S.
    Corless, Robert M.
    Gonzalez-Vega, Laureano
    Rafael Sendra, J.
    Sendra, Juana
    Thornton, Steven E.
    [J]. LINEAR ALGEBRA AND ITS APPLICATIONS, 2020, 601 : 72 - 100
  • [8] An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach
    Chen, Jun-xin
    Zhu, Zhi-liang
    Fu, Chong
    Zhang, Li-bo
    Zhang, Yushu
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 23 (1-3) : 294 - 310
  • [9] An Integrated Dual Entropy Core True Random Number Generator
    Cicek, Ihsan
    Pusane, Ali Emre
    Dundar, Gunhan
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2017, 64 (03) : 329 - 333
  • [10] Data Breaches, 2020, DIM KOUIMTS REP DAT