Skip to main content

A Novel Image Encryption Algorithm Using Two Chaotic Maps for Medical Application

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 133))

Abstract

The advancement of information technology has provided the possibility of transmitting and retrieving medical information in a better manner in the recent years. The secured medical image transmission will help in maintaining the confidentiality of information. Such security measures are highly essential for multi media data transfer from the local place to the specialist location at the remote place. This paper devoted to provide a secured medical image encryption technique using duo chaos based circular mapping. The given original images are divided into blocks and zigzag scanning is performed .To encrypt the image, chaos based circular shift mapping procedure and scrambling based on cryptography technique are adopted. The efficiency of the proposed scheme is evaluated in terms of statistical measures such as cross correlation and peak signal –to noise ratio (PSNR). It is found that the proposed image encryption scheme yields better results, which, can be suitably tested for real time problems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Smid, M.E., Branstad, D.K.: The data encryption standard: past and future. Proceedings of the IEEE 76(5), 550–559 (1988)

    Article  Google Scholar 

  2. Yen, J.-C., Guo, J.-I.: An efficient hierarchical chaotic image encryption algorithm and its VLSI realization. IEE Proceedings—Vision, Image and Signal Processing 147(2), 167–175 (2000)

    Article  Google Scholar 

  3. Kuo, C.J., Chen, M.S.: A new signal encryption technique and its attack study. In: Proc. IEEE International Carnahan Conference On Security Technology, Taipei, Taiwan, pp. 149–153 (October 1991)

    Google Scholar 

  4. Macq, B.M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)

    Article  Google Scholar 

  5. Parker, T.S., Chua, L.O.: Chaos: a tutorial for engineers. Proceedings of the IEEE 75(8), 982–1008 (1995)

    Article  Google Scholar 

  6. Wu, C.W., Rulkov, N.F.: Studying chaos via 1-Dmaps—a tutorial. IEEE Trans. on Circuits and Systems I: Fundamental Theory and Applications 40(10), 707–721 (1993)

    Article  Google Scholar 

  7. Biham, E.: Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT 1991. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 532–534. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  8. Yi, X., Tan, C.H., Siew, C.K.: Fast encryption for multimedia. IEEE Transactions on Consumer Electronics 47(1), 101–107 (2001)

    Article  Google Scholar 

  9. Wolter, S., Matz, H., Schubert, A., Laur, R.: On the VLSI implementation of the internal data encryption algorithm IDEA. In: Proc. IEEE Int. Symp. Circuits and Systems, Seattle, Washington, USA, vol. 1, pp. 397–400 (1995)

    Google Scholar 

  10. Kuo, C.J., Chen, M.S.: A new signal encryption technique and its attack study. In: Proceedings of IEEE International Conference on Security Technology, Taipei. Taiwan. DD, pp. 149–153 (1991)

    Google Scholar 

  11. Dachselt, F., Schwarz, W.: Chaos And Cryptography. IEEE Transactions On Circuits And Systems—I: Fundamental Theory And Applications 48(12) (2001)

    Google Scholar 

  12. Ahmed, H.E.H., Kalash, H.M., Allah, O.S.F.: An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption. Informatica 31, 121–129 (2007)

    Google Scholar 

  13. Pareek, N.K., Patida, V., Sud, K.K.: Image encryption using chaotic logistic map. Elsevier Image and Vision Computing 24, 926–934 (2006)

    Article  Google Scholar 

  14. Chen, H.-C.: Design and Realization of a New Signal Security System for Multimedia Data Transmission. EURASIP Journal on Applied Signal Processing 2003 13, 1291–1305 (2003)

    Article  Google Scholar 

  15. El-Fishawy, N., Zaid, O.M.A.: Quality of encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. International Journal of Network Security 5(3), 241–251 (2007)

    Google Scholar 

  16. Xiangdong, L., Junxing, Z., Jinhai, Z., Xiqin, H.: Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation. IJCSNS International Journal of Computer Science and Network Security 8(1) (2008)

    Google Scholar 

  17. Wang, S., Zheng, D., Zhao, J., Tam, W.J., Speranza, F.: An Image Quality Evaluation Method Based on Digital Watermarking. Transactions Letters IEEE Transactions on Circuits and Systems For Video Technology 17(1) (2007)

    Google Scholar 

  18. Krishnamoorthi, R., Sheba Kezia Malarchelvi, P.D.: Selective Combinational Encryption of Gray Scale Images using Orthogonal Polynomials based Transformation. IJCSNS International Journal of Computer Science and Network Security 8(5) (May 2008)

    Google Scholar 

  19. Zhang, L., Liao, X., Wang, X.: An image encryption approach based on chaotic maps. Elsevier Chaos, Solitons and Fractals 24, 759–765 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  20. Mao, Y., Chen, G.: Chaos-Based Image Encryption. Springer, Berlin (2003)

    Google Scholar 

  21. Giesl, J., Vlcek, K.: Image Encryption Based On Strange Attractor. ICGST-GVIP Journal (9) (2009), ISSN 1687-398X

    Google Scholar 

  22. He, X., Zhang, Q.: Image Encryption Based on Chaotic Modulation of Wavelet Coefficients. In: 2008 Congress on Image and Signal Processing, IEEE Computer Society Press, Los Alamitos (2008)

    Google Scholar 

  23. http://www.mathworks.com/matlabcentral/fileexchange/11362

  24. http://users.ece.gatech.edu/~njayant/mmc5/sld012.htm

  25. Ozturk, I.: Analysis and Comparison of Image Encryption Algorithms. Proceedings of World Academy of Science, Engineering and Technology 3 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sathishkumar, G.A., Bhoopathybagan, K., Sriraam, N., Venkatachalam, S.P., Vignesh, R. (2011). A Novel Image Encryption Algorithm Using Two Chaotic Maps for Medical Application. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advanced Computing. CCSIT 2011. Communications in Computer and Information Science, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17881-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17881-8_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17880-1

  • Online ISBN: 978-3-642-17881-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics