Skip to main content
Erschienen in: Soft Computing 2/2016

13.12.2014 | Methodologies and Application

Medical image protection using genetic algorithm operations

verfasst von: Narendra K. Pareek, Vinod Patidar

Erschienen in: Soft Computing | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The security of digital medical images has attracted much attention recently, especially when these images are sent through the communication networks. An image encryption technique tries to convert an image to another image that is hard to understand. In this communication, we propose an encryption method for gray scale medical images based on the features of genetic algorithms. Performance analysis show that the proposed scheme has good statistical character, key sensitivity and can resist brute-force attack, differential attack, plaintext attack and entropy attack efficiently.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Al-Husainy MAF (2012) A novel encryption method for image security. Int J Secur Appl 6:1–8 Al-Husainy MAF (2012) A novel encryption method for image security. Int J Secur Appl 6:1–8
Zurück zum Zitat Cao F, Huang HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196CrossRef Cao F, Huang HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196CrossRef
Zurück zum Zitat Castiglione A, Pizzolante R, Santis AD, Carpentieri B, Castiglione A, Palmieri F (2014) Cloud- based adaptive compression and secure management services for 3D healthcare data. Future Gener Comput Syst. doi:10.1016/j.future.2014.07.001 (in press) Castiglione A, Pizzolante R, Santis AD, Carpentieri B, Castiglione A, Palmieri F (2014) Cloud- based adaptive compression and secure management services for 3D healthcare data. Future Gener Comput Syst. doi:10.​1016/​j.​future.​2014.​07.​001 (in press)
Zurück zum Zitat Coatrieux G, Montagner J, Huang H, Roux C (2007) Mixed reversible and RONI watermarking for medical image reliability protection. In: IEEE Conference on Engineering in Medicine and Biology Society (EMBS), pp 5653–5656 Coatrieux G, Montagner J, Huang H, Roux C (2007) Mixed reversible and RONI watermarking for medical image reliability protection. In: IEEE Conference on Engineering in Medicine and Biology Society (EMBS), pp 5653–5656
Zurück zum Zitat Dutt I, Paul S, Chaudhuri SN (2013) Implementation of network security using genetic algorithm. Int J Adv Res Comp Sci Softw Eng 3:234–241 Dutt I, Paul S, Chaudhuri SN (2013) Implementation of network security using genetic algorithm. Int J Adv Res Comp Sci Softw Eng 3:234–241
Zurück zum Zitat Fu C, Meng W-H, Zhan Y-F, Zhu Z-L, Lau FCM, Tse CK, Ma H-F (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43:1000–1010CrossRef Fu C, Meng W-H, Zhan Y-F, Zhu Z-L, Lau FCM, Tse CK, Ma H-F (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43:1000–1010CrossRef
Zurück zum Zitat Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394–400MATHCrossRef Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394–400MATHCrossRef
Zurück zum Zitat Gorgan D, Bacu V, Rodila D, Pop F, Petcu D (2010) Experiments on ESIP—environment oriented satellite data processing platform. Earth Sci Inform 3:297–308CrossRef Gorgan D, Bacu V, Rodila D, Pop F, Petcu D (2010) Experiments on ESIP—environment oriented satellite data processing platform. Earth Sci Inform 3:297–308CrossRef
Zurück zum Zitat Goyat S (2012a) Cryptography using genetic algorithms. J Comput Eng 1:6–8 Goyat S (2012a) Cryptography using genetic algorithms. J Comput Eng 1:6–8
Zurück zum Zitat Goyat S (2012b) Genetic key generation for public key cryptography. Int J Soft Comput Eng 2:231–233 Goyat S (2012b) Genetic key generation for public key cryptography. Int J Soft Comput Eng 2:231–233
Zurück zum Zitat Haupt RL, Haupt SE (2004) Practical genetic algorithms. Wiley, New JerseyMATH Haupt RL, Haupt SE (2004) Practical genetic algorithms. Wiley, New JerseyMATH
Zurück zum Zitat Holland J (1975) Adoption in natural and artificial systems. MIT press Holland J (1975) Adoption in natural and artificial systems. MIT press
Zurück zum Zitat Khan FU, Bhatia S (2012) A novel approach to genetic algorithm based cryptography. Int J Res Comp Sci 2:7–10CrossRef Khan FU, Bhatia S (2012) A novel approach to genetic algorithm based cryptography. Int J Res Comp Sci 2:7–10CrossRef
Zurück zum Zitat Kocarev L, Lian S (2012) Chaos-based cryptography: theory, algorithms and applications. Springer, Berlin Kocarev L, Lian S (2012) Chaos-based cryptography: theory, algorithms and applications. Springer, Berlin
Zurück zum Zitat Lin C-H, Yang C-Y, Chang C-W (2010) Authentication and protection for medical image, computational collective intelligence technologies and applications. Lecture Notes Comput Sci 6422:278–287 Lin C-H, Yang C-Y, Chang C-W (2010) Authentication and protection for medical image, computational collective intelligence technologies and applications. Lecture Notes Comput Sci 6422:278–287
Zurück zum Zitat Lin CH, Yang CY, Chang CW (2012) An efficient algorithm for protecting and authenticating medical image. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp 67–70 Lin CH, Yang CY, Chang CW (2012) An efficient algorithm for protecting and authenticating medical image. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp 67–70
Zurück zum Zitat Misevicius A (2005) Experiments with hybrid genetic algorithm for the grey pattern problem. Informatica 17:237–258 Misevicius A (2005) Experiments with hybrid genetic algorithm for the grey pattern problem. Informatica 17:237–258
Zurück zum Zitat Mishra S, Bali S (2013) Public key cryptography using genetic algorithm. Int J Recent Technol Eng 2:150–154CrossRef Mishra S, Bali S (2013) Public key cryptography using genetic algorithm. Int J Recent Technol Eng 2:150–154CrossRef
Zurück zum Zitat Mitchell M (1996) An introduction to genetic algorithms. MIT Press, Cambridge Mitchell M (1996) An introduction to genetic algorithms. MIT Press, Cambridge
Zurück zum Zitat Papadakis SE, Tzionas P, Kaburlasos VG, Theocharis JB (2005) A genetic based approach to the type I structure identification. Informatica 16:365–382MATHMathSciNet Papadakis SE, Tzionas P, Kaburlasos VG, Theocharis JB (2005) A genetic based approach to the type I structure identification. Informatica 16:365–382MATHMathSciNet
Zurück zum Zitat Patidar V, Pareek NK, Purohit G, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056–3075 Patidar V, Pareek NK, Purohit G, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056–3075
Zurück zum Zitat Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Commun 284:4331–4339CrossRef Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Commun 284:4331–4339CrossRef
Zurück zum Zitat Petcu D, Gorgan D, Pop F, Tudor D (2007) MedioGrid: a grid-based platform for satellite image processing. In: IEEE workshopConference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp 137–142 Petcu D, Gorgan D, Pop F, Tudor D (2007) MedioGrid: a grid-based platform for satellite image processing. In: IEEE workshopConference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp 137–142
Zurück zum Zitat Pizzolante R, Carpentieri B, Castiglione A (2013) A secure low complexity approach for compression and transmission of 3-D medical images. In: IEEE Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp 387–392 Pizzolante R, Carpentieri B, Castiglione A (2013) A secure low complexity approach for compression and transmission of 3-D medical images. In: IEEE Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp 387–392
Zurück zum Zitat Pop F (2007) Distributed algorithm for change detection in satellite images for Grid Environments. In: Sixth International Symposium on Parallel and Distributed Computing (ISPDC), p 41 Pop F (2007) Distributed algorithm for change detection in satellite images for Grid Environments. In: Sixth International Symposium on Parallel and Distributed Computing (ISPDC), p 41
Zurück zum Zitat Tsang PWM, Au ATS (1996) A genetic algorithm for projective invariant object recognition. In: IEEE TENCOM Conference proceedings on Digital Signal Processing Applications, pp 58–63 Tsang PWM, Au ATS (1996) A genetic algorithm for projective invariant object recognition. In: IEEE TENCOM Conference proceedings on Digital Signal Processing Applications, pp 58–63
Zurück zum Zitat Ulh A, Pommer A (2005) Image and video encryption. Springer, Boston Ulh A, Pommer A (2005) Image and video encryption. Springer, Boston
Zurück zum Zitat Velumani R and Seenivasagam V (2010) A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. In: IEEE Conference on Computational Intelligence and Computing Research (ICCIC), pp 1–8 Velumani R and Seenivasagam V (2010) A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. In: IEEE Conference on Computational Intelligence and Computing Research (ICCIC), pp 1–8
Zurück zum Zitat Xu S, Wang Y, Wang J, Tian M (2008) Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In: International Conference on Computational Intelligence and Security, pp 433–437 Xu S, Wang Y, Wang J, Tian M (2008) Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In: International Conference on Computational Intelligence and Security, pp 433–437
Metadaten
Titel
Medical image protection using genetic algorithm operations
verfasst von
Narendra K. Pareek
Vinod Patidar
Publikationsdatum
13.12.2014
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 2/2016
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-014-1539-7

Weitere Artikel der Ausgabe 2/2016

Soft Computing 2/2016 Zur Ausgabe