Advertisement

Medical & Biological Engineering & Computing

, Volume 57, Issue 11, pp 2517–2533 | Cite as

Medical image encryption using fractional discrete cosine transform with chaotic function

  • Sumit KumarEmail author
  • Bhaskar Panna
  • Rajib Kumar Jha
Original Article
  • 117 Downloads

Abstract

In this advanced era, where we have high-speed connectivity, it is very imperative to insulate medical data from forgery and fraud. With the regular increment in the number of internet users, it is challenging to transmit the beefy medical data. This (medical data) is always reused for different diagnosis purposes, so the information of the medical images need to be protected. This paper introduces a new scheme to ensure the safety of the medical data, which includes the use of a chaotic map on the fractional discrete cosine transform (FrDCT) coefficients of the medical data/images. The imperative FrDCT provides a high degree of freedom for the encryption of the medical images. The algorithm consists of two significant steps, i.e., application of FrDCT on an image and after that chaotic map on FrDCT coefficients. The proposed algorithm discusses the benefits of FrDCT over fractional Fourier transform (FRFT) concerning fractional order α. The key sensitivity and space of the proposed algorithm for different medical images inspire us to make a platform for other researchers to work in this area. Experiments are conducted to study different parameters and challenges. The proposed method has been compared with state-of-the-art techniques. The results suggest that our technique outperforms many other state-of-the-art techniques.

Graphical Abstract

Overview of the proposed algorithm

Keywords

Medical image Encryption Decryption Chaotic Fractional cosine transform Key space Key sensitivity 

Notes

Acknowledgments

The authors are grateful to the anonymous referees for their insightful comments to make this paper more qualitative for other researchers working in the same area.

Funding information

We thank the Ministry of Electronics & Information Technology, Government of India (Digital India Corporation (Grant No.U72900MH2001NPL133410)) for granting fund to this prestigious project in the Signal & Image Processing Laboratory at Indian Institute of Technology Patna, India.

References

  1. 1.
    Al-Haj A (2015) Providing integrity, authenticity, and confidentiality for header and pixel data of dicom images. J Digit Imaging 28(2):179–187PubMedGoogle Scholar
  2. 2.
    Biham E, Shamir A (2012) Differential cryptanalysis of the data encryption standard. Springer Science & Business MediaGoogle Scholar
  3. 3.
    Bountis T (2012) Chaotic dynamics: theory and practice, vol. 298 Springer Science & Business MediaGoogle Scholar
  4. 4.
    Burr WE (2003) Selecting the advanced encryption standard. IEEE Secur Priv 99(2):43–52Google Scholar
  5. 5.
    Cariolaro G, Erseghe T, Kraniauskas P (2002) The fractional discrete cosine transform. IEEE Trans Signal Process 50(4):902–911Google Scholar
  6. 6.
    Chai X, Gan Z, Yuan K, Chen Y, Liu X (2017) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput & Applic 31(1):219–237Google Scholar
  7. 7.
    Chandrasekaran J, Thiruvengadam S (2017) A hybrid chaotic and number theoretic approach for securing dicom images. Security and Communication Networks 2017Google Scholar
  8. 8.
    Chen G, Yu X (2003) Chaos control: theory and applications, vol. 292 Springer Science & Business MediaGoogle Scholar
  9. 9.
    Chen WH, Smith C, Fralick S (1977) A fast computational algorithm for the discrete cosine transform. IEEE Trans Commun 25(9):1004–1009Google Scholar
  10. 10.
    Chen X, Hu CJ (2017) Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi Journal of Biological Sciences 24(8):1821–1827PubMedPubMedCentralGoogle Scholar
  11. 11.
    Coppersmith D, Johnson DB, Matyas SM (1996) A proposed mode for triple-des encryption. IBM J Res Dev 40(2):253–262Google Scholar
  12. 12.
    El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144– 157Google Scholar
  13. 13.
    Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FC, Chi KT, Ma HF (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010PubMedGoogle Scholar
  14. 14.
    Fu C, Zhang GY, Bian O, Lei WM, Ma HF (2014) A novel medical image protection scheme using a 3-dimensional chaotic system, vol 9PubMedPubMedCentralGoogle Scholar
  15. 15.
    Goel A, Vishwakarma VP (2017) Fractional dct and dwt hybridization based efficient feature extraction for gender classification. Pattern Recogn Lett 95:8–13Google Scholar
  16. 16.
    Gopalakrishnan T, Ramakrishnan S (2017) Chaotic image encryption with hash keying as key generator. IETE J Res 63(2): 172–187Google Scholar
  17. 17.
    Hilborn RC, Tufillaro NB (1997) Resource letter: Nd-1: nonlinear dynamics. Am J Phys 65(9):822–834Google Scholar
  18. 18.
    Kanso A, Ghebleh M (2015) An efficient and robust image encryption scheme for medical applications. Commun Nonlinear Sci Numer Simul 24(1-3):98–116Google Scholar
  19. 19.
    Kulenovic MR, Ladas G (2001) Dynamics of second order rational difference equations: with open problems and conjectures. Chapman and Hall/CRC, Boca RatonGoogle Scholar
  20. 20.
    Kumar S, Jha RK (2019) FD-based detector for medical image watermarking 13(10):1773–1782Google Scholar
  21. 21.
    Kumar S, Jha RK (2016) Enhancement of high dynamic range images using variational calculus regularizer with stochastic resonance. In: Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing. ACM, p 38Google Scholar
  22. 22.
    Kumar S, Jha RK (2018) A fractional integrator based novel detector for weak signal detection with watermark application. In: 2018 Asia-pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, pp 1791–1795Google Scholar
  23. 23.
    Kumar S, Jha RK, Sharma R, Verma A, Singh Y (2018) A robust sharing based encryption method in singular value decomposition domain using fractional fourier transform. In: 2018 8th International Symposium on Embedded Computing and System Design (ISED). IEEE, pp 135–140Google Scholar
  24. 24.
    Kwok H, Tang WK (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4):1518–1529Google Scholar
  25. 25.
    Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127–133Google Scholar
  26. 26.
    Li S, Li C, Chen G, Bourbakis NG, Lo KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 23(3):212–223Google Scholar
  27. 27.
    Li X, Wang L, Yan Y, Liu P (2016) An improvement color image encryption algorithm based on dna operations and real and complex chaotic systems. Optik-International Journal for Light and Electron Optics 127 (5):2558–2565Google Scholar
  28. 28.
    Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320–3327Google Scholar
  29. 29.
    Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16-17):3895–3903Google Scholar
  30. 30.
    Liu Z, Gong M, Dou Y, Liu F, Lin S, Ahmad MA, Dai J, Liu S (2012) Double image encryption by using arnold transform and discrete fractional angular transform. Opt Lasers Eng 50(2):248–255Google Scholar
  31. 31.
    Liu Z, Liu S (2007) Double image encryption based on iterative fractional fourier transform. Opt Commun 275(2):324–329Google Scholar
  32. 32.
    Luisier F, Blu T, Unser M (2010) Image denoising in mixed poisson–gaussian noise. IEEE Trans Image Process 20(3):696–708PubMedGoogle Scholar
  33. 33.
    Miller FP, Vandome AF, McBrewster J (2009) Advanced encryption standard. Alpha Press, OrlandoGoogle Scholar
  34. 34.
    Nishchal NK (2009) Optical image watermarking using fractional fourier transform. J Opt 38(1):22–28Google Scholar
  35. 35.
    Panna B, Kumar S, Jha RK (2018) Image encryption based on block-wise fractional fourier transform with wavelet transform. IETE Tech. Rev., pp. 1–14Google Scholar
  36. 36.
    Pei SC, Yeh MH (2001) The discrete fractional cosine and sine transforms. IEEE Trans Signal Process 49 (6):1198–1207Google Scholar
  37. 37.
    Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2015) Medical data sheet in safe havens–a tri-layer cryptic solution. Comput Biol Med 62:264–276PubMedGoogle Scholar
  38. 38.
    Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2017) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst 65(1):65–78Google Scholar
  39. 39.
    Rao KR, Yip P (2014) Discrete cosine transform: algorithms, advantages, applications. Academic Press, CambridgeGoogle Scholar
  40. 40.
    Ross SM (2014) Introduction to probability and statistics for engineers and scientists. Academic Press, CambridgeGoogle Scholar
  41. 41.
    Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278Google Scholar
  42. 42.
    Shourya S, Kumar S, Jha RK (2016) Adaptive fractional differential approach to enhance underwater images. In: 2016 Sixth International Symposium on Embedded Computing and System Design (ISED). IEEE, pp 56–60Google Scholar
  43. 43.
    Stallings W (2006) Cryptography and network security, 4/E. Pearson Education IndiaGoogle Scholar
  44. 44.
    Suryanto Y, Ramli K, et al. (2017) A new image encryption using color scrambling based on chaotic permutation multiple circular shrinking and expanding. Multimed Tools Appl 76(15):16831–16854Google Scholar
  45. 45.
    Taneja N (2010) Security solutions for still visual dataGoogle Scholar
  46. 46.
    Taneja N, Raman B, Gupta I (2011) Chaos based partial encryption of spiht compressed images. Int J Wavelets Multiresolution Inf Process 9(02):317–331Google Scholar
  47. 47.
    Tao R, Meng XY, Wang Y (2010) Image encryption with multiorders of fractional fourier transforms. IEEE Trans Inf Forensics Secur 5(4):734–738Google Scholar
  48. 48.
    Wang K, Zou L, Song A, He Z, et al. (2005) On the security of 3d cat map based symmetric image encryption scheme. Phys Lett A 343(6):432–439Google Scholar
  49. 49.
    Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and dna encoding. Multimed Tools Appl 76(5):6229–6245Google Scholar
  50. 50.
    Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108Google Scholar
  51. 51.
    Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84Google Scholar
  52. 52.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612PubMedGoogle Scholar
  53. 53.
    Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on dna sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299Google Scholar
  54. 54.
    Wu J, Zhang L, Zhou N (2010) Image encryption based on the multiple-order discrete fractional cosine transform. Opt Commun 283(9):1720–1725Google Scholar
  55. 55.
    Wu X, Hu H, Zhang B (2004) Parameter estimation only from the symbolic sequences generated by chaos system. Chaos, Solitons & Fractals 22(2):359–366Google Scholar
  56. 56.
    Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on dna sequence operation and hyper-chaotic system. Optik-International Journal for Light and Electron Optics 124(18):3596–3600Google Scholar
  57. 57.
    Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on dna encoding and multi-chaotic maps. AEU Int J Electron Commun 68(3):186–192Google Scholar
  58. 58.
    Zhang Q, Wei X (2013) Rgb color image encryption method based on lorenz chaotic system and dna computation. IETE Tech Rev 30(5):404–409Google Scholar
  59. 59.
    Zhang S, Gao T, Gao L (2014) A novel encryption frame for medical image with watermark based on hyperchaotic system. Math Probl. Eng. 2014Google Scholar
  60. 60.
    Zhang Y, Li C, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 69(3):1091–1096Google Scholar
  61. 61.
    Zhang Y, Xiao D, Wen W, Tian Y (2013) Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Opt Laser Technol 54:1–6Google Scholar
  62. 62.
    Zhou Y, Bao L, Chen CP (2014) A new 1d chaotic system for image encryption. Signal Process 97:172–182Google Scholar

Copyright information

© International Federation for Medical and Biological Engineering 2019

Authors and Affiliations

  1. 1.Department of Electrical EngineeringIndian Institute of Technology PatnaBihtaIndia

Personalised recommendations