Encryption method and security analysis of medical images based on stream cipher enhanced logical mapping

被引:7
作者
Liu, Shuang [1 ]
Liu, Li [2 ]
Pang, Ming [3 ]
机构
[1] Harbin Univ Commerce, Sch Comp & Informat Engn, Harbin 150080, Heilongjiang, Peoples R China
[2] Harbin Univ Commerce, Sch Management, Harbin 150080, Heilongjiang, Peoples R China
[3] Harbin Engn Univ, Coll Automat, Harbin 150001, Heilongjiang, Peoples R China
关键词
Medical image; image encryption; stream cipher; logical mapping;
D O I
10.3233/THC-218019
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
BACKGROUND: Medical image security has been paid more attention in the medical field. OBJECTIVE: In order to achieve a higher security level of medical image encryption, this paper proposes a stream cipher enhanced logic mapping encryption method. METHODS: According to the theory of stream cipher, this method uses Chebyshev map to form encryption key. A series of coding operations are used to set the initial value before image chaos processing. Combining with logical mapping, the original image information is encrypted by chaos from X and Y dimensions. RESULTS: The experimental results show that the NPCR value of the encrypted image is 0.9874 after the blood cells are encrypted. CONCLUSIONS: All four evaluation methods fully prove that this method has excellent encryption performance.
引用
收藏
页码:S185 / S193
页数:9
相关论文
共 50 条
  • [11] On the Security of Designing a Cellular Automata Based Stream Cipher
    Maiti, Swapan
    Ghosh, Shamit
    Chowdhury, Dipanwita Roy
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 406 - 413
  • [12] A commercial application of a chaos-based-stream cipher: Performance and Security analysis
    Vidal, Gerard
    Becheikh, Rabei
    Rhouma, Rhouma
    Belghith, Safya
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 39 - 44
  • [13] Access Control and Scalable Encryption Using a Stream Cipher for JPEG 2000 Encoded Images
    Haggag, Ayman
    Ghoneim, Mohamed
    Lu, Jianming
    Yahagi, Takashi
    JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2007, 11 (07) : 728 - 734
  • [14] CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing
    Banerjee, Amit
    Hasan, Mahamudul
    Rahman, Md. Auhidur
    Chapagain, Rajesh
    IEEE ACCESS, 2017, 5 : 17678 - 17691
  • [15] An Image Compression Encryption Algorithm Based on Chaos and ZUC Stream Cipher
    Song, Xiaomeng
    Shi, Mengna
    Zhou, Yanqi
    Wang, Erfu
    ENTROPY, 2022, 24 (05)
  • [16] Stream Cipher-Based Hash Function and Its Security
    Nakano, Yuto
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 188 - 202
  • [17] Security enhanced ROI based reversible watermarking for medical images
    Avinashiappan, Amsaveni
    Mayilsamy, Bharathi
    Hemanth, Jude
    DYNA, 2022, 97 (02): : 210 - 216
  • [18] Design of Stream Cipher for Text Encryption using Soft Computing based Techniques
    Santhanalakshmi, S.
    Sangeeta, K.
    Patra, G. K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 149 - 152
  • [19] Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation
    Xin Ge
    Bin Lu
    Fenlin Liu
    Xiangyang Luo
    Nonlinear Dynamics, 2017, 90 : 1141 - 1150
  • [20] Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation
    TONG XiaoJun1 & CUI MingGen2 1School of Computer Science and Technology
    2School of Science
    Science China(Information Sciences), 2010, 53 (01) : 191 - 202