Abstract
The advancement of information technology has provided the possibility of transmitting and retrieving medical information in a better manner in the recent years. The secured medical image transmission will help in maintaining the confidentiality of information. Such security measures are highly essential for multi media data transfer from the local place to the specialist location at the remote place. This paper devoted to provide a secured medical image encryption technique using duo chaos based circular mapping. The given original images are divided into blocks and zigzag scanning is performed .To encrypt the image, chaos based circular shift mapping procedure and scrambling based on cryptography technique are adopted. The efficiency of the proposed scheme is evaluated in terms of statistical measures such as cross correlation and peak signal –to noise ratio (PSNR). It is found that the proposed image encryption scheme yields better results, which, can be suitably tested for real time problems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Smid, M.E., Branstad, D.K.: The data encryption standard: past and future. Proceedings of the IEEE 76(5), 550–559 (1988)
Yen, J.-C., Guo, J.-I.: An efficient hierarchical chaotic image encryption algorithm and its VLSI realization. IEE Proceedings—Vision, Image and Signal Processing 147(2), 167–175 (2000)
Kuo, C.J., Chen, M.S.: A new signal encryption technique and its attack study. In: Proc. IEEE International Carnahan Conference On Security Technology, Taipei, Taiwan, pp. 149–153 (October 1991)
Macq, B.M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)
Parker, T.S., Chua, L.O.: Chaos: a tutorial for engineers. Proceedings of the IEEE 75(8), 982–1008 (1995)
Wu, C.W., Rulkov, N.F.: Studying chaos via 1-Dmaps—a tutorial. IEEE Trans. on Circuits and Systems I: Fundamental Theory and Applications 40(10), 707–721 (1993)
Biham, E.: Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT 1991. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 532–534. Springer, Heidelberg (1991)
Yi, X., Tan, C.H., Siew, C.K.: Fast encryption for multimedia. IEEE Transactions on Consumer Electronics 47(1), 101–107 (2001)
Wolter, S., Matz, H., Schubert, A., Laur, R.: On the VLSI implementation of the internal data encryption algorithm IDEA. In: Proc. IEEE Int. Symp. Circuits and Systems, Seattle, Washington, USA, vol. 1, pp. 397–400 (1995)
Kuo, C.J., Chen, M.S.: A new signal encryption technique and its attack study. In: Proceedings of IEEE International Conference on Security Technology, Taipei. Taiwan. DD, pp. 149–153 (1991)
Dachselt, F., Schwarz, W.: Chaos And Cryptography. IEEE Transactions On Circuits And Systems—I: Fundamental Theory And Applications 48(12) (2001)
Ahmed, H.E.H., Kalash, H.M., Allah, O.S.F.: An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption. Informatica 31, 121–129 (2007)
Pareek, N.K., Patida, V., Sud, K.K.: Image encryption using chaotic logistic map. Elsevier Image and Vision Computing 24, 926–934 (2006)
Chen, H.-C.: Design and Realization of a New Signal Security System for Multimedia Data Transmission. EURASIP Journal on Applied Signal Processing 2003 13, 1291–1305 (2003)
El-Fishawy, N., Zaid, O.M.A.: Quality of encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. International Journal of Network Security 5(3), 241–251 (2007)
Xiangdong, L., Junxing, Z., Jinhai, Z., Xiqin, H.: Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation. IJCSNS International Journal of Computer Science and Network Security 8(1) (2008)
Wang, S., Zheng, D., Zhao, J., Tam, W.J., Speranza, F.: An Image Quality Evaluation Method Based on Digital Watermarking. Transactions Letters IEEE Transactions on Circuits and Systems For Video Technology 17(1) (2007)
Krishnamoorthi, R., Sheba Kezia Malarchelvi, P.D.: Selective Combinational Encryption of Gray Scale Images using Orthogonal Polynomials based Transformation. IJCSNS International Journal of Computer Science and Network Security 8(5) (May 2008)
Zhang, L., Liao, X., Wang, X.: An image encryption approach based on chaotic maps. Elsevier Chaos, Solitons and Fractals 24, 759–765 (2005)
Mao, Y., Chen, G.: Chaos-Based Image Encryption. Springer, Berlin (2003)
Giesl, J., Vlcek, K.: Image Encryption Based On Strange Attractor. ICGST-GVIP Journal (9) (2009), ISSN 1687-398X
He, X., Zhang, Q.: Image Encryption Based on Chaotic Modulation of Wavelet Coefficients. In: 2008 Congress on Image and Signal Processing, IEEE Computer Society Press, Los Alamitos (2008)
Ozturk, I.: Analysis and Comparison of Image Encryption Algorithms. Proceedings of World Academy of Science, Engineering and Technology 3 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sathishkumar, G.A., Bhoopathybagan, K., Sriraam, N., Venkatachalam, S.P., Vignesh, R. (2011). A Novel Image Encryption Algorithm Using Two Chaotic Maps for Medical Application. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advanced Computing. CCSIT 2011. Communications in Computer and Information Science, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17881-8_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-17881-8_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17880-1
Online ISBN: 978-3-642-17881-8
eBook Packages: Computer ScienceComputer Science (R0)