Skip to main content
Erschienen in: Wireless Personal Communications 1/2019

25.04.2019

Medical Image Encryption Based on Hybrid Chaotic DNA Diffusion

verfasst von: Joshua C. Dagadu, Jian-Ping Li, Emelia O. Aboagye

Erschienen in: Wireless Personal Communications | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We explore the use of two chaotic systems (Bernoulli shift map and Zizag map) coupled with deoxyribonucleic acid coding in an encryption scheme for medical images in this paper. The scheme consists of two main phases: Chaotic key generation and DNA diffusion. Firstly, the message digest algorithm 5 hash function is performed on the plain medical image and the hash value used in combination with the value of an input ASCII string to generate initial conditions and control parameters for two chaotic systems (Bernoulli shift map and Zigzag map). These chaotic systems are subsequently used to produce two separate key matrices. Secondly, a row-by-row diffusion operation between the plain image matrix and the two chaotic key matrices, using the DNA XOR algebraic operation is performed in an alternating pattern to produce the cipher image. The logistic map is used to select the DNA encoding and decoding rules for each row. Experimental results of statistical, differential and key analyses demonstrate that the proposed scheme is robust and provides resistance to various forms of attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Husainy, M. A. F. (2012). A novel encryption method for image security. International Journal of Security and Its Applications, 6(1), 1–8. Al-Husainy, M. A. F. (2012). A novel encryption method for image security. International Journal of Security and Its Applications, 6(1), 1–8.
2.
Zurück zum Zitat Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(08), 2129–2151.MathSciNetMATHCrossRef Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(08), 2129–2151.MathSciNetMATHCrossRef
3.
Zurück zum Zitat Andrecut, M. (1998). Logistic map as a random number generator. International Journal of Modern Physics B, 12(09), 921–930.MathSciNetMATHCrossRef Andrecut, M. (1998). Logistic map as a random number generator. International Journal of Modern Physics B, 12(09), 921–930.MathSciNetMATHCrossRef
4.
Zurück zum Zitat Belazi, A., El-Latif, A. A. A., & Belghith, S. (2016). A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing, 128, 155–170.CrossRef Belazi, A., El-Latif, A. A. A., & Belghith, S. (2016). A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing, 128, 155–170.CrossRef
5.
Zurück zum Zitat Chai, X., Chen, Y., & Broyde, L. (2017). A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in Engineering, 88, 197–213.CrossRef Chai, X., Chen, Y., & Broyde, L. (2017). A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in Engineering, 88, 197–213.CrossRef
6.
Zurück zum Zitat Chakraborty, S., Seal, A., Roy, M., & Mali, K. (2016). A novel lossless image encryption method using dna substitution and chaotic logistic map. International Journal of Security and Its Applications, 10(2), 205–216.CrossRef Chakraborty, S., Seal, A., Roy, M., & Mali, K. (2016). A novel lossless image encryption method using dna substitution and chaotic logistic map. International Journal of Security and Its Applications, 10(2), 205–216.CrossRef
7.
Zurück zum Zitat Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749–761.MathSciNetMATHCrossRef Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749–761.MathSciNetMATHCrossRef
8.
Zurück zum Zitat Dridi, M., Hajjaji, M. A., Bouallegue, B., & Mtibaa, A. (2016). Cryptography of medical images based on a combination between chaotic and neural network. IET Image Processing, 10(11), 830–839.CrossRef Dridi, M., Hajjaji, M. A., Bouallegue, B., & Mtibaa, A. (2016). Cryptography of medical images based on a combination between chaotic and neural network. IET Image Processing, 10(11), 830–839.CrossRef
9.
Zurück zum Zitat El-Alfy, E. S. M., Thampi, S. M., Takagi, H., Piramuthu, S., & Hanne, T. (2015). Advances in Intelligent Informatics. Berlin: Springer.CrossRef El-Alfy, E. S. M., Thampi, S. M., Takagi, H., Piramuthu, S., & Hanne, T. (2015). Advances in Intelligent Informatics. Berlin: Springer.CrossRef
10.
Zurück zum Zitat Enayatifar, R., Abdullah, A. H., & Isnin, I. F. (2014). Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering, 56, 83–93.CrossRef Enayatifar, R., Abdullah, A. H., & Isnin, I. F. (2014). Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering, 56, 83–93.CrossRef
11.
Zurück zum Zitat Enayatifar, R., Abdullah, A. H., & Lee, M. (2013). A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Optics and Lasers in Engineering, 51(9), 1066–1077.CrossRef Enayatifar, R., Abdullah, A. H., & Lee, M. (2013). A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Optics and Lasers in Engineering, 51(9), 1066–1077.CrossRef
12.
Zurück zum Zitat Enayatifar, R., Sadaei, H. J., Abdullah, A. H., Lee, M., & Isnin, I. F. (2015). A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Optics and Lasers in Engineering, 71, 33–41.CrossRef Enayatifar, R., Sadaei, H. J., Abdullah, A. H., Lee, M., & Isnin, I. F. (2015). A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Optics and Lasers in Engineering, 71, 33–41.CrossRef
13.
Zurück zum Zitat de la Fraga, L. G., Torres-Pérez, E., Tlelo-Cuautle, E., & Mancillas-López, C. (2017). Hardware implementation of pseudo-random number generators based on chaotic maps. Nonlinear Dynamics, 90(3), 1661–1670.CrossRef de la Fraga, L. G., Torres-Pérez, E., Tlelo-Cuautle, E., & Mancillas-López, C. (2017). Hardware implementation of pseudo-random number generators based on chaotic maps. Nonlinear Dynamics, 90(3), 1661–1670.CrossRef
14.
Zurück zum Zitat Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 29(2), 393–399.MATHCrossRef Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 29(2), 393–399.MATHCrossRef
15.
Zurück zum Zitat Guesmi, R., Farah, M., Kachouri, A., & Samet, M. (2016). A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dynamics, 83(3), 1123–1136.MathSciNetMATHCrossRef Guesmi, R., Farah, M., Kachouri, A., & Samet, M. (2016). A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dynamics, 83(3), 1123–1136.MathSciNetMATHCrossRef
16.
Zurück zum Zitat Hermassi, H., Belazi, A., Rhouma, R., & Belghith, S. M. (2014). Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimedia tools and applications, 72(3), 2211–2224.MATHCrossRef Hermassi, H., Belazi, A., Rhouma, R., & Belghith, S. M. (2014). Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimedia tools and applications, 72(3), 2211–2224.MATHCrossRef
17.
Zurück zum Zitat Huang, X., & Ye, G. (2014). An image encryption algorithm based on hyper-chaos and DNA sequence. Multimedia tools and applications, 72(1), 57–70.CrossRef Huang, X., & Ye, G. (2014). An image encryption algorithm based on hyper-chaos and DNA sequence. Multimedia tools and applications, 72(1), 57–70.CrossRef
18.
Zurück zum Zitat Liu, Y., Tang, J., & Xie, T. (2014). Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Optics & Laser Technology, 60, 111–115.CrossRef Liu, Y., Tang, J., & Xie, T. (2014). Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Optics & Laser Technology, 60, 111–115.CrossRef
19.
Zurück zum Zitat Maheshkar, S., et al. (2017). Region-based hybrid medical image watermarking for secure telemedicine applications. Multimedia Tools and Applications, 76(3), 3617–3647.CrossRef Maheshkar, S., et al. (2017). Region-based hybrid medical image watermarking for secure telemedicine applications. Multimedia Tools and Applications, 76(3), 3617–3647.CrossRef
20.
Zurück zum Zitat Mao, Y., Chen, G. (2005) Chaos-based image encryption. In Handbook of Geometric Computing. Springer, Berlin, Heidelberg Mao, Y., Chen, G. (2005) Chaos-based image encryption. In Handbook of Geometric Computing. Springer, Berlin, Heidelberg
21.
Zurück zum Zitat Murillo-Escobar, M., Cruz-Hernández, C., Cardoza-Avendaño, L., & Méndez-Ramírez, R. (2017). A novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dynamics, 87(1), 407–425.MathSciNetCrossRef Murillo-Escobar, M., Cruz-Hernández, C., Cardoza-Avendaño, L., & Méndez-Ramírez, R. (2017). A novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dynamics, 87(1), 407–425.MathSciNetCrossRef
22.
Zurück zum Zitat Norouzi, B., Mirzakuchaki, S., & Norouzi, P. (2017). Breaking an image encryption technique based on neural chaotic generator. Optik-International Journal for Light and Electron Optics, 140, 946–952.CrossRef Norouzi, B., Mirzakuchaki, S., & Norouzi, P. (2017). Breaking an image encryption technique based on neural chaotic generator. Optik-International Journal for Light and Electron Optics, 140, 946–952.CrossRef
23.
Zurück zum Zitat Parvees, M. M., Samath, J. A., & Bose, B. P. (2016). Secured medical images-a chaotic pixel scrambling approach. Journal of medical systems, 40(11), 232.CrossRef Parvees, M. M., Samath, J. A., & Bose, B. P. (2016). Secured medical images-a chaotic pixel scrambling approach. Journal of medical systems, 40(11), 232.CrossRef
24.
Zurück zum Zitat Parvin, Z., Seyedarabi, H., & Shamsi, M. (2016). A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools and Applications, 75(17), 10631–10648.CrossRef Parvin, Z., Seyedarabi, H., & Shamsi, M. (2016). A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools and Applications, 75(17), 10631–10648.CrossRef
25.
Zurück zum Zitat Phatak, S., & Rao, S. S. (1995). Logistic map: A possible random-number generator. Physical review E, 51(4), 3670.CrossRef Phatak, S., & Rao, S. S. (1995). Logistic map: A possible random-number generator. Physical review E, 51(4), 3670.CrossRef
26.
Zurück zum Zitat Praveenkumar, P., Devi, N. K., Ravichandran, D., Avila, J., Thenmozhi, K., Rayappan, J. B. B., et al. (2017). Transreceiving of encrypted medical image: A cognitive approach. Multimedia Tools and Applications, 77(7), 8393–8418.CrossRef Praveenkumar, P., Devi, N. K., Ravichandran, D., Avila, J., Thenmozhi, K., Rayappan, J. B. B., et al. (2017). Transreceiving of encrypted medical image: A cognitive approach. Multimedia Tools and Applications, 77(7), 8393–8418.CrossRef
27.
Zurück zum Zitat Ravichandran, D., Praveenkumar, P., Rayappan, J. B. B., & Amirtharajan, R. (2016). Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine, 72, 170–184.CrossRef Ravichandran, D., Praveenkumar, P., Rayappan, J. B. B., & Amirtharajan, R. (2016). Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine, 72, 170–184.CrossRef
28.
Zurück zum Zitat ur Rehman, A., Liao, X., Kulsoom, A., & Abbas, S. A. (2015). Selective encryption for gray images based on chaos and DNA complementary rules. Multimedia Tools and Applications, 74(13), 4655–4677.CrossRef ur Rehman, A., Liao, X., Kulsoom, A., & Abbas, S. A. (2015). Selective encryption for gray images based on chaos and DNA complementary rules. Multimedia Tools and Applications, 74(13), 4655–4677.CrossRef
29.
Zurück zum Zitat Sankpal, P.R., & Vijaya, P. (2014). Image encryption using chaotic maps: A survey. In 2014 Fifth International Conference on Signal and Image Processing (ICSIP) (pp. 102–107). IEEE Sankpal, P.R., & Vijaya, P. (2014). Image encryption using chaotic maps: A survey. In 2014 Fifth International Conference on Signal and Image Processing (ICSIP) (pp. 102–107). IEEE
31.
Zurück zum Zitat Wang, H., Ye, J. M., Liang, H. F., & Miao, Z. H. (2017). A medical image encryption algorithm based on synchronization of time-delay chaotic system. Advances in Manufacturing, 5(2), 158–164.CrossRef Wang, H., Ye, J. M., Liang, H. F., & Miao, Z. H. (2017). A medical image encryption algorithm based on synchronization of time-delay chaotic system. Advances in Manufacturing, 5(2), 158–164.CrossRef
32.
Zurück zum Zitat Wang, X., & Liu, C. (2017). A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimedia Tools and Applications, 76(5), 6229–6245.CrossRef Wang, X., & Liu, C. (2017). A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimedia Tools and Applications, 76(5), 6229–6245.CrossRef
33.
Zurück zum Zitat Wang, X. Y., Yang, L., Liu, R., & Kadir, A. (2010). A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics, 62(3), 615–621.MathSciNetMATHCrossRef Wang, X. Y., Yang, L., Liu, R., & Kadir, A. (2010). A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics, 62(3), 615–621.MathSciNetMATHCrossRef
34.
Zurück zum Zitat Watson, J. D., & Crick, F. (1974). Molecular structure of nucleic acids: A structure for deoxyribose nucleic acid. Nature, 248(5451), 765.CrossRef Watson, J. D., & Crick, F. (1974). Molecular structure of nucleic acids: A structure for deoxyribose nucleic acid. Nature, 248(5451), 765.CrossRef
35.
Zurück zum Zitat American National Standards Institute/Institute of Electrical and Electronics Engineers (1985). IEEE standard for binary floating-point arithmetic. In ANSI/IEEE Std 754–1985 (pp. 754–1985). New York American National Standards Institute/Institute of Electrical and Electronics Engineers (1985). IEEE standard for binary floating-point arithmetic. In ANSI/IEEE Std 754–1985 (pp. 754–1985). New York
36.
Zurück zum Zitat Zhan, K., Wei, D., Shi, J., & Yu, J. (2017). Cross-utilizing hyperchaotic and DNA sequences for image encryption. Journal of Electronic Imaging, 26(1), 013,021–013,021.CrossRef Zhan, K., Wei, D., Shi, J., & Yu, J. (2017). Cross-utilizing hyperchaotic and DNA sequences for image encryption. Journal of Electronic Imaging, 26(1), 013,021–013,021.CrossRef
37.
Zurück zum Zitat Zhang, Q., Guo, L., & Wei, X. (2010). Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling, 52(11), 2028–2035.MathSciNetMATHCrossRef Zhang, Q., Guo, L., & Wei, X. (2010). Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling, 52(11), 2028–2035.MathSciNetMATHCrossRef
38.
Zurück zum Zitat Zhang, X., Wang, H., & Xu, C. (2019). Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Information Sciences, 472, 223–234.CrossRef Zhang, X., Wang, H., & Xu, C. (2019). Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Information Sciences, 472, 223–234.CrossRef
39.
Zurück zum Zitat Zhang, X., & Xu, C. (2018). Trapdoor security lattice-based public-key searchable encryption with a designated cloud server. Wireless Personal Communications, 100(3), 907–921.CrossRef Zhang, X., & Xu, C. (2018). Trapdoor security lattice-based public-key searchable encryption with a designated cloud server. Wireless Personal Communications, 100(3), 907–921.CrossRef
40.
Zurück zum Zitat Zhang, X., Xu, C., Mu, L., & Zhao, J. (2018). Identity-based encryption with keyword search from lattice assumption. China Communications, 15(4), 164–178.CrossRef Zhang, X., Xu, C., Mu, L., & Zhao, J. (2018). Identity-based encryption with keyword search from lattice assumption. China Communications, 15(4), 164–178.CrossRef
Metadaten
Titel
Medical Image Encryption Based on Hybrid Chaotic DNA Diffusion
verfasst von
Joshua C. Dagadu
Jian-Ping Li
Emelia O. Aboagye
Publikationsdatum
25.04.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06420-z

Weitere Artikel der Ausgabe 1/2019

Wireless Personal Communications 1/2019 Zur Ausgabe