Skip to main content
Erschienen in: Evolutionary Intelligence 1-2/2018

07.08.2018 | Special Issue

Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm

verfasst von: Srinivas Koppu, V. Madhu Viswanatham

Erschienen in: Evolutionary Intelligence | Ausgabe 1-2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The development of encryption and decryption plays a vital role in the field of security. Recently, Chaos-based security has suggested the reliable and efficient way of securing the images. In this paper, Self-Adaptive Grey Wolf Optimization (GWO) is proposed for optimizing 2-dimensional Logistic Chaotic Mapping (2DCM). Further, the security analysis of the proposed method is performed using different comparison such as key sensitivity, histogram analysis, adjacent pixel autocorrelation, information entropy, attacks, quality of encryption, Chi square test etc. Moreover, analytical outcomes are compared with the conventional algorithms like standard encryption and decryption, Genetic Algorithm (GA) and GWO. The experimental result stated that the proposed method is key sensitive and opposed to the general attacks during the encryption and decryption of images.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression—encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121–133CrossRef Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression—encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121–133CrossRef
2.
Zurück zum Zitat Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36CrossRef Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36CrossRef
3.
Zurück zum Zitat Murugan B, Nanjappa Gounder AG (2016) Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput Vision 10(6):593–602CrossRef Murugan B, Nanjappa Gounder AG (2016) Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput Vision 10(6):593–602CrossRef
4.
5.
Zurück zum Zitat Wadi SM, Zainal N (2015) Decomposition by binary codes-based speedy image encryption algorithm for multiple applications. IET Image Proc 9(5):413–423CrossRef Wadi SM, Zainal N (2015) Decomposition by binary codes-based speedy image encryption algorithm for multiple applications. IET Image Proc 9(5):413–423CrossRef
6.
Zurück zum Zitat Sun Y, Xu R, Chen L, Hu X (2015) Image compression and encryption scheme using fractal dictionary and Julia set. IET Image Proc 9(3):173–183CrossRef Sun Y, Xu R, Chen L, Hu X (2015) Image compression and encryption scheme using fractal dictionary and Julia set. IET Image Proc 9(3):173–183CrossRef
7.
Zurück zum Zitat Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Sig Process 128:155–170CrossRef Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Sig Process 128:155–170CrossRef
8.
Zurück zum Zitat Li J, Liu H (2013) Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inf Secur 7(4):265–270MathSciNetCrossRef Li J, Liu H (2013) Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inf Secur 7(4):265–270MathSciNetCrossRef
9.
Zurück zum Zitat Hua Z, Zhou Y, Pun CM, Philip Chen CL (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci 297:80–94CrossRef Hua Z, Zhou Y, Pun CM, Philip Chen CL (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci 297:80–94CrossRef
10.
Zurück zum Zitat Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90(3):727–752CrossRef Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90(3):727–752CrossRef
11.
Zurück zum Zitat Tseng YC, Chen YY, Pan HK (2002) A secure data hiding scheme for binary images. IEEE Trans Commun 50(8):1227–1231CrossRef Tseng YC, Chen YY, Pan HK (2002) A secure data hiding scheme for binary images. IEEE Trans Commun 50(8):1227–1231CrossRef
12.
Zurück zum Zitat Zope-Chaudhari S, Venkatachalam P, Buddhiraju KM (2015) Secure dissemination and protection of multispectral images using crypto-watermarking. IEEE J Select Topics Appl Earth Observations Remote Sens 8(11):5388–5394CrossRef Zope-Chaudhari S, Venkatachalam P, Buddhiraju KM (2015) Secure dissemination and protection of multispectral images using crypto-watermarking. IEEE J Select Topics Appl Earth Observations Remote Sens 8(11):5388–5394CrossRef
13.
Zurück zum Zitat Philip A (2013) A generalized pseudo-knight? s tour algorithm for encryption of an image. IEEE Potentials 32(6):10–16CrossRef Philip A (2013) A generalized pseudo-knight? s tour algorithm for encryption of an image. IEEE Potentials 32(6):10–16CrossRef
14.
Zurück zum Zitat Yang M, Bourbakis N, Li S (2004) Data-image-video encryption. IEEE Potentials 23(3):28–34CrossRef Yang M, Bourbakis N, Li S (2004) Data-image-video encryption. IEEE Potentials 23(3):28–34CrossRef
15.
Zurück zum Zitat Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349–350:137–153CrossRef Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349–350:137–153CrossRef
16.
Zurück zum Zitat Sudharsanan S (2005) Shared key encryption of JPEG color images. IEEE Trans Consum Electron 51(4):1204–1211CrossRef Sudharsanan S (2005) Shared key encryption of JPEG color images. IEEE Trans Consum Electron 51(4):1204–1211CrossRef
17.
Zurück zum Zitat Zhang X, Li W, Hu H, Dutta NK (2015) High-speed all-optical encryption and decryption based on two-photon absorption in semiconductor optical amplifiers. IEEE/OSA J Opt Commun Netw 7(4):276–285CrossRef Zhang X, Li W, Hu H, Dutta NK (2015) High-speed all-optical encryption and decryption based on two-photon absorption in semiconductor optical amplifiers. IEEE/OSA J Opt Commun Netw 7(4):276–285CrossRef
18.
Zurück zum Zitat Wagh AM, Todmal SR (2015) Eyelids, eyelashes detection algorithm and Hough transform method for noise removal in iris recognition. Int J Comput Appl 112(3) Wagh AM, Todmal SR (2015) Eyelids, eyelashes detection algorithm and Hough transform method for noise removal in iris recognition. Int J Comput Appl 112(3)
19.
Zurück zum Zitat Sunil Kumar BS, Manjunath AS, Christopher S (2018) Improved entropy encoding for high efficient video coding standard. Alex Eng J 57(1):1–9CrossRef Sunil Kumar BS, Manjunath AS, Christopher S (2018) Improved entropy encoding for high efficient video coding standard. Alex Eng J 57(1):1–9CrossRef
20.
Zurück zum Zitat Kota PN, Gaikwad AN (2017) Optimized scrambling sequence to reduce papr in space frequency block codes based MIMO-OFDM system. J Adv Res Dyn Control Syst 502–525 Kota PN, Gaikwad AN (2017) Optimized scrambling sequence to reduce papr in space frequency block codes based MIMO-OFDM system. J Adv Res Dyn Control Syst 502–525
21.
Zurück zum Zitat Bhatnagar K, Gupta S (2017) Extending the neural model to study the impact of effective area of optical fiber on laser intensity. Int J Intell Eng Syst 10(4):274–283CrossRef Bhatnagar K, Gupta S (2017) Extending the neural model to study the impact of effective area of optical fiber on laser intensity. Int J Intell Eng Syst 10(4):274–283CrossRef
22.
Zurück zum Zitat Balaji GN, Subashini TS, Chidambaram N (2015) Detection of heart muscle damage from automated analysis of echocardiogram video. IETE J Res 61(3):236–243CrossRef Balaji GN, Subashini TS, Chidambaram N (2015) Detection of heart muscle damage from automated analysis of echocardiogram video. IETE J Res 61(3):236–243CrossRef
23.
Zurück zum Zitat Bramhe SS, Dalal A, Tajne D, Marotkar D (2015) Glass shaped antenna with defected ground structure for cognitive radio application. In: International Conference on Computing Communication Control and Automation, Pune, pp 330–333 Bramhe SS, Dalal A, Tajne D, Marotkar D (2015) Glass shaped antenna with defected ground structure for cognitive radio application. In: International Conference on Computing Communication Control and Automation, Pune, pp 330–333
24.
Zurück zum Zitat Yarrapragada KSSR, Krishna BB (2017) Impact of tamanu oil-diesel blend on combustion, performance and emissions of diesel engine and its prediction methodology. J Braz Soc Mech Sci Eng 1–15 Yarrapragada KSSR, Krishna BB (2017) Impact of tamanu oil-diesel blend on combustion, performance and emissions of diesel engine and its prediction methodology. J Braz Soc Mech Sci Eng 1–15
25.
Zurück zum Zitat Sreedharan NPN, Ganesan B, Raveendran R, Sarala P, Dennis B, Boothalingam R (2018) Grey Wolf optimisation-based feature selection and classification for facial emotion recognition. IET Biometrics Sreedharan NPN, Ganesan B, Raveendran R, Sarala P, Dennis B, Boothalingam R (2018) Grey Wolf optimisation-based feature selection and classification for facial emotion recognition. IET Biometrics
26.
Zurück zum Zitat Sarkar A, Murugan TS (2017) Cluster head selection for energy efficient and delay-less routing in wireless sensor network. Wireless Netw 1–18 Sarkar A, Murugan TS (2017) Cluster head selection for energy efficient and delay-less routing in wireless sensor network. Wireless Netw 1–18
27.
Zurück zum Zitat Kumar M, Vaish A (2017) Encryption of color images using MSVD in DCST domain. Opt Lasers Eng 88:51–59CrossRef Kumar M, Vaish A (2017) Encryption of color images using MSVD in DCST domain. Opt Lasers Eng 88:51–59CrossRef
28.
Zurück zum Zitat Hofbauer H, Uhl A (2016) Identifying deficits of visual security metrics for images. Sig Process Image Commun 46:60–75CrossRef Hofbauer H, Uhl A (2016) Identifying deficits of visual security metrics for images. Sig Process Image Commun 46:60–75CrossRef
29.
Zurück zum Zitat Dang PP, Chau PM (2000) Image encryption for secure Internet multimedia applications. IEEE Trans Consum Electron 46(3):395–403CrossRef Dang PP, Chau PM (2000) Image encryption for secure Internet multimedia applications. IEEE Trans Consum Electron 46(3):395–403CrossRef
30.
Zurück zum Zitat Satish K, Jayakar T, Tobin C, Madhavi K, Murali K (2004) Chaos based spread spectrum image steganography. IEEE Trans Consum Electron 50(2):587–590CrossRef Satish K, Jayakar T, Tobin C, Madhavi K, Murali K (2004) Chaos based spread spectrum image steganography. IEEE Trans Consum Electron 50(2):587–590CrossRef
31.
Zurück zum Zitat Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61CrossRef Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61CrossRef
32.
Zurück zum Zitat Iyapparaja M, Tiwari M (2017) Security policy speculation of user uploaded images on content sharing sites. IOP Conf Ser Mater Sci Eng 263(4):042019CrossRef Iyapparaja M, Tiwari M (2017) Security policy speculation of user uploaded images on content sharing sites. IOP Conf Ser Mater Sci Eng 263(4):042019CrossRef
33.
Zurück zum Zitat Jain M, Lenka SK, Vasistha SK (2016) Adaptive circular queue image steganography with RSA cryptosystem. Perspect Sci 8:417–420CrossRef Jain M, Lenka SK, Vasistha SK (2016) Adaptive circular queue image steganography with RSA cryptosystem. Perspect Sci 8:417–420CrossRef
34.
Zurück zum Zitat Sun S (2016) A novel edge based image steganography with 2 k correction and Huffman encoding. Inf Process Lett 116(2):93–99MathSciNetCrossRef Sun S (2016) A novel edge based image steganography with 2 k correction and Huffman encoding. Inf Process Lett 116(2):93–99MathSciNetCrossRef
35.
Zurück zum Zitat Zhang D, Zhang F (2014) Chaotic encryption and decryption of JPEG image. Optik Int Light Electron Opt 125(2):717–720CrossRef Zhang D, Zhang F (2014) Chaotic encryption and decryption of JPEG image. Optik Int Light Electron Opt 125(2):717–720CrossRef
36.
Zurück zum Zitat Ye G, Huang X (2016) An image encryption algorithm based on autoblocking and electrocardiography. IEEE MultiMedia 23(2):64–71CrossRef Ye G, Huang X (2016) An image encryption algorithm based on autoblocking and electrocardiography. IEEE MultiMedia 23(2):64–71CrossRef
37.
Zurück zum Zitat Candido R, Soriano DC, Silva MTM, Eisencraft M (2015) Do chaos-based communication systems really transmit chaotic signals? Sig Process 108:412–420CrossRef Candido R, Soriano DC, Silva MTM, Eisencraft M (2015) Do chaos-based communication systems really transmit chaotic signals? Sig Process 108:412–420CrossRef
38.
Zurück zum Zitat Yang YG, Tian J, Lei H, Zhou YH, Shi WM (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257–270CrossRef Yang YG, Tian J, Lei H, Zhou YH, Shi WM (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257–270CrossRef
39.
Zurück zum Zitat Liu Y et al (2016) Light encryption scheme using light-emitting diode and camera image sensor. IEEE Photon J 8(1):1–7 Liu Y et al (2016) Light encryption scheme using light-emitting diode and camera image sensor. IEEE Photon J 8(1):1–7
40.
Zurück zum Zitat Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proc Vis Image Signal Process 152(5):611–615CrossRef Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proc Vis Image Signal Process 152(5):611–615CrossRef
41.
Zurück zum Zitat Dzwonkowski M, Papaj M, Rykaczewski R (2015) A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process 24(11):4614–4622MathSciNetCrossRef Dzwonkowski M, Papaj M, Rykaczewski R (2015) A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process 24(11):4614–4622MathSciNetCrossRef
42.
Zurück zum Zitat Ge A, Zhang J, Zhang R, Ma C, Zhang Z (2013) Security analysis of a privacy-preserving decentralized key-policy attribute-based encryption scheme. IEEE Trans Parallel Distrib Syst 24(11):2319–2321CrossRef Ge A, Zhang J, Zhang R, Ma C, Zhang Z (2013) Security analysis of a privacy-preserving decentralized key-policy attribute-based encryption scheme. IEEE Trans Parallel Distrib Syst 24(11):2319–2321CrossRef
43.
Zurück zum Zitat Zhang Y, Zhang LY (2015) Exploiting random convolution and random subsampling for image encryption and compression. Electron Lett 51(20):1572–1574CrossRef Zhang Y, Zhang LY (2015) Exploiting random convolution and random subsampling for image encryption and compression. Electron Lett 51(20):1572–1574CrossRef
44.
Zurück zum Zitat Jolfaei A, Wu XW, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensics Secur 11(2):235–246CrossRef Jolfaei A, Wu XW, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensics Secur 11(2):235–246CrossRef
45.
Zurück zum Zitat Elshamy AM et al (2013) Optical image encryption based on chaotic baker map and double random phase encoding. J Lightwave Technol 31(15):2533–2539CrossRef Elshamy AM et al (2013) Optical image encryption based on chaotic baker map and double random phase encoding. J Lightwave Technol 31(15):2533–2539CrossRef
46.
Zurück zum Zitat Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Signal Process 48(8):2439–2451CrossRef Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Signal Process 48(8):2439–2451CrossRef
47.
Zurück zum Zitat Abd-El-Hafiz SK, Radwan AG, Abdel Haleem SH, Barakat ML (2014) A fractal-based image encryption system. IET Image Proc 8(12):742–752CrossRef Abd-El-Hafiz SK, Radwan AG, Abdel Haleem SH, Barakat ML (2014) A fractal-based image encryption system. IET Image Proc 8(12):742–752CrossRef
48.
Zurück zum Zitat Zhou J, Liu X, Au OC, Tang YY (2014) Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans Inf Forensics Secur 9(1):39–50CrossRef Zhou J, Liu X, Au OC, Tang YY (2014) Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans Inf Forensics Secur 9(1):39–50CrossRef
49.
Zurück zum Zitat Abdullah AH, Enayatifar R, Leeb M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. Int J Electron Commun (AEU) 66:806–816CrossRef Abdullah AH, Enayatifar R, Leeb M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. Int J Electron Commun (AEU) 66:806–816CrossRef
50.
Zurück zum Zitat Enayatifar R, Abdullah AH, FauziIsnin I (2014) Chaos-based image encryption using a hybrid genetic algorithm and aDNAsequence. Opt Lasers Eng 56:83–93CrossRef Enayatifar R, Abdullah AH, FauziIsnin I (2014) Chaos-based image encryption using a hybrid genetic algorithm and aDNAsequence. Opt Lasers Eng 56:83–93CrossRef
51.
Zurück zum Zitat Wang X, Xu D (2014) Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn 78(4):2975–2984MathSciNetCrossRef Wang X, Xu D (2014) Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn 78(4):2975–2984MathSciNetCrossRef
52.
Zurück zum Zitat Pareek NK, Patidar V (2016) Medical image protection using genetic algorithm operations. Soft Comput 20(2):763–772CrossRef Pareek NK, Patidar V (2016) Medical image protection using genetic algorithm operations. Soft Comput 20(2):763–772CrossRef
53.
Zurück zum Zitat Das S, Mandal S, Ghoshal N (2015) Multiple-image encryption using genetic algorithm. Intell Comput Appl 343:145–153 Das S, Mandal S, Ghoshal N (2015) Multiple-image encryption using genetic algorithm. Intell Comput Appl 343:145–153
54.
Zurück zum Zitat Shankar K, Eswaran P (2016) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. Artif Intell Evol Comput Eng Syst 394:705–714 Shankar K, Eswaran P (2016) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. Artif Intell Evol Comput Eng Syst 394:705–714
55.
Zurück zum Zitat Su Y, Tang C, Chen X, Li B, Xu W, Lei Z (2017) Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map. Opt Lasers Eng 88:20–27CrossRef Su Y, Tang C, Chen X, Li B, Xu W, Lei Z (2017) Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map. Opt Lasers Eng 88:20–27CrossRef
56.
Zurück zum Zitat Zhang W, Wang H, Hou D, Yu N (2016) Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans Multimed 18(8):1469–1479CrossRef Zhang W, Wang H, Hou D, Yu N (2016) Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans Multimed 18(8):1469–1479CrossRef
Metadaten
Titel
Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm
verfasst von
Srinivas Koppu
V. Madhu Viswanatham
Publikationsdatum
07.08.2018
Verlag
Springer Berlin Heidelberg
Erschienen in
Evolutionary Intelligence / Ausgabe 1-2/2018
Print ISSN: 1864-5909
Elektronische ISSN: 1864-5917
DOI
https://doi.org/10.1007/s12065-018-0159-z

Weitere Artikel der Ausgabe 1-2/2018

Evolutionary Intelligence 1-2/2018 Zur Ausgabe