Skip to main content
Top
Published in: Soft Computing 2/2016

13-12-2014 | Methodologies and Application

Medical image protection using genetic algorithm operations

Authors: Narendra K. Pareek, Vinod Patidar

Published in: Soft Computing | Issue 2/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The security of digital medical images has attracted much attention recently, especially when these images are sent through the communication networks. An image encryption technique tries to convert an image to another image that is hard to understand. In this communication, we propose an encryption method for gray scale medical images based on the features of genetic algorithms. Performance analysis show that the proposed scheme has good statistical character, key sensitivity and can resist brute-force attack, differential attack, plaintext attack and entropy attack efficiently.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Al-Husainy MAF (2012) A novel encryption method for image security. Int J Secur Appl 6:1–8 Al-Husainy MAF (2012) A novel encryption method for image security. Int J Secur Appl 6:1–8
go back to reference Cao F, Huang HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196CrossRef Cao F, Huang HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196CrossRef
go back to reference Castiglione A, Pizzolante R, Santis AD, Carpentieri B, Castiglione A, Palmieri F (2014) Cloud- based adaptive compression and secure management services for 3D healthcare data. Future Gener Comput Syst. doi:10.1016/j.future.2014.07.001 (in press) Castiglione A, Pizzolante R, Santis AD, Carpentieri B, Castiglione A, Palmieri F (2014) Cloud- based adaptive compression and secure management services for 3D healthcare data. Future Gener Comput Syst. doi:10.​1016/​j.​future.​2014.​07.​001 (in press)
go back to reference Coatrieux G, Montagner J, Huang H, Roux C (2007) Mixed reversible and RONI watermarking for medical image reliability protection. In: IEEE Conference on Engineering in Medicine and Biology Society (EMBS), pp 5653–5656 Coatrieux G, Montagner J, Huang H, Roux C (2007) Mixed reversible and RONI watermarking for medical image reliability protection. In: IEEE Conference on Engineering in Medicine and Biology Society (EMBS), pp 5653–5656
go back to reference Dutt I, Paul S, Chaudhuri SN (2013) Implementation of network security using genetic algorithm. Int J Adv Res Comp Sci Softw Eng 3:234–241 Dutt I, Paul S, Chaudhuri SN (2013) Implementation of network security using genetic algorithm. Int J Adv Res Comp Sci Softw Eng 3:234–241
go back to reference Fu C, Meng W-H, Zhan Y-F, Zhu Z-L, Lau FCM, Tse CK, Ma H-F (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43:1000–1010CrossRef Fu C, Meng W-H, Zhan Y-F, Zhu Z-L, Lau FCM, Tse CK, Ma H-F (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43:1000–1010CrossRef
go back to reference Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394–400MATHCrossRef Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394–400MATHCrossRef
go back to reference Gorgan D, Bacu V, Rodila D, Pop F, Petcu D (2010) Experiments on ESIP—environment oriented satellite data processing platform. Earth Sci Inform 3:297–308CrossRef Gorgan D, Bacu V, Rodila D, Pop F, Petcu D (2010) Experiments on ESIP—environment oriented satellite data processing platform. Earth Sci Inform 3:297–308CrossRef
go back to reference Goyat S (2012a) Cryptography using genetic algorithms. J Comput Eng 1:6–8 Goyat S (2012a) Cryptography using genetic algorithms. J Comput Eng 1:6–8
go back to reference Goyat S (2012b) Genetic key generation for public key cryptography. Int J Soft Comput Eng 2:231–233 Goyat S (2012b) Genetic key generation for public key cryptography. Int J Soft Comput Eng 2:231–233
go back to reference Haupt RL, Haupt SE (2004) Practical genetic algorithms. Wiley, New JerseyMATH Haupt RL, Haupt SE (2004) Practical genetic algorithms. Wiley, New JerseyMATH
go back to reference Holland J (1975) Adoption in natural and artificial systems. MIT press Holland J (1975) Adoption in natural and artificial systems. MIT press
go back to reference Khan FU, Bhatia S (2012) A novel approach to genetic algorithm based cryptography. Int J Res Comp Sci 2:7–10CrossRef Khan FU, Bhatia S (2012) A novel approach to genetic algorithm based cryptography. Int J Res Comp Sci 2:7–10CrossRef
go back to reference Kocarev L, Lian S (2012) Chaos-based cryptography: theory, algorithms and applications. Springer, Berlin Kocarev L, Lian S (2012) Chaos-based cryptography: theory, algorithms and applications. Springer, Berlin
go back to reference Lin C-H, Yang C-Y, Chang C-W (2010) Authentication and protection for medical image, computational collective intelligence technologies and applications. Lecture Notes Comput Sci 6422:278–287 Lin C-H, Yang C-Y, Chang C-W (2010) Authentication and protection for medical image, computational collective intelligence technologies and applications. Lecture Notes Comput Sci 6422:278–287
go back to reference Lin CH, Yang CY, Chang CW (2012) An efficient algorithm for protecting and authenticating medical image. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp 67–70 Lin CH, Yang CY, Chang CW (2012) An efficient algorithm for protecting and authenticating medical image. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp 67–70
go back to reference Misevicius A (2005) Experiments with hybrid genetic algorithm for the grey pattern problem. Informatica 17:237–258 Misevicius A (2005) Experiments with hybrid genetic algorithm for the grey pattern problem. Informatica 17:237–258
go back to reference Mishra S, Bali S (2013) Public key cryptography using genetic algorithm. Int J Recent Technol Eng 2:150–154CrossRef Mishra S, Bali S (2013) Public key cryptography using genetic algorithm. Int J Recent Technol Eng 2:150–154CrossRef
go back to reference Mitchell M (1996) An introduction to genetic algorithms. MIT Press, Cambridge Mitchell M (1996) An introduction to genetic algorithms. MIT Press, Cambridge
go back to reference Papadakis SE, Tzionas P, Kaburlasos VG, Theocharis JB (2005) A genetic based approach to the type I structure identification. Informatica 16:365–382MATHMathSciNet Papadakis SE, Tzionas P, Kaburlasos VG, Theocharis JB (2005) A genetic based approach to the type I structure identification. Informatica 16:365–382MATHMathSciNet
go back to reference Patidar V, Pareek NK, Purohit G, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056–3075 Patidar V, Pareek NK, Purohit G, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056–3075
go back to reference Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Commun 284:4331–4339CrossRef Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Commun 284:4331–4339CrossRef
go back to reference Petcu D, Gorgan D, Pop F, Tudor D (2007) MedioGrid: a grid-based platform for satellite image processing. In: IEEE workshopConference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp 137–142 Petcu D, Gorgan D, Pop F, Tudor D (2007) MedioGrid: a grid-based platform for satellite image processing. In: IEEE workshopConference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp 137–142
go back to reference Pizzolante R, Carpentieri B, Castiglione A (2013) A secure low complexity approach for compression and transmission of 3-D medical images. In: IEEE Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp 387–392 Pizzolante R, Carpentieri B, Castiglione A (2013) A secure low complexity approach for compression and transmission of 3-D medical images. In: IEEE Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp 387–392
go back to reference Pop F (2007) Distributed algorithm for change detection in satellite images for Grid Environments. In: Sixth International Symposium on Parallel and Distributed Computing (ISPDC), p 41 Pop F (2007) Distributed algorithm for change detection in satellite images for Grid Environments. In: Sixth International Symposium on Parallel and Distributed Computing (ISPDC), p 41
go back to reference Tsang PWM, Au ATS (1996) A genetic algorithm for projective invariant object recognition. In: IEEE TENCOM Conference proceedings on Digital Signal Processing Applications, pp 58–63 Tsang PWM, Au ATS (1996) A genetic algorithm for projective invariant object recognition. In: IEEE TENCOM Conference proceedings on Digital Signal Processing Applications, pp 58–63
go back to reference Ulh A, Pommer A (2005) Image and video encryption. Springer, Boston Ulh A, Pommer A (2005) Image and video encryption. Springer, Boston
go back to reference Velumani R and Seenivasagam V (2010) A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. In: IEEE Conference on Computational Intelligence and Computing Research (ICCIC), pp 1–8 Velumani R and Seenivasagam V (2010) A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. In: IEEE Conference on Computational Intelligence and Computing Research (ICCIC), pp 1–8
go back to reference Xu S, Wang Y, Wang J, Tian M (2008) Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In: International Conference on Computational Intelligence and Security, pp 433–437 Xu S, Wang Y, Wang J, Tian M (2008) Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In: International Conference on Computational Intelligence and Security, pp 433–437
Metadata
Title
Medical image protection using genetic algorithm operations
Authors
Narendra K. Pareek
Vinod Patidar
Publication date
13-12-2014
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 2/2016
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-014-1539-7

Other articles of this Issue 2/2016

Soft Computing 2/2016 Go to the issue

Premium Partner