Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Medical image encryption using high-speed scrambling and pixel adaptive diffusion

Published: 01 March 2018 Publication History

Abstract

We propose an encryption scheme to protect medical images using high-speed scrambling and pixel adaptive diffusion.It has a high security level as it can encrypt an identical image into different cipher-images, even when using the same secret key.We provide two implementations, which have high efficiency in hardware platforms and software platforms, respectively.The proposed encryption scheme has high security level, faster speed, and better robustness than several typical encryption schemes. This paper presents a new encryption scheme of protecting medical images. It has high efficiency and shows robustness of defending some impulse noise and data loss. First, some random data are inserted into surroundings of the image. Then, two rounds of high-speed scrambling and pixel adaptive diffusion are performed to randomly shuffle neighboring pixels and spread these inserted random data over the entire image. The proposed encryption scheme can be directly applied to medical images with any representation format. We provide two kinds of operations to implement the pixel adaptive diffusion: bitwise XOR and modulo arithmetic. The former has high efficiency in hardware platforms while the latter can achieve fast speed in software platforms. Simulations and evaluations show that both encryption schemes using bitwise XOR and modulo arithmetic have high security levels, can achieve much faster speeds, and can better adapt to impulse noise and data loss interference than several typical and state-of-the-art encryption schemes.

References

[1]
S. Zinger, D. Ruijters, L. Do, P.H.N. de With, View interpolation for medical images on autostereoscopic displays, IEEE Trans. Circuits Syst. Video Technol., 22 (2012) 128-137.
[2]
C. Lacoste, J.H. Lim, J.P. Chevallet, D.T.H. Le, Medical-image retrieval based on knowledge-assisted text and image indexing, IEEE Trans. Circuits Syst. Video Technol., 17 (2007) 889-900.
[3]
X. Chai, Y. Chen, L. Broyde, A novel chaos-based image encryption algorithm using DNA sequence operations, Opt. Lasers Eng., 88 (2017) 197-213.
[4]
Y.-Q. Zhang, X.-Y. Wang, A new image encryption algorithm based on non-adjacent coupled map lattices, Appl. Soft Comput., 26 (2015) 10-20.
[5]
P. Ping, F. Xu, Z.-J. Wang, Image encryption based on non-affine and balanced cellular automata, Signal Process., 105 (2014) 419-429.
[6]
X. Chai, Z. Gan, Y. Chen, Y. Zhang, A visually secure image encryption scheme based on compressive sensing, Signal Process., 134 (2017) 35-51.
[7]
X.-W. Li, I.-K. Lee, Modified computational integral imaging-based double image encryption using fractional fourier transform, Opt. Lasers Eng., 66 (2015) 112-121.
[8]
H. Liu, X. Wang, A. kadir, Image encryption using DNA complementary rule and chaotic maps, Appl. Soft Comput., 12 (2012) 1457-1466.
[9]
L. Gong, X. Liu, F. Zheng, N. Zhou, Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique, J. Modern Opt., 60 (2013) 1074-1082.
[10]
X.-Y. Wang, Y.-Q. Zhang, X.-M. Bao, A novel chaotic image encryption scheme using dna sequence operations, Opt. Lasers Eng., 73 (2015) 53-61.
[11]
N. Zhou, Y. Hu, L. Gong, G. Li, Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations, Quant. Inf. Process., 16 (2017) 164.
[12]
Y.-Q. Zhang, X.-Y. Wang, A symmetric image encryption algorithm based on mixed linearnonlinear coupled map lattice, Inf. Sci., 273 (2014) 329-351.
[13]
Z. Hua, Y. Zhou, C.-M. Pun, C.L.P. Chen, 2D Sine logistic modulation map for image encryption, Inf. Sci., 297 (2015) 80-94.
[14]
M. Zanin, A.N. Pisarchik, Gray code permutation algorithm for high-dimensional data encryption, Inf. Sci., 270 (2014) 288-297.
[15]
M. Prakash, P. Balasubramaniam, S. Lakshmanan, Synchronization of Markovian jumping inertial neural networks and its applications in image encryption, Neural Networks, 83 (2016) 86-93.
[16]
A. Belazi, A.A. Abd El-Latif, S. Belghith, A novel image encryption scheme based on substitution-permutation network and chaos, Signal Process., 128 (2016) 155-170.
[17]
Z. Hua, Y. Zhou, Design of image cipher using block-based scrambling and image filtering, Inf. Sci., 396 (2017) 97-113.
[18]
M. Dzwonkowski, M. Papaj, R. Rykaczewski, A new quaternion-based encryption method for DICOM images, IEEE Trans. Image Process., 24 (2015) 4614-4622.
[19]
P. Mildenberger, M. Eichelberg, E. Martin, Introduction to the DICOM standard, Eur. Radiol., 12 (2002) 920-927.
[20]
Y. Zhang, D. Xiao, An image encryption scheme based on rotation matrix bit-level permutation and block diffusion, Commun. Nonlinear Sci. Numer. Simul., 19 (2014) 74-82.
[21]
N. Zhou, S. Pan, S. Cheng, Z. Zhou, Image compressionencryption scheme based on hyper-chaotic system and 2D compressive sensing, Optics Laser Technol., 82 (2016) 121-133.
[22]
L.-B. Zhang, Z.-L. Zhu, B.-Q. Yang, W.-Y. Liu, H.-F. Zhu, M.-Y. Zou, Medical image encryption and compression scheme using compressive sensing and pixel swapping based permutation approach, Math. Probl. Eng., 2015 (2015) 940638.
[23]
C. Li, D. Lin, J. L, Cryptanalyzing an image scrambling encryption algorithm of pixel bits, IEEE MultiMedia (2017). arXiv:1607.01642
[24]
E.Y. Xie, C. Li, S. Yu, J. L, On the cryptanalysis of Fridrichs chaotic image encryption scheme, Signal Process., 132 (2017) 150-154.
[25]
L.Y. Zhang, Y. Liu, F. Pareschi, Y. Zhang, K.-W. Wong, R. Rovatti, G. Setti, On the security of a class of diffusion mechanisms for image encryption, IEEE Trans. Cybern. (2017).
[26]
Z. Hua, S. Yi, Y. Zhou, C. Li, Y. Wu, Designing hyperchaotic cat maps with any desired number of positive Lyapunov exponents, IEEE Trans. Cybern. (2017).
[27]
C. Li, Y. Liu, T. Xie, M.Z.Q. Chen, Breaking a novel image encryption scheme based on improved hyperchaotic sequences, Nonlinear Dyn., 73 (2013) 2083-2089.
[28]
S. Ergn, On the security of chaos based true random number generators, IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99 (2016) 363-369.
[29]
T. Htter, M. Preishuber, J. Hmmerle-Uhl, A. Uhl, Weaknesses in Security Considerations Related to Chaos-Based Image Encryption, Springer, 2016.
[30]
M. Larobina, L. Murino, Medical image file formats, J. Digital Imag., 27 (2014) 200-206.
[31]
X. Wang, L. Liu, Y. Zhang, A novel chaotic block image encryption algorithm based on dynamic random growth technique, Optics Lasers Eng., 66 (2015) 10-18.
[32]
Y. Wu, Y. Zhou, J.P. Noonan, S. Agaian, Design of image cipher using latin squares, Inf. Sci., 264 (2014) 317-339.
[33]
J. Chen, Z.-L. Zhu, L.-B. Zhang, Y. Zhang, B.-Q. Yang, Exploiting self-adaptive permutation-diffusion and dna random encoding for secure and efficient image encryption, Signal Process., 142 (2018) 340-353.
[34]
Y. Zhou, Z. Hua, C.-M. Pun, C.L.P. Chen, Cascade chaotic system with applications, IEEE Trans. Cybern., 45 (2015) 2001-2012.
[35]
Z. Hua, Y. Zhou, Image encryption using 2D logistic-adjusted-sine map, Inf. Sci., 339 (2016) 237-253.
[36]
Y. Zhang, D. Xiao, Y. Shu, J. Li, A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations, Signal Process., 28 (2013) 292-300.
[37]
Y. Zhou, L. Bao, C.L.P. Chen, A new 1D chaotic system for image encryption, Signal Process., 97 (2014) 172-182.
[38]
G. Bhatnagar, Q.M.J. Wu, Biometric inspired multimedia encryption based on dual parameter fractional fourier transform, IEEE Trans. Syst. Man Cybern., 44 (2014) 1234-1247.
[39]
R. Tao, X.-Y. Meng, Y. Wang, Image encryption with multiorders of fractional fourier transforms, IEEE Trans. Inf. Foren. Secur., 5 (2010) 734-738.
[40]
G. Alvarez, S. Li, Some basic cryptographic requirements for chaos-based cryptosystems, Int. J. Bifur. Chaos, 16 (2006) 2129-2151.
[41]
C. Li, Cracking a hierarchical chaotic image encryption algorithm based on permutation, Signal Process., 118 (2016) 203-210.
[42]
D. Arroyo, F. Hernandez, A.B. Orue, Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features, Int. J. Bifur. Chaos, 27 (2017).
[43]
J.C.H. Castro, J.M. Sierra, A. Seznec, A. Izquierdo, A. Ribagorda, The strict avalanche criterion randomness test, Math. Comput. Simul., 68 (2005) 1-7.
[44]
J. Wu, W. Liu, Z. Liu, S. Liu, Correlated-imaging-based chosen plaintext attack on general cryptosystems composed of linear canonical transforms and phase encodings, Optics Commun., 338 (2015) 164-167.
[45]
R. Van Den Assem, W. Van Elk, A chosen-plaintext attack on the microsoft basic protection, Comput. Secur., 5 (1986) 36-45.
[46]
C. Fu, J. Chen, H. Zou, W. Meng, Y. Zhan, Y. Yu, A chaos-based digital image encryption scheme with an improved diffusion strategy, Optics Express, 20 (2012) 2363-2378.
[47]
C.-Y. Chen, C.-H. Chen, C.-H. Chen, K.-P. Lin, An automatic filtering convergence method for iterative impulse noise filters based on PSNR checking and filtered pixels detection, Expert Syst. Appl., 63 (2016) 198-207.

Cited By

View all
  • (2024)Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes With DNA Coding and Nonlinear DynamicsIEEE Transactions on Multimedia10.1109/TMM.2023.327650426(1114-1128)Online publication date: 1-Jan-2024
  • (2024)Cryptanalysis of cross-coupled chaotic maps multi-image encryption schemeJournal of Information Security and Applications10.1016/j.jisa.2023.10369480:COnline publication date: 17-Apr-2024
  • (2024)Extension of physical activity recognition with 3D CNN using encrypted multiple sensory data to federated learning based on multi-key homomorphic encryptionComputer Methods and Programs in Biomedicine10.1016/j.cmpb.2023.107854243:COnline publication date: 4-Mar-2024
  • Show More Cited By
  1. Medical image encryption using high-speed scrambling and pixel adaptive diffusion

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Signal Processing
        Signal Processing  Volume 144, Issue C
        March 2018
        412 pages

        Publisher

        Elsevier North-Holland, Inc.

        United States

        Publication History

        Published: 01 March 2018

        Author Tags

        1. Cryptosystem
        2. High-speed scrambling
        3. Image encryption
        4. Medical image
        5. Pixel adaptive diffusion

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 12 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes With DNA Coding and Nonlinear DynamicsIEEE Transactions on Multimedia10.1109/TMM.2023.327650426(1114-1128)Online publication date: 1-Jan-2024
        • (2024)Cryptanalysis of cross-coupled chaotic maps multi-image encryption schemeJournal of Information Security and Applications10.1016/j.jisa.2023.10369480:COnline publication date: 17-Apr-2024
        • (2024)Extension of physical activity recognition with 3D CNN using encrypted multiple sensory data to federated learning based on multi-key homomorphic encryptionComputer Methods and Programs in Biomedicine10.1016/j.cmpb.2023.107854243:COnline publication date: 4-Mar-2024
        • (2024)Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM)The Journal of Supercomputing10.1007/s11227-023-05539-y80:2(2164-2195)Online publication date: 1-Jan-2024
        • (2024)DNA-chaos governed cryptosystem for cloud-based medical image repositoryCluster Computing10.1007/s10586-024-04391-w27:4(4127-4144)Online publication date: 12-Apr-2024
        • (2024)A novel exponent–sine–cosine chaos map-based multiple-image encryption techniqueMultimedia Systems10.1007/s00530-024-01334-830:3Online publication date: 4-May-2024
        • (2024)Quantum encryption of healthcare imagesSecurity and Privacy10.1002/spy2.3917:5Online publication date: 18-Apr-2024
        • (2023)RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret SharingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/351279719:1(1-19)Online publication date: 5-Jan-2023
        • (2023)Secure access microcontroller system based on fingerprint template with hyperchaotic encryptionIntegration, the VLSI Journal10.1016/j.vlsi.2023.01.00290:C(27-39)Online publication date: 26-Apr-2023
        • (2023)An efficient Intra-Inter pixel encryption scheme to secure healthcare images for an IoT environmentExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.120622231:COnline publication date: 30-Nov-2023
        • Show More Cited By

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media