Medical image cipher using hierarchical diffusion and non-sequential encryption
- 28 Downloads
This paper presents a medical image cipher with hierarchical diffusion and non-sequential encryption mechanism. An improved permutation approach is developed, which can contribute to not only image shuffling but also lightweight pixel modification at the same time. Therefore, diffusion property of the proposed scheme is achieved from both the permutation and diffusion phases, and hierarchical diffusion effect is thus obtained. Besides, non-sequential visiting mechanism is developed to encrypt the plain pixels in secret order; in other words, pixel visiting order is exploited as extra encryption factor in addition to the traditional pixel location and gray value. With hyper-chaotic Lorenz system employed as key stream generator, a complete image encryption scheme is finally constructed. Experimental results and security analyses validate the effectiveness and superiority of the proposed cipher.
KeywordsImage encryption Medical image Hierarchical diffusion Non-sequential encryption
This work is funded by the National Natural Science Foundation of China (No. 61802055), Fundamental Research Funds for the Central Universities (No. N171903003), Postdoctoral Science Foundation of Northeastern University (No. 20180101), China Postdoctoral Science Foundation (No. 2018M630301). Thanks to Dr Zhongyun Hua (Harbin Institute of Technology Shenzhen Graduate School) for his valuable suggestions. Thanks to Prof. Yicong Zhou (University of Macau) for his selfless suggestions on information security and technical writing, Junxin Chen has started his Postdoctoral Fellowship under the UM Macao Talent Program with Prof. Zhou’s supervision from 01/01/2019.
Compliance with ethical standards
Conflict of interest
The authors declare that they have no conflict of interest.
- 36.Zhang, L., Zhu, Z., Yang, B., Liu, W., Zhu, H., Zou, M.: Cryptanalysis and improvement of an efficient and secure medical image protection scheme. Math. Probl. Eng. 2015, 1–11 (2015)Google Scholar
- 52.Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: Fast encryption and authentication in a single cryptographic primitive. In: International workshop on fast software encryption, pp. 330–346. Springer (2003)Google Scholar
- 53.Paul, S., Preneel, B.: Near optimal algorithms for solving differential equations of addition with batch queries. In: International conference on cryptology in India, pp. 90–103. Springer (2005)Google Scholar
- 54.Zhang, L.Y.: Design and analysis of multimedia cryptosystems. Ph.D. thesis, City University of HongkongGoogle Scholar
- 55.Li, Y., Liu, X., Chen, G., Liao, X.: A new hyperchaotic Lorenz-type system: generation, analysis, and implementation. Int. J. Circuit Theory Appl. 39(8), 865–879 (2011)Google Scholar
- 56.Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology. JSAT 1(2), 31–38 (2011)Google Scholar
- 57.IEEE standard for floating-point arithmetic: IEEE Std 754–2008, pp. 1–70 (2008)Google Scholar