Advertisement

Securing DICOM Format Image Archives Using Improved Chaotic Cat Map Method

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 177)

Abstract

In healthcare industry, the patient’s medical data plays a vital role because diagnosis of any ailments is done by using those data. The high volume of medical data leads to scalability and maintenance issues when using healthcare provider’s onsite picture archiving and communication system (PACS) and network oriented storage system. Therefore a standard is needed for maintaining the medical data and for better diagnosis. Since the medical data reflects in a similar way to individuals personal information, secrecy should be maintained. Maintaining secrecy can be done by encrypting the data, but as medical data involves images and videos, traditional text based encryption/decryption schemes are not adequate for providing confidentiality. In this paper, we propose a method for securing the DICOM format medical archives by providing a better confidentiality. Our contribution in this method is of twofold: (1) Development of Chaotic based Arnold Cat Map for encryption/decryption of DICOM files and (2) Applying diffusion for those encrypted files. By applying this method, the secrecy of medical data is maintained and is tested with various DICOM format image archives by studying the following parameters i) PSNR-for quality of images and ii) Key-for security.

Keywords

Medical images DICOM Encryption Healthcare Confusion Diffusion 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Teng, C.-C., Mitchell, J., Walker, C., Swan, A., Davila, C., Howard, D., Needham, T.: A Medical Image Archive Solution in the Cloud, pp. 431–434. IEEE (2010), doi:10.1109/ICSESS.2010.5552343Google Scholar
  2. 2.
    Wang, D., Zhang, Y.-B.: Image encryption algorithm based on s-boxes substitution and chaos random sequence. In: International Conference on Computer Modeling and Simulation (2009), doi:10.1109/ICCMS.2009.26Google Scholar
  3. 3.
    Peterson, G.: Arnolds Cat Map. Math. 45 Linear Algebra (Fall 1997)Google Scholar
  4. 4.
    Chen, G., Maob, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Science Direct (2003), doi:10.1016/j.chaos.2003.12.022Google Scholar
  5. 5.
    Kashyap, S., Karthik, K.: Authenticating encrypted data, pp. 1–5. IEEE (2010), doi:10.1109/NCC.2011.5734696Google Scholar
  6. 6.
    Struss, K.: A Chaotic Image Encryption. Mathematics Senior Seminar 4901 (Spring 2009)Google Scholar
  7. 7.
    Wong, K.-W., Kwok, B.S.-H.: An Efficient Diffusion Approach for Chaos-based Image Encryption. In: 3rd International Conference Physics and Control, Physcon (2007)Google Scholar
  8. 8.
    Wong, K.-W., Kwok, B.S.-H., Law, W.-S.: A Fast Image Encryption Scheme based on Chaotic Standard Map. In: Cryptography and Security Conference, vol. 372(15), pp. 2645–2652 (2006), Cited as arXiv:cs/0609158v1Google Scholar
  9. 9.
    Ling, B., Liu, L., Zhang, J.: Image encryption algorithm based on chaotic map and S-DES, pp. 41–44. IEEE (2010), doi:10.1109/ICACC.2010. 5486998Google Scholar
  10. 10.
    Kocarev, L., Jakimoski, G., Stojanovski, T., Parlit, U.: From chaotic maps to encryption schemes. In: Proceedings of the 1998 IEEE International Symposium on Circuits and Systems, ISCAS 1998, vol. 4, pp. 514–517 (1998), doi:10.1109/ISCAS.1998.698968Google Scholar
  11. 11.
    Sharma, M.: Image encryption techniques using chaotic schemes: A review. International Journal of Engineering Science and Technology 2(6), 2359–2363, 1–10 (2010) ISSN: 0975-5462Google Scholar
  12. 12.
    Asim, M., Jeoti, V.: Image Encryption: Comparison between AES and a Novel Chaotic Encryption Scheme, pp. 65–69. IEEE (2007), doi:10.1109/ICSCN.2007.350697Google Scholar
  13. 13.
    Lian, S., Sun, J., Wang, Z.: Security analysis of a chaos-based image encryption algorithm. Science Direct, Physica A: Statistical Mechanics and its Applications 351(2-4), 645–661 (2005)CrossRefGoogle Scholar
  14. 14.
    Ren, S., Gao, C., Dai, Q., Fei, X.: Attack to an Image Encryption Algorithm based on Improved Chaotic Cat Maps. In: 3rd International Congress on Image and Signal Processing, CISP 2010, pp. 533–536 (2010), doi:10.1109/CISP.2010.5647659Google Scholar
  15. 15.
    Mao, Y., Chen, G.: Chaos-Based image encryption (2005), http://www.open-image.org/725publication/journal/CBIE.pdf
  16. 16.
    Zhang, Y.-B.: Chaos based cryptography. An alternative to algebraic cryptography (2008)Google Scholar
  17. 17.
    Zhu, Z., Zhai, K., Wang, B., Liu, H., Jiang, H.: Research on Chaos-based Message Digest Method for Medical Images, pp. 1–510. IEEE (2009), doi:1109/CISP.2009.5301139Google Scholar
  18. 18.
    Zhu, Y., Zhou, Z., Yang, H., Pan, W., Zhang, Y.: A Chaos-Based Image Encryption Algorithm Using Wavelet Transform, pp. 1037–1040. IEEE (2010), doi:10.1109/IEMBS.2010.5628061Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringSri Sivasubramania Nadar College of EngineeringChennaiIndia

Personalised recommendations