[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Medical image encryption using fractional discrete cosine transform with chaotic function

  • Original Article
  • Published:
Medical & Biological Engineering & Computing Aims and scope Submit manuscript

Abstract

In this advanced era, where we have high-speed connectivity, it is very imperative to insulate medical data from forgery and fraud. With the regular increment in the number of internet users, it is challenging to transmit the beefy medical data. This (medical data) is always reused for different diagnosis purposes, so the information of the medical images need to be protected. This paper introduces a new scheme to ensure the safety of the medical data, which includes the use of a chaotic map on the fractional discrete cosine transform (FrDCT) coefficients of the medical data/images. The imperative FrDCT provides a high degree of freedom for the encryption of the medical images. The algorithm consists of two significant steps, i.e., application of FrDCT on an image and after that chaotic map on FrDCT coefficients. The proposed algorithm discusses the benefits of FrDCT over fractional Fourier transform (FRFT) concerning fractional order α. The key sensitivity and space of the proposed algorithm for different medical images inspire us to make a platform for other researchers to work in this area. Experiments are conducted to study different parameters and challenges. The proposed method has been compared with state-of-the-art techniques. The results suggest that our technique outperforms many other state-of-the-art techniques.

Overview of the proposed algorithm

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Al-Haj A (2015) Providing integrity, authenticity, and confidentiality for header and pixel data of dicom images. J Digit Imaging 28(2):179–187

    PubMed  Google Scholar 

  2. Biham E, Shamir A (2012) Differential cryptanalysis of the data encryption standard. Springer Science & Business Media

  3. Bountis T (2012) Chaotic dynamics: theory and practice, vol. 298 Springer Science & Business Media

  4. Burr WE (2003) Selecting the advanced encryption standard. IEEE Secur Priv 99(2):43–52

    Google Scholar 

  5. Cariolaro G, Erseghe T, Kraniauskas P (2002) The fractional discrete cosine transform. IEEE Trans Signal Process 50(4):902–911

    Google Scholar 

  6. Chai X, Gan Z, Yuan K, Chen Y, Liu X (2017) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput & Applic 31(1):219–237

    Google Scholar 

  7. Chandrasekaran J, Thiruvengadam S (2017) A hybrid chaotic and number theoretic approach for securing dicom images. Security and Communication Networks 2017

  8. Chen G, Yu X (2003) Chaos control: theory and applications, vol. 292 Springer Science & Business Media

  9. Chen WH, Smith C, Fralick S (1977) A fast computational algorithm for the discrete cosine transform. IEEE Trans Commun 25(9):1004–1009

    Google Scholar 

  10. Chen X, Hu CJ (2017) Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi Journal of Biological Sciences 24(8):1821–1827

    PubMed  PubMed Central  Google Scholar 

  11. Coppersmith D, Johnson DB, Matyas SM (1996) A proposed mode for triple-des encryption. IBM J Res Dev 40(2):253–262

    Google Scholar 

  12. El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144– 157

    Google Scholar 

  13. Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FC, Chi KT, Ma HF (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010

    PubMed  Google Scholar 

  14. Fu C, Zhang GY, Bian O, Lei WM, Ma HF (2014) A novel medical image protection scheme using a 3-dimensional chaotic system, vol 9

    PubMed  PubMed Central  Google Scholar 

  15. Goel A, Vishwakarma VP (2017) Fractional dct and dwt hybridization based efficient feature extraction for gender classification. Pattern Recogn Lett 95:8–13

    Google Scholar 

  16. Gopalakrishnan T, Ramakrishnan S (2017) Chaotic image encryption with hash keying as key generator. IETE J Res 63(2): 172–187

    Google Scholar 

  17. Hilborn RC, Tufillaro NB (1997) Resource letter: Nd-1: nonlinear dynamics. Am J Phys 65(9):822–834

    Google Scholar 

  18. Kanso A, Ghebleh M (2015) An efficient and robust image encryption scheme for medical applications. Commun Nonlinear Sci Numer Simul 24(1-3):98–116

    Google Scholar 

  19. Kulenovic MR, Ladas G (2001) Dynamics of second order rational difference equations: with open problems and conjectures. Chapman and Hall/CRC, Boca Raton

    Google Scholar 

  20. Kumar S, Jha RK (2019) FD-based detector for medical image watermarking 13(10):1773–1782

  21. Kumar S, Jha RK (2016) Enhancement of high dynamic range images using variational calculus regularizer with stochastic resonance. In: Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing. ACM, p 38

  22. Kumar S, Jha RK (2018) A fractional integrator based novel detector for weak signal detection with watermark application. In: 2018 Asia-pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, pp 1791–1795

  23. Kumar S, Jha RK, Sharma R, Verma A, Singh Y (2018) A robust sharing based encryption method in singular value decomposition domain using fractional fourier transform. In: 2018 8th International Symposium on Embedded Computing and System Design (ISED). IEEE, pp 135–140

  24. Kwok H, Tang WK (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4):1518–1529

    Google Scholar 

  25. Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127–133

    Google Scholar 

  26. Li S, Li C, Chen G, Bourbakis NG, Lo KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 23(3):212–223

    CAS  Google Scholar 

  27. Li X, Wang L, Yan Y, Liu P (2016) An improvement color image encryption algorithm based on dna operations and real and complex chaotic systems. Optik-International Journal for Light and Electron Optics 127 (5):2558–2565

    CAS  Google Scholar 

  28. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320–3327

    Google Scholar 

  29. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16-17):3895–3903

    CAS  Google Scholar 

  30. Liu Z, Gong M, Dou Y, Liu F, Lin S, Ahmad MA, Dai J, Liu S (2012) Double image encryption by using arnold transform and discrete fractional angular transform. Opt Lasers Eng 50(2):248–255

    Google Scholar 

  31. Liu Z, Liu S (2007) Double image encryption based on iterative fractional fourier transform. Opt Commun 275(2):324–329

    CAS  Google Scholar 

  32. Luisier F, Blu T, Unser M (2010) Image denoising in mixed poisson–gaussian noise. IEEE Trans Image Process 20(3):696–708

    PubMed  Google Scholar 

  33. Miller FP, Vandome AF, McBrewster J (2009) Advanced encryption standard. Alpha Press, Orlando

    Google Scholar 

  34. Nishchal NK (2009) Optical image watermarking using fractional fourier transform. J Opt 38(1):22–28

    Google Scholar 

  35. Panna B, Kumar S, Jha RK (2018) Image encryption based on block-wise fractional fourier transform with wavelet transform. IETE Tech. Rev., pp. 1–14

  36. Pei SC, Yeh MH (2001) The discrete fractional cosine and sine transforms. IEEE Trans Signal Process 49 (6):1198–1207

    Google Scholar 

  37. Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2015) Medical data sheet in safe havens–a tri-layer cryptic solution. Comput Biol Med 62:264–276

    PubMed  Google Scholar 

  38. Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2017) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst 65(1):65–78

    Google Scholar 

  39. Rao KR, Yip P (2014) Discrete cosine transform: algorithms, advantages, applications. Academic Press, Cambridge

    Google Scholar 

  40. Ross SM (2014) Introduction to probability and statistics for engineers and scientists. Academic Press, Cambridge

    Google Scholar 

  41. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278

    Google Scholar 

  42. Shourya S, Kumar S, Jha RK (2016) Adaptive fractional differential approach to enhance underwater images. In: 2016 Sixth International Symposium on Embedded Computing and System Design (ISED). IEEE, pp 56–60

  43. Stallings W (2006) Cryptography and network security, 4/E. Pearson Education India

  44. Suryanto Y, Ramli K, et al. (2017) A new image encryption using color scrambling based on chaotic permutation multiple circular shrinking and expanding. Multimed Tools Appl 76(15):16831–16854

    Google Scholar 

  45. Taneja N (2010) Security solutions for still visual data

  46. Taneja N, Raman B, Gupta I (2011) Chaos based partial encryption of spiht compressed images. Int J Wavelets Multiresolution Inf Process 9(02):317–331

    Google Scholar 

  47. Tao R, Meng XY, Wang Y (2010) Image encryption with multiorders of fractional fourier transforms. IEEE Trans Inf Forensics Secur 5(4):734–738

    Google Scholar 

  48. Wang K, Zou L, Song A, He Z, et al. (2005) On the security of 3d cat map based symmetric image encryption scheme. Phys Lett A 343(6):432–439

    CAS  Google Scholar 

  49. Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and dna encoding. Multimed Tools Appl 76(5):6229–6245

    Google Scholar 

  50. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    Google Scholar 

  51. Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84

    CAS  Google Scholar 

  52. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    PubMed  Google Scholar 

  53. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on dna sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Google Scholar 

  54. Wu J, Zhang L, Zhou N (2010) Image encryption based on the multiple-order discrete fractional cosine transform. Opt Commun 283(9):1720–1725

    CAS  Google Scholar 

  55. Wu X, Hu H, Zhang B (2004) Parameter estimation only from the symbolic sequences generated by chaos system. Chaos, Solitons & Fractals 22(2):359–366

    Google Scholar 

  56. Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on dna sequence operation and hyper-chaotic system. Optik-International Journal for Light and Electron Optics 124(18):3596–3600

    Google Scholar 

  57. Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on dna encoding and multi-chaotic maps. AEU Int J Electron Commun 68(3):186–192

    Google Scholar 

  58. Zhang Q, Wei X (2013) Rgb color image encryption method based on lorenz chaotic system and dna computation. IETE Tech Rev 30(5):404–409

    Google Scholar 

  59. Zhang S, Gao T, Gao L (2014) A novel encryption frame for medical image with watermark based on hyperchaotic system. Math Probl. Eng. 2014

  60. Zhang Y, Li C, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 69(3):1091–1096

    Google Scholar 

  61. Zhang Y, Xiao D, Wen W, Tian Y (2013) Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Opt Laser Technol 54:1–6

    Google Scholar 

  62. Zhou Y, Bao L, Chen CP (2014) A new 1d chaotic system for image encryption. Signal Process 97:172–182

    Google Scholar 

Download references

Acknowledgments

The authors are grateful to the anonymous referees for their insightful comments to make this paper more qualitative for other researchers working in the same area.

Funding

We thank the Ministry of Electronics & Information Technology, Government of India (Digital India Corporation (Grant No.U72900MH2001NPL133410)) for granting fund to this prestigious project in the Signal & Image Processing Laboratory at Indian Institute of Technology Patna, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumit Kumar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, S., Panna, B. & Jha, R.K. Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 57, 2517–2533 (2019). https://doi.org/10.1007/s11517-019-02037-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11517-019-02037-3

Keywords

Navigation