Hash Based Encryption for Keyframes of Diagnostic Hvsteroscopy

被引:79
作者
Hamza, Rafik [1 ]
Muhammad, Khan [2 ,3 ]
Arunkumar, N. [4 ]
Ramirez-Gonzalez, Gustavo [5 ]
机构
[1] Univ Batna 2, LAMIE Lab, Dept Comp Sci, Batna 05078, Algeria
[2] Sejong Univ, Coll Software Convergence & Technol, Intelligent Media Lab, Seoul 143747, South Korea
[3] Islamia Coll, Dept Comp Sci, Digital Image Proc Lab, Peshawar 25000, Pakistan
[4] SASTRA Univ, Sch Elect & Elect Engn, Thanjavur 613401, India
[5] Univ Cauca, Dept Telemat, Popayan 143747, Colombia
关键词
Image encryption; 2D chaotic map; diagnostic hysteroscopy; cloud content security;
D O I
10.1109/ACCESS.2017.2762405
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we address the problem of confidentiality of keyframes, which are extracted from diagnostic hysteroscopy data using video summarization. We propose an image color coding method aimed at increasing the security of keyframes extracted from diagnostic hysteroscopy videos. In this regard, we use a 2-D logistic map to generate the cryptographic keys sequences, which relies on mixing and cascading the orbits of the chaotic map in order to generate the stream keys for the encryption algorithm. The encrypted images produced by our proposed algorithm exhibit randomness behavior, providing a high-level of security for the keyframes against various attacks. The experimental results and security analysis from different perspectives verify the superior security and high efficiency of our proposed encryption scheme compared to other state-of-the-art image encryption algorithms. Furthermore, the proposed method can be combined with mobile-cloud environments and can be generalized to ensure the security of cloud contents as well as important data during transmission.
引用
收藏
页码:60160 / 60170
页数:11
相关论文
共 28 条
[1]   A symmetric image encryption scheme based on combination of nonlinear chaotic maps [J].
Akhavan, A. ;
Samsudin, A. ;
Akhshani, A. .
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2011, 348 (08) :1797-1813
[2]   Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption [J].
Belazi, Akram ;
Khan, Majid ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2017, 87 (01) :337-361
[3]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[4]   Encrypted data processing with Homomorphic Re-Encryption [J].
Ding, Wenxiu ;
Yan, Zheng ;
Deng, Robert H. .
INFORMATION SCIENCES, 2017, 409 :35-55
[5]   Secure video summarization framework for personalized wireless capsule endoscopy [J].
Hamza, Rafik ;
Muhammad, Khan ;
Lv, Zhihan ;
Titouna, Faiza .
PERVASIVE AND MOBILE COMPUTING, 2017, 41 :436-450
[7]   A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map [J].
Hamza, Rafik ;
Titouna, Faiza .
INFORMATION SECURITY JOURNAL, 2016, 25 (4-6) :162-179
[8]   Image encryption algorithm using chaotic Chebyshev generator [J].
Huang, Xiaoling .
NONLINEAR DYNAMICS, 2012, 67 (04) :2411-2417
[9]  
Jung T., 2014, IEEE T INF FOREN SEC, V10, P190
[10]   Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization [J].
Lu, Wenjun ;
Varna, Avinash L. ;
Wu, Min .
IEEE ACCESS, 2014, 2 :125-141