Generic placeholder image

Current Medical Imaging

Editor-in-Chief

ISSN (Print): 1573-4056
ISSN (Online): 1875-6603

Research Article

Image Encryption Method Using New Concept of Compound Blood Transfusion Rule with Multiple Chaotic Maps

Author(s): Ranu Gupta*, Rahul Pachauri and Ashutosh Kumar Singh

Volume 16, Issue 8, 2020

Page: [1034 - 1043] Pages: 10

DOI: 10.2174/1573405615666190101110751

Price: $65

conference banner
Abstract

Introduction: With the advancement in internet technology, a large amount of information in the form of data and image is transferred from one end to the other. The information may be military, defense, medical, etc. which should be kept confidential by providing security.

Objective: The aim of this article will be to provide security to the image. This is achieved by applying the image encryption method which converts the original information into an unreadable format.

Methods: This work explores an efficient way of image encryption using a chaotic logistic function. A set of two chaotic logistic functions and 256 bit long external secret key are employed to enhance the security in the encrypted images. The initial condition of first logistic function has been obtained by providing the suitable weights to all bits of the secret key. The initial condition of second logistic function has been derived from the first chaotic logistic function. In this proposed algorithm, ten different operations are used to encrypt the pixel of an image. The outcome of the second logistic map decides the operation to be used in the encryption of the particular image pixel.

Results: Various statistical parameters like NPCR, UACI and information entropy were calculated.

Conclusion: Results show that the proposed algorithm provides an image encryption method with better security and efficiency for all real-time applications such as medical images.

Keywords: Blood transfusion rule (BTR), chaotic function, encryption, decryption, real-time, image, NPCR.

Graphical Abstract

[1]
Gong-bin Q, Qing-feng J, Shui-sheng Q. A new image encryption scheme based on DES algorithm and Chua’s circuit. Int. J Comput Sci Net Security 2008; 8(4)
[2]
Biryukov A, Nakahara J Jr, Preneel B, Vandewalle J. , New Weak- Key Classes of IDEA", Inf and Communications Security, 4th Int Conf, ICICS, Springer- Verlog 2002; 315-26.
[3]
Daemen J, Rijmen V. AES Proposal: Rijndael, AES Algorithm 1999; Submission, September 3.
[4]
Zeghid M, Machhout M, Khriji L, Baganne A. A modified AES based algorithm for image encryption. World Academy of Science, Engg & Tech 2007.
[5]
Grabbe J. Data encryption standard: The triple DES algorithm. Iillustrated Laissez faire city time 2003; 2(28).
[6]
Schneier B. Description of a New Variable-Length key, 64-bit Block Cipher (Blowfish). Cambridge Security Workshop Proc Springer-Verlag 1993; 191-204.
[7]
Su L, Li C. Local Prediction of Chaotic Time Series based on Polynomial Coefficient Autoregressive ModelMathematical Problems in Engg 2015; ID 901807: 14 pages
[8]
Gleick J. Chaos: Making a New Science. Viking: New York 1987.
[9]
Pareek NK, Patidar V, Sud KK. Diffusion-substitution based gray image encryption scheme. Dig Signal Proc 2013; 23(3): 894-901.
[10]
Gao H, Zhang Y, Liang S, Li D. A new chaotic algorithm for image encryption. Chaos Sol & Fractals 2006; 29(2): 393-9.
[11]
Zhang L, Liao X, Wang X. An image encryption approach based on chaotic maps. Chaos Sol and Fractals 2005; 24(3): 759-65.
[12]
Al-qdah M. A Hybrid Security System Based on Bit Rotation and Chaotic Maps. Current Sig Transductton Therapy 2018; 13: 1.
[13]
Khurana M, Singh H. A spiral-phase rear mounted triple masking for securing optical image encryption based on gyrator transform. Recent Patents Comput Sci 2018; 11: 1.
[14]
Gupta R, Pachauri R, Singh AK. An effective approach of secured medical image transmission using encryption method. Mol Cell Biomech an (2018); 15(2): 63-83.
[15]
Geetha K, Chitra S, Madhusudhanan B, Gao XZ. Securing patient data in wireless body area sensor network using biometrics based key generation. Curr Med Imag Rev 2017; 13: 231.
[16]
Liu L, Miao S. A new image encryption algorithm based on logistic chaotic map with varying parameter. Springer plus 2016; 5: 289.
[17]
Zhou Q, Wong K, Liao X, Xiang T, Hu T. Parallel image encryption algorithm based on discretized chaotic map. Chaos Sol & Fractals 2008; 38(4): 1081-92.
[18]
Borujeni SE, Eshghi M. Chaotic image encryption design using Tompkins-paige algorithm Hindawi Publ Corp, Mathematical Prob in Engg 2009; ID- 762652: 22 pages
[19]
Mao Y, Chen G, Lian S. A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurcation Chaos 2004; 14(10): 3613-24.
[20]
Hua Z, Zhou Y, Pun CM, Chen CLP 2D. Sine logistic modulation map for image encryption. Inf Sci 2015; 297: 80-94.
[21]
Zhao J, Wang S, Zhang L, Wang X. Image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map. J Elect Comp Engg 2017; 2017(ID 8672716): 10 pages.
[22]
Zhang Q, Guo L, Wei X. Image encryption using DNA addition combining with chaotic maps. Mathematical Comput Mod 2010; 52(11-12): 2028-35.
[23]
Ulam SM, Neumann JV. On combination of stochastic and deterministic processes. Bullst Am Math Soc 1947; 53(11): 1120.
[24]
Shannon CE. A mathematical theory of communication. Bell System Tech J 1948; 27: 379-423, 623-56.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy