A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture

被引:0
|
作者
Abhrajyoti Das
Abhilash Das
Nirmalya Kar
机构
[1] National Institute of Technology Agartala,Department of Computer Science and Engineering
来源
Journal of Ambient Intelligence and Humanized Computing | 2022年 / 13卷
关键词
Digital Imaging and Communications (DICOM) Image; Logistic Chaotic Map; Non-Linear Feedback Shift Register; Ramanujan Conjecture; Metamorphic Cryptography; Electronic Patient Report (EPR);
D O I
暂无
中图分类号
学科分类号
摘要
Medical Images has evolved from time to time and the need to protect sensitive information related to such images have also grown significantly. Nowadays data being the primary asset of an individual, protecting them has posed new challenges from time and again. With the advancement of the digital medium, the medical image has been at greater risk and there is an urgent need to protect the information and the raw pixel data of such images. This research focuses on ensuring the confidentiality of DICOM medical images and protecting the Electronic Patient Report (EPR) by applying both cryptographic and steganographic protection techniques. The encryption keys are generated using the Logistic Chaotic Map and Non-Linear Feedback Shift Register. the electronic patient report (EPR) is converted into a 9-space-format using Continued Fraction of Ramanujan conjecture and then using steganography techniques EPR is embedded into the Most Significant Bits of Medical Images. The final encrypted image contains the EPR as well as encrypted medical image. The key sequence used in order to encrypt the medical image is highly pseudo random and the Key Space Analysis depicted that the algorithm is very strong. This work has paved a better way of securely storing 16-bit DICOM medical images and EPR into the Picture Archive and Communication System repository. The proposed security model has shown promising results in comparison to other research and the various analysis did show significant improvements over past studies.
引用
收藏
页码:1021 / 1036
页数:15
相关论文
共 50 条
  • [1] A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture
    Das, Abhrajyoti
    Das, Abhilash
    Kar, Nirmalya
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (02) : 1021 - 1036
  • [2] An Approach For Securing Data On Cloud Using Data Slicing And Cryptography
    Bobde, Rupesh R.
    Khaparde, Amit
    Raghuwanshi, M. M.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [3] Metamorphic cryptography using strength of chaotic sequence and XORing method
    Trivedi, Munesh Chandra
    Mishra, Shilpi
    Yadav, Virendra Kumar
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 32 (05) : 3365 - 3375
  • [4] Securing Surveillance Data Using Incremental Cryptography
    Antony, Lissiyas
    Sobhana, N., V
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2021), 2022, 417 : 216 - 225
  • [5] Securing Cloud Data using Visual Cryptography
    Brindha, K.
    Jeyanthi, N.
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [6] Securing EPR Data Using Cryptography and Image Watermarking
    Zaz, Youssef
    El Fadil, Lhoussain
    El Kayyali, Mohamed
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2012, 4 (02) : 76 - 87
  • [7] A Novel Approach for securing data in IoTcloud Using DNA Cryptography and Huffman Coding Algorithm
    Kumar, Harish N.
    Patil, Rajshekhar M.
    Deepak, G.
    Murthy, B. M.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [8] Medical Data Security Using Cryptography
    Gupta, Vibhor
    Metha, Garima
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 866 - 869
  • [9] A hybrid approach to metamorphic cryptography using KIMLA and DNA concept
    Yadav, Vikash
    Gupta, Indresh Kumar
    International Journal of Computational Systems Engineering, 2019, 5 (04) : 218 - 229
  • [10] Efficient Data Security Using Differential Expansion & Metamorphic Cryptography
    Rajan, J. Gopika
    Ganesh, R. S.
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2025, 32 (01): : 182 - 189